ch11

docx

School

Western University *

*We aren’t endorsed by this school

Course

3367

Subject

Accounting

Date

Jan 9, 2024

Type

docx

Pages

8

Uploaded by MateStraw3183

Report
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com CHAPTER 11 1. The starting point for the use of electronic data in the fraud or forensic accounting area, as a means of fraud prevention and deterrence is a/an _______________________. A. Evaluation of the integrity of the data and their related systems B. Robust antifraud training program focused on the IT infrastructure C. Anti-virus, malware detection system running in the background of all company IT D. Suitable software that can crunch big data sets (such as Excel or IDEA) 2. Many of the process controls applicable to paper-based information systems are analogous to the internal controls surrounding digital information systems. An information technology system (IT) audit consists of (1) planning, (2) test of controls, and (3) _____________. A. Auditor training on specific systems with which the fraud examiner may be unfamiliar B. Substantive tests C. An audit plan whose scope limitations receive buy-in from the company D. Establish a materiality threshold for IT errors that may be encountered 3. Batch controls are __________________ that ensure data integrity for groups of transactions as they move through the system. A. System-generated criteria B. Used to detect input errors by flagging those transactions that fall outside accepted ranges C. Techniques to ensure that data relationships within a record make sense D. Operator generated flags 4. Fraud professionals in the IT audit environment need to be cognizant of the possibility that ___________________________________________________. A. IT personnel may not understand accounting standards and terminology B. Sophisticated spear-phishing attacks may have altered the data in the system C. One or more of the IT systems personnel may be colluding with others to commit or conceal fraud. D. Ghost IT systems can exist within a company (much like shell companies) that can be almost impossible to detect 5. The IT professional may be in a unique position to commit and conceal a fraud, simply because ______________________________________. A. They can make important data disappear while credibly explaining it was caused by malware or a hard drive crash B. They sometimes have access to all of a company’s financial transaction data C. So few others understand IT and how data can be manipulated 1 of 8
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com D. They often know how to navigate the Dark Web undetected 6. The assertions of management related to financial statements include (1) the existence of assets and transactions, (2) the completeness of the transactions reflected in the financial statements and related notes, (3) proper disclosure of all rights and obligations associated with assets and liabilities, (4) the reasonableness of the valuation of transactions and balances reflected in the financial statements, and (5) _____________________________________. A. Proper financial statement presentation and disclosure of the related notes B. Certification of responsibility for the internal control environment C. Formal attestation of any incidents of known fraud since prior audit D. Internal auditor statement that they have not been coerced into overriding controls 7. Electronic evidence refers to any evidence captured ___________________. A. With the assistance of IT or MIS professionals working in collaboration with investigators B. By examining the unused space on computer hard drives (assuming files have not been lost due to defragging) C. Through the use of digital tools such as Road MASSter 3 and EnCase D. By computers and electronic devices 8. As with other digitized information, the challenge with electronic communication is ____________________________. A. The ways in which it can be encrypted B. The sheer volume of exchanges C. Identifying the total universe of devices on which the information could exist D. That software has been invented to make it irretrievable by investigators 9. One of the main concerns in the digital environment is related to the initial acquisition of the evidence. Auditors and forensic accountants may ________________ when they first encounter digital evidence. A. Attempt to “do too much” B. Copy a hard drive with a special device C. Seize it during a search without first confirming that it is covered by the warrant D. Feel overwhelmed by certain technologies 10. Forensic accountants and fraud examiners seldom perform the work that is within the expertise of computer forensic professionals—usually, computer and electrical engineers and management information systems (MIS) personnel—who have specialized training and experience in digital evidence associated with fraud and forensic accounting issues. It is not only the need to protect the integrity of the data that justifies the use of specialized 2 of 8
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com knowledge, skills, and abilities of the computer forensic specialist, but also ______________________________. A. The requirement in court to prove that the data was not inadvertently altered B. The need to preserve the credibility of the forensic examination profession C. Their ability to find hidden information, deal with encrypted data, and retrieve previously deleted or erased files. D. Their ability to find accounting anomalies within large data sets through the use of CAATTs. 11. Students (of forensic accounting and fraud examination) should understand that, with regard to digital evidence, only those with specialized training, experience, and appropriate professional certifications should _____________________. A. Be involved in establishing materiality thresholds for IT audits B. Use CAATTs to do “black box” or “white box” investigations C. Initially handle digital evidence D. Provide expert testimony 12. To maintain data integrity and admissibility, the antifraud/forensic accounting professional needs to be able to _____________________________________. A. Safely boot up and operate computers as soon as they are seized in a search B. Reconcile their work back to initially retrieved “master” datasets C. Defrag all seized computer hard drives to ensure that deleted files are not occupying unused space D. Acquire some mastery of any number of tools used to gather and protect digital evidence such as Road MASSter3, EnCase, UNERASER for Windows, Data Rescue 5 for Apple Computers 13. It may be possible to recover deleted emails if _______________________. A. A program such as Privacy Guardian was used by the perpetrator B. The service provider is named in the warrant (e.g., Google for gmail) C. An MIS or IT professional uses the “Defrag” command while the computer is in safe mode D. An email recovery tool is used prior to compaction/overwrite of data storage location 14. Fraud examiners and forensic accountants need to be able to _______________, and they need to understand _______________________________. A. Identify situations that demand a forensic computer specialist; how legal proceedings against a perpetrator can be jeopardized if evidence is gathered by one who lacks appropriate skills 3 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com B. Immediately copy all hard drives seized during a search so that embedded countdown software doesn’t automatically destroy all the data they contain; how such data is stored and indexed C. Develop familiarity with CAATs; the differences between “black box” and “white box” audit environments D. Deal with the sheer volume of electronic data; how to examine that data without compromising it 15. Fraud examiners and auditors use data analysis software as ___________________, detecting a potential fraud in situations for which manual examination would prove extremely difficult or impossible. A. A substitute for paper and pencil computations for B. An internal control useful for C. The ultimate system of red flags D. Supplements to analytical work in 16. The fraud examiner or auditor must have an understanding of what could go wrong, what did go wrong, and how those concerns would manifest in the information system. This requires knowledge of the schemes, the industry, the organization, its IT control environments, its history of fraud, and other aspects outlined in the steps to __________________. With this foundation, the antifraud professional has an idea of what he or she is looking for. A. Develop a targeted risk-assessment B. Utilize an H-E Matrix C. Analyzing accounting and non-financial data anomalies D. Conducting a fraud examination 17. The expression, “a rifle shot” approach as opposed to a “shotgun” approach when referring to data extraction and analysis refers to: A. Conducting a large series of tests such as a Benford’s Law test on data to look for specific patterns B. Developing a targeted risk assessment followed by incorporating IT tools and techniques that search for specific anomalies. C. Convicting a perpetrator with a precise analysis of highly detailed transactions D. Carefully evaluating (potentially) thousands of anomalies that may be indicative of fraud, errors, internal control breakdowns, or other issues. 18. Nonfinancial, processes, control points, demographics, geographic, business sector product line, etc. are examples of types of digital data that: A. By their nature are difficult to correlate with financial transactions. B. Can be disaggregated to help formulate conclusions and opinions. C. Do not lend themselves very well to electronic analysis. 4 of 8
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com D. Are better analyzed using “paper-and-pencil” approaches 19. _____________ is like an activity log that captures file details, such as who created the file, when, who last edited the file and when, etc. This data can be crucial to answering many of the questions—who, what, when, where, and how. A. A computer hard drive index B. A master file overview C. A safe mode partitioned drive D. Metadata 20. The suggestion that, “The examiner may stratify the preliminary results to identify subgroups that are more like to be of concern,” is recommended in an AICPA publication when _______________________________. A. Working in an audit setting with many key subgroups (such as defense contractors) B. No application-specific audit software is available for the type of data being analyzed (e.g., utilities meter readings) C. An initial big data examination that leads to a large number of anomalies D. Beginning your career as a fraud examiner so that you can learn to refine your hypotheses development skills about areas of concern 21. Fraud and forensic examinations often have scope limitations. These serve to ____________________________________________________________________. A. Establish that any and all pertinent data will be made available to examiners B. Focus and shape the examination while permitting a deep dive into the details under examination C. Eliminate the need to do a complex targeted risk-assessment D. Develop a reasonable expectation upon which deviations can be accurately and effectively identified 22. ________________ are defined as “evaluations of financial information through analysis of plausible relationships among both financial and non-financial data …” A. Analytical procedures B. Targeted correlations C. Scope limitations and targeted risk-assessment D. Coefficient analyses 23. A critical aspect of substantive _______________ is the development of ________________ upon which deviations and anomalies can be accurately and effectively identified. A. Critical thinking; data relationships B. Auditing; targeted risk-assessment 5 of 8
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com C. Analytical procedures; a reasonable expectation D. Examinations; big data sets 24. Investigators can learn a lot about data by observing how variables _________, ____________ or have little to no relationship with one another. A. Move together; disparately B. Are entered into company books; by whom and when C. Interact under stress; are ignored D. Are accurate; or inaccurate 25. Looking for correlations where none had previously existed, as well as correlations that no longer exist _________________________. A. Is often practiced by novice examiners because it’s easy but isn’t really useful in a real-world fraud examination B. Can be a good technique if more difficult analyses are not within your skillset C. Is discouraged as a practice because it looks like a fishing expedition to the jury D. May suggest further investigative steps 26. Graphics have at least three distinct roles in an examination. First, they can be used as an investigative tool. Second, graphics can help the investigator identify holes in the case or problem areas where further examination is required. Third: A. Graphics can reduce the amount of time it takes to investigate a case. B. Graphics can be useful to communicate investigative findings, conclusions, and results. C. Graphics can demonstrate to the jury that the investigator has done their duty of care in the investigation. D. Graphics can be printed in color to make the evidence more compelling to the jury, whereas accounting reports, etc. tend to be only black and white. 27. A/an __________________ is useful for identifying major players who are central to an examination and to identify linkages between those players. A. Timeline B. Flow diagram C. Predication matrix D. Association matrix 28. A/an __________________ is a graphic representation of known and suspected associations among businesses, individuals, organizations, telephone numbers, addresses, email accounts, websites, etc. A. Relationship matrix B. Link chart 6 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com C. Flow diagram D. Timeline 29. You are investigating a case of suspected fraud in a Tri-state area chain of convenience stores. In all, there are 172 stores. Of these, 22 are operated by tribal governments. As your investigation unfolds, you suspect that there may be a connection between the regional manager of the tribal-based stores and one of the regional managers of multiple non-tribal-based stores, but you don’t have any evidence to support this notion at present. In creating an association matrix, how would you illustrate the possible connection between the two individuals? A. A solid black line B. A question mark placed between the two names C. A dashed line D. A solid red line 30. Link charts and other graphics are not only beneficial as investigative and communication tools but can also be helpful in _________________________. A. Demonstrating intent B. Prepping demonstrative evidence for trial C. Identifying shortcomings in the case and areas where further work is necessary D. Prevailing in a Daubert Challenge 31. A/an __________________ allows the investigator to analyze the movements of events, activities, and commodities. A. Relationship matrix B. Flow diagram C. Association matrix D. Timeline 32. You have completed an investigation of a complex money laundering scheme whereby an art gallery was “selling” ordinary paintings for tens of thousands of dollars. In actuality, several drug cartels were “buying” the paintings under shell company names by wiring payments to the gallery. Once enough transactions were completed, the art gallery owner transported cash in moving boxes in the back of his pickup truck across the US/Mexican border. What kind of graphic would you create to demonstrate the movement of money into the country and then back out again? A. A flow diagram B. A link chart C. An association matrix D. A timeline 7 of 8
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com 33. A/an __________________ organizes information about events or activities chronologically to determine what has, or may have occurred, and the impact that these actions have had on the activity under examination. A. Link diagram B. Timeline C. Association matrix D. Flow diagram 34. _________________ can be used in a number of situations to oversee cases and case data, organize it in meaningful ways, and even present information for use in reports during testimony. A. CAATTs B. PowerPoint C. Bates numbering D. Case management software 8 of 8