-
The fraud triangle plus inquiry paradigm in an effective way to understand various types of investigative methods
True
-
One advantage of using a vulnerability chart is that it forces investigators to consider all aspects of a fraud
True
-
electronic sureveillance is often limited in value in the investigation of employee fraud because of concerns regarding employees' privacy rights
True
-
sureveillance losgs should always be drafted before an investigation begins
False
-
mobile observation is usually much more risky than stationary surveillance
True
-
during invigilation, no controls are imposed on any activities
False
-
surveillance is a theft investigation technique that relies on the examination of documents
False
-
not only are undercover operations both legal and valid, but they are also inexpensive
False
-
Investigation of fraud should only take place when predication has been first established
True
-
if possible, when using theft act investigation methods, interviewing the prime suspects should happen last
True
-
tailing includes the use of video, e-mail, wiretapping, and access to PCs
False
-
invigilation is a theft act investigative technique that involves close supervision of suspects during examination period
True
-
to get an accurate reading, it is generally agreed that the invigilation period should be at least four days in length
False
-
in determining which investigative method to use, it is most important that investigators focus on the costs of each possible method
False
-
seising and searching computers is illegal because it infringes on the rights guaranteed by the 4th amendment of the constitution
True
-
it is impossible to retrieve the data from a file that has been deleted on a computer
false
-
The SHA-1 checksum method os more advanced and is considered ,roe robust than the MD5 method
True
-
Which of the following is not a category used in the fraud triangle plus inquiry paradigm?
c. action investigative techniques
-
when beginning an investigation, fraud examiners should use techniques that will:
a. not arouse suspicion
-
when conducting an investigation, which of the following words should usually be avoided when conducting interviews?
c. investigation
-
when beginning a fraud investigation, Which of the following methods is most useful in indentifying possible suspects?
b. preparing vulnerability chart
-
invigilation:
c. provides evidence to help determine whether fraud is occuring
-
Which of the following is not a theft investigative method
b. honesty testing
-
when deciding whether or not to investigate, Which of the following factors should an org not consider?
d. all of the above should be considered
-
surveillance, when properly performed, is done:
a. without perp's knowledge
-
Which of the following is not included in a vulnerability chart?
c. internal controls that a company plans to institute in the future
-
a vulnerability chart:
a. forces investigators to explicitly consider all aspects of fraud
-
fixed point, or stationary, observations can be conducted by:
d. anyone
-
surveillance logs should include all of the following except:
b. cost of the surveillance equipment used
-
wiretapping, a form of electronic surveillance, can be used by:
e. none of the above
-
which theft investigative method is most limited in value during employee fraud investigations bc of concerns regarding employees' privacy at work?
a. electronic surveillance
-
when seizing computers, a calc (aka hash) that ensures you have an exact clone and have not changed the data is called a(n):
d. CRC checksum number
-
who should be consulted before any form of surveillance takes place?
c. legal counsel and human resources
-
a snapshot of active memory should be done:
b. after seizure of the computer, but before turning off the computer
|
|