Which of the following is a method of tracing assets that would yield the best result when several of the subject's assets or liabilities have changed during the period under examination and the subject a financial records are not available?
A. Bank deposit method
B. Regression analysis
C. Net worth method
D. Benford's Law analysis
A fabricated name and the post office box that an employee uses to collect disbursements from false billings is called:
A. Accomplice residence
B. Shell company
C. Perpetrator check
D. Cash generator
Thea is conducting a fraud examination for a company and suspects one of the company 's vendors (a one-person operation) of fraudulent biting. Thea wants to obtain a copy of the suspect individuals credit report and personal data from a third-party information broker. If Thea works In a jurisdiction that regulates the distribution of personal credit information she cannot obtain the suspects personal credit data under any circumstances.
A. True
B. False
Which of the following is NOT true with regard to tracing the deposition of loan proceeds?
A. Tracing loan proceeds can Identify the presence of internal control weaknesses
B. Tracing loan proceeds can determine if the proceeds were deposited into hidden accounts
C. Tracing loan proceeds can determine if hidden accounts were used for loan payments
D. Tracing loan proceeds can uncover previously hidden assets
Which of the following types of information would LEAST likely be found when searching external sources without the subject's consent or a legal order?
A. A subjects employee personnel file
B. A witness s address
C. A competitor's ownership information
D. Assets owned by a subject
Which at the following is the most accurate statement about fraud response plans?
A. A fraud response plan should specify how every fraud examination should be conducted regardless of the type of fraud
B. A fraud response plan should be complex and extremely detailed to most effectively protect against fraud
C. A fraud response plan should create an environment to maximize risk and minimize the potential for success
D. A fraud response plan outlines the actions an organization will take when suspicions of fraud have arisen
Which of the following is a common characteristic that asset hiders look for in the financial vehicles they use to conceal their assets?
A. Traceability
B. Liquidity
C. Transparency
D. Inaccessibility
Which counts sometimes can give rise to inventory theft detection?
A. Perpetual inventory counts
B. Physical inventory counts
C. Concealment inventory counts
D. None of the above
II you are seizing a computer for forensic analysis why is it generally necessary to seize any copiers connected to it?
A. Most copters today are nonimpact copiers meaning that they store copied mages indefinitely
B. Most copiers store, process and transmit data In a cloud environment
C. Many copiers connect via parallel cables, which store and transmit copy job data.
D. Many copiers have Internal hard drives that right contain Information relevant to a fraud examination.
Marcus is trying to locale me financial statements of Acme Airlines a multinational publicly traded corporation. Which of the following sources would be most effective tor finding this Information?
A. Regulatory securities records
B. Organizational filings
C. Commercial filings
D. Civil litigation records