Professional Documents
Culture Documents
Questions & Answer Keys (Statement in Bold, Underlined & Red Marked Are Answer Keys)
Questions & Answer Keys (Statement in Bold, Underlined & Red Marked Are Answer Keys)
DAY 7
2. XYZ Company Private Limited has overstated the amount of Sales and Debtors in the
financial statements for the year 2015-16 so as to avail the enhancement in the cash
credit limit from a bank has committed crime under Indian Penal Code of-
A. Criminal Breach of Trust.
B. Impersonation.
C. Theft.
D. Falsification of Accounts.
3. Mr. L.K. Zori a non-chartered accountant signed the audit report of a company in the
name of S M T & COMPANY Chartered Accountant pretending to be a Partner of it, he
has committed Crime under Indian Penal Code of-
A. Impersonation.
B. Misappropriation.
C. Criminal Breach of Trust.
D. Falsification of Accounts.
5. Mr. Anuj has created fake email account in the name of ISB Bank and send emails to
customers of bank asking for account related information. Mr. Anuj committed a
crime under Information Technology Act of-
A. Cheating by personation.
B. Identity Theft.
C. Data Theft.
D. Receiving stolen computer resource.
7. As per section 65B (2) of Indian Evidence Act which of the following is not a legal
condition for producing an electronic record as an Evidence-
A. The computer output containing the information was produced by the
computer during the period over which the computer was used regularly to
store or process information for the purposes of any activities regularly carried
on over that period by the person having lawful control over the use of the
computer
B. During the said period, information of the kind contained in the electronic
record or of the kind from which the information so contained is derived was
regularly fed into the computer in the ordinary course of the said activities
C. Throughout the materiel part of the said period, the computer was operating
properly or, if not, then in respect of any period in which it was not operating
properly or was out of operation during that part of the period, was not such
as to affect the electronic record or the accuracy of its contents.
D. In any proceedings where it is desired to give a statement in evidence by
virtue of this section, a certificate identifying the electronic record containing
the statement and describing the manner in which it was produced.
9. Which of the following is not the cybercrime as per Information Technology Act 2008-
A. Fraudulently or dishonestly using pen drive (containing virus) to a computer
and spreading virus which will alter, destroy the stored data.
B. Fraudulently or dishonestly sending the mail attachment containing virus.
C. Stealing of Source Code in the software Development Company.
D. Fraudulently or dishonestly making a false document.
11. As per the Information Technology Act (Amended) 2008, a body corporate shall be
liable to pay compensation for failure to protect data to person so affected-
A. Not exceeding seven crore rupees.
B. Not exceeding two crore rupees.
C. Not exceeding five crore rupees.
D. Not exceeding one crore rupees.
12. A software maintenance engineer appointed in a bank internationally altered source
code of the CBS application so as to deposit daily Rs. 5000/- into his saving account
from banks suspense account-
A. Is a crime under section 43 (b) for data theft under Information Technology Act
2008.
B. Is a crime under section 65 Tampering with Computer Source under
Information Technology Act 2008.
C. Is a crime under section 66 (c) for identity theft under Information Technology
Act 2008.
D. Is a crime under section 66 (d) for cheating by personation under Information
Technology Act 2008.
13. Which of the following agency is set up under Information Technology Act in India-
A. Financial Intelligence Unit of India
B. Unique Identification Authority of India
C. Indian Computer Emergency Response Team
D. National Intelligence Grid.
14. Whoever, being in any manner entrusted with property, or with any dominion over
property, dishonestly converts to his own use that property is a following type of crime
under Indian Penal Code-
A. Impersonation
B. Theft
C. Criminal Breach of Trust
D. Forgery
15. Which of the Following statement is True-
A. Wrongful Loss means the loss by lawful means of property to which the
person losing it is legally entitled.
B. Wrongful Loss means the loss by unlawful means of property to which the
person losing it is legally entitled.
C. Wrongful Loss means the loss by unlawful means of property to which the
person losing it is not legally entitled.
D. Wrongful Loss means the lawful gain of property to which the person gaining
it is legally entitled.
Day 6
8. To verify the original drive with the forensic copy, you use __________.
A. a password
B. a hash analysis
C. disk to disk verification
D. none of the above
9.As a good forensic practice, why would it be a good idea to wipe a forensic
drive before using it?
A. Chain of Custody
B. No need to wipe
C. Different file and operating systems
D. Cross-contamination
Day 5
A. 1,2,3,4
B. 1,3,4,2
C. 2,3,1,4
D. 4,1,2,3
DAY 1-2-3-4
2. Forensic Accountants
a. Rely on documentary evidence only
b. Rely on circumstantial and documentary evidence
c. Rely on explanations and interviews and field inspections
d. Collect and examine the reliability any kind of of evidence collected
3. The three useful characteristics which forensic accountants need to have are:
a. Professional Skepticism, perseverance, and aggression
b. Professional skepticism, three dimensional vision, and tact
c. Tact, perceptive skills, three dimensional vision
d. Aggression, perseverance, perceptive skills
14. Which of the following is the BEST method during Covert Field audit:
a. Third Party inquiries for the purposes of background checks
b. Surveillance
c. Sting Operations- direct
d. Sting Operations- indirect
17. Which of the following is the MOST IMPORTANT consideration at the time of
Interviewing & Field Investigation:
a. Privacy rights
b. Employee rights and to ensure that an innocent employee has adequate
protection
c. Try and keep an HR person/ Legal representative always present when
interrogating at least
d. All of the above
18. Find the odd man out, as regards DO’s at the time of an interview:
a. ask the 5W+H (where, why, what, when, who + how) questions
b. keep questions simple and short
c. be judgmenta lrelying on facts as much as possible
d. follow up on your questions
26. Which of the following is the odd man out during an interview:
a. Purpose to obtain information
b. Hostile relationship between interviewer & subject likely
c. Minimal or no pre-interview legal requirements
d. No rights warning
28. Which of the following would be the FIRST sought after point in an pre-interrogation
checklist:
a. Field & documentary evidence collected
b. The modus operandi of the perpetrator
c. Possible motive
d. Names of the persons having knowledge
29. Which of the following is/are the basic technique/s to elicit information:
a. Report everything, no matter how minor or unimportant it may appear
b. Recall events in different order
c. Change perspective by looking at the event from the standpoint of a third
person
d. All of the above
30. Which of the following can form a part of the interrogation process:
a. Composing and asking questions
b. Recognizing and coping with deception
c. Verbal & Non-verbal signs and statement analysis
d. All of the above
32. Which of the following tips on listening would be useful during interrogation:
a. Investigators can conduct a successful interview only if good listeners
b. As valuable a tool as questioning
c. To be effective, one must be an active listener
d. All of the above
33. Which of the following is the only advantage as regards making notes during an
interview:
a. Prevents need for re-interviewing
b. May distract or offend witness
c. May preoccupy interviewer, creating appearance of inactiveness
d. May cause interviewer to miss non-verbal messages.
34. Which of the following is/are the advantage/s of handwritten or signed statements
by witness:
a. Useful if witness cannot testify
b. Can be used to impeach if witness changes story
c. Can be an added tool at the time of final presentation
d. All of the above
35. Which of the following is/are the advantage/s of sound or sound and visual
recording:
a. All information recorded in witnesses’ own words
b. Does not rely on inaccuracies of memory or another’s notes
c. Does not distract
d. All of the above
36. Which of the following is the ONLY disadvantage as regards video-audiotape or
movie during an interrogation:
a. Shows all, including fairness, procedures and treatment
b. Maybe some legal constraints and at times quality equipment may be costly
c. Easy to do
d. Can be relatively inexpensive
37. What is the ONLY advantage as regards audio recording during an interrogation:
a. Can infer fairness
b. Some words or descriptions may be meaningless without any pictorial
support
c. Necessitates identifying people
d. Necessitates things involved
38. What is the ONLY advantage as regards getting statement written and signed in the
suspect’s own handwriting:
a. Cant see demeanor
b. Cant hear voice inflections
c. Can be identified as coming directly from the suspect
d. Suspect may not agree to procedure
39. What is the ONLY disadvantage as regards getting typed unsigned statement
acknowledged by the suspect:
a. Contents of confession are present
b. Reduced believability of voluntariness and accuracy of contents
c. Contents of admission are present
d. Acknowledgements help show voluntariness.
46. Which of the following is/are the main purpose of interview / interrogation:
a. Establish Facts(Who, What, When, Where, and Why)
b. Identify the guilty party / parties
c. Obtain confession from the guilty (verbal & written) & establish a suspect
d. All of the above
51. Apart from Interviewing & Interrogation, which of the following would give some
amount of information:
a. Use of informants
b. Undercover / Sting operations
c. Surveillance
d. All of the above