Professional Documents
Culture Documents
Fraud Examination 4th Edition Albrecht Test Bank
Fraud Examination 4th Edition Albrecht Test Bank
Test Bank
Visit to download the full and correct content document:
https://testbankdeal.com/download/fraud-examination-4th-edition-albrecht-test-bank/
Chapter 8--Investigating Concealment 4 copy
Student: ___________________________________________________________________________
A. Link analyses
B. Bates numbers
C. Bar codes
D. RFID tags
2. The risk that an auditor will examine a fraudulent check and not recognize it as being fraudulent is
called _________ .
A. sampling risk
B. non-sampling risk
C. systematic risk
D. systemic risk
3. During a concealment investigation, an investigator fails to recognize that an invoice had been
forged. This represents a:
A. sampling risk.
B. non-sampling risk.
C. systematic risk.
D. systemic risk.
4. Computer searches and physical asset counts usually focus on the ________ element of the
fraud triangle.
A. theft
B. concealment
C. conversion
D. inquiry
5. Methods for concealment investigation include all but which of the following?
A. Document examination
B. Honesty testing
C. Audits
D. Computer searches
6. The three most common ways to obtain documentary evidence which are valuable but difficult to
obtain are:
8. ________ means that a record must be kept of when a document is received and what has
happened to it since its receipt.
A. Organization of evidence
B. Mark of evidence
C. Coordination of evidence
D. Chain of custody
9. Which of the following does NOT appear on a check that has been cashed?
A. Teller number
B. Date
C. Transaction number
D. Time of the transaction
10. _______ is the risk that the sample was not representative of the population.
A. Systematic risk
B. Non-sampling risk
C. Sampling risk
D. Compliance risk
11. Which of the following is generally considered a best practice while handling documentary
evidence?
A. Copies of the document should be used during the investigation and trial and should be kept in
the same file where the original is kept.
B. Photocopies are always preferable to original documents as evidence, as the original could be
tampered with.
C. Copies of the document should not be made and only the original document should be used
during investigation and trial.
D. Generally, a summary of the original document should be made for investigation and trial.
A. theft
B. conversion
C. concealment
D. inquiry
13. _______ are executed only by law enforcement officials and are generally used only in criminal
cases.
A. Subpoenas
B. Voluntary consents
C. Search warrants
D. Interviews
A. Covert operation
B. Conversion investigation
C. Inquiry investigation
D. Concealment investigation
16. Which statistical sampling allows an auditor to generalize and make inferences from the sample
to the population?
A. Probability sampling
B. Unstructured sampling
C. Discovery sampling
D. Quota sampling
17. The most common way to obtain private documents is by _________, which can be either oral or
written.
A. inquiry
B. search warrant
C. voluntary consent
D. audit
18. Which aspect of documentary evidence should be kept in mind to ensure that the documents can
be identified later and accessible for trial?
A. Organization of evidence
B. Coordination of evidence
C. Marking of evidence
D. Chain of custody of documents
A. CaseCentral
B. IDEA
C. TANZAN
D. SQL
20. ________ is a simple, statistically based method of analyzing a subset of transactions from a
larger pool.
A. Structured sampling
B. Probability sampling
C. Cluster sampling
D. Discovery sampling
21. In large cases that involve investigators, legal counsel, accountants, expert witnesses, and
management representatives, coordination can be very difficult. ________ can be useful in such
cases.
A. DatiCon
B. Analyst’s Notebook
C. CaseMap
D. Ringtail
A. To reduce sampling risk, the investigator can increase the sample size.
B. Sampling risk cannot be quantified, and can only be slightly reduced by careful planning of the
sampling procedure.
C. To reduce sampling risk, the investigator can use a random number table.
D. In fraud examination, sampling risk can be significant.
24. The four most common examples of documentary evidence which are valuable but difficult to
obtain are:
A. Web-based e-mail accounts, private bank records, tax returns, and brokerage records.
B. Sample analytical reports, photographs and videos, tax returns, and SEC filings.
C. Office e-mail accounts, private bank records, maps and diagrams, and sample analytical
reports.
D. Photographs and videos, private bank records, tax returns, and brokerage records.
25. Orders issued by a court or a grand jury to produce documents are called:
A. writs of certiorari.
B. search warrants.
C. voluntary consent.
D. subpoenas.
28. Once investigators enter their indicators into the centralized database, the software performs
_______ to find connections between people, places, and events.
A. regression analysis
B. crime analysis
C. link analysis
D. correlation analysis
A. risk-devoid
B. cluster
C. unidimensional
D. stop-and-go
Chapter 8--Investigating Concealment 4 copy Key
A. Link analyses
B. Bates numbers
C. Bar codes
D. RFID tags
2. The risk that an auditor will examine a fraudulent check and not recognize it as being
fraudulent is called _________ .
A. sampling risk
B. non-sampling risk
C. systematic risk
D. systemic risk
3. During a concealment investigation, an investigator fails to recognize that an invoice had been
forged. This represents a:
A. sampling risk.
B. non-sampling risk.
C. systematic risk.
D. systemic risk.
4. Computer searches and physical asset counts usually focus on the ________ element of the
fraud triangle.
A. theft
B. concealment
C. conversion
D. inquiry
5. Methods for concealment investigation include all but which of the following?
A. Document examination
B. Honesty testing
C. Audits
D. Computer searches
6. The three most common ways to obtain documentary evidence which are valuable but difficult
to obtain are:
8. ________ means that a record must be kept of when a document is received and what has
happened to it since its receipt.
A. Organization of evidence
B. Mark of evidence
C. Coordination of evidence
D. Chain of custody
9. Which of the following does NOT appear on a check that has been cashed?
A. Teller number
B. Date
C. Transaction number
D. Time of the transaction
10. _______ is the risk that the sample was not representative of the population.
A. Systematic risk
B. Non-sampling risk
C. Sampling risk
D. Compliance risk
11. Which of the following is generally considered a best practice while handling documentary
evidence?
A. Copies of the document should be used during the investigation and trial and should be
kept in the same file where the original is kept.
B. Photocopies are always preferable to original documents as evidence, as the original could
be tampered with.
C. Copies of the document should not be made and only the original document should be
used during investigation and trial.
D. Generally, a summary of the original document should be made for investigation and trial.
A. theft
B. conversion
C. concealment
D. inquiry
13. _______ are executed only by law enforcement officials and are generally used only in
criminal cases.
A. Subpoenas
B. Voluntary consents
C. Search warrants
D. Interviews
A. Covert operation
B. Conversion investigation
C. Inquiry investigation
D. Concealment investigation
16. Which statistical sampling allows an auditor to generalize and make inferences from the
sample to the population?
A. Probability sampling
B. Unstructured sampling
C. Discovery sampling
D. Quota sampling
17. The most common way to obtain private documents is by _________, which can be either oral
or written.
A. inquiry
B. search warrant
C. voluntary consent
D. audit
18. Which aspect of documentary evidence should be kept in mind to ensure that the documents
can be identified later and accessible for trial?
A. Organization of evidence
B. Coordination of evidence
C. Marking of evidence
D. Chain of custody of documents
A. CaseCentral
B. IDEA
C. TANZAN
D. SQL
20. ________ is a simple, statistically based method of analyzing a subset of transactions from a
larger pool.
A. Structured sampling
B. Probability sampling
C. Cluster sampling
D. Discovery sampling
21. In large cases that involve investigators, legal counsel, accountants, expert witnesses, and
management representatives, coordination can be very difficult. ________ can be useful in
such cases.
A. DatiCon
B. Analyst’s Notebook
C. CaseMap
D. Ringtail
A. To reduce sampling risk, the investigator can increase the sample size.
B. Sampling risk cannot be quantified, and can only be slightly reduced by careful planning of
the sampling procedure.
C. To reduce sampling risk, the investigator can use a random number table.
D. In fraud examination, sampling risk can be significant.
24. The four most common examples of documentary evidence which are valuable but difficult to
obtain are:
A. Web-based e-mail accounts, private bank records, tax returns, and brokerage records.
B. Sample analytical reports, photographs and videos, tax returns, and SEC filings.
C. Office e-mail accounts, private bank records, maps and diagrams, and sample analytical
reports.
D. Photographs and videos, private bank records, tax returns, and brokerage records.
25. Orders issued by a court or a grand jury to produce documents are called:
A. writs of certiorari.
B. search warrants.
C. voluntary consent.
D. subpoenas.
28. Once investigators enter their indicators into the centralized database, the software performs
_______ to find connections between people, places, and events.
A. regression analysis
B. crime analysis
C. link analysis
D. correlation analysis
A. risk-devoid
B. cluster
C. unidimensional
D. stop-and-go