ch11
docx
keyboard_arrow_up
School
Western University *
*We aren’t endorsed by this school
Course
3367
Subject
Accounting
Date
Jan 9, 2024
Type
docx
Pages
8
Uploaded by MateStraw3183
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley
Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com
CHAPTER 11
1.
The starting point for the use of electronic data in the fraud or forensic accounting area, as
a means of fraud prevention and deterrence is a/an _______________________.
A.
Evaluation of the integrity of the data and their related systems
B.
Robust antifraud training program focused on the IT infrastructure
C.
Anti-virus, malware detection system running in the background of all company IT
D.
Suitable software that can crunch big data sets (such as Excel or IDEA)
2.
Many of the process controls applicable to paper-based information systems are analogous
to the internal controls surrounding digital information systems. An information technology system (IT) audit consists of (1) planning, (2) test of controls, and (3) _____________. A.
Auditor training on specific systems with which the fraud examiner may be unfamiliar
B.
Substantive tests
C.
An audit plan whose scope limitations receive buy-in from the company
D.
Establish a materiality threshold for IT errors that may be encountered 3.
Batch controls are __________________ that ensure data integrity for groups of transactions as they move through the system. A.
System-generated criteria
B.
Used to detect input errors by flagging those transactions that fall outside accepted ranges
C.
Techniques to ensure that data relationships within a record make sense
D.
Operator generated flags
4.
Fraud professionals in the IT audit environment need to be cognizant of the possibility that ___________________________________________________. A.
IT personnel may not understand accounting standards and terminology
B.
Sophisticated spear-phishing attacks may have altered the data in the system
C.
One or more of the IT systems personnel may be colluding with others to commit or conceal fraud.
D.
Ghost IT systems can exist within a company (much like shell companies) that can be almost impossible to detect
5.
The IT professional may be in a unique position to commit and conceal a fraud, simply because ______________________________________. A.
They can make important data disappear while credibly explaining it was caused by
malware or a hard drive crash
B.
They sometimes have access to all of a company’s financial transaction data
C.
So few others understand IT and how data can be manipulated
1 of 8
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley
Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com
D.
They often know how to navigate the Dark Web undetected
6.
The assertions of management related to financial statements include (1) the existence of assets and transactions, (2) the completeness of the transactions reflected in the financial statements and related notes, (3) proper disclosure of all rights and obligations associated with assets and liabilities, (4) the reasonableness of the valuation of transactions and balances reflected in the financial statements, and (5) _____________________________________. A.
Proper financial statement presentation and disclosure of the related notes B.
Certification of responsibility for the internal control environment C.
Formal attestation of any incidents of known fraud since prior audit
D.
Internal auditor statement that they have not been coerced into overriding controls
7.
Electronic evidence refers to any evidence captured ___________________. A.
With the assistance of IT or MIS professionals working in collaboration with investigators
B.
By examining the unused space on computer hard drives (assuming files have not been lost due to defragging)
C.
Through the use of digital tools such as Road MASSter 3 and EnCase
D.
By computers and electronic devices
8.
As with other digitized information, the challenge with electronic communication is ____________________________. A.
The ways in which it can be encrypted
B.
The sheer volume of exchanges
C.
Identifying the total universe of devices on which the information could exist
D.
That software has been invented to make it irretrievable by investigators
9.
One of the main concerns in the digital environment is related to the initial acquisition of the evidence. Auditors and forensic accountants may ________________ when they first encounter digital evidence.
A.
Attempt to “do too much”
B.
Copy a hard drive with a special device
C.
Seize it during a search without first confirming that it is covered by the warrant
D.
Feel overwhelmed by certain technologies
10.
Forensic accountants and fraud examiners seldom perform the work that is within the expertise of computer forensic professionals—usually, computer and electrical engineers and management information systems (MIS) personnel—who have specialized training and experience in digital evidence associated with fraud and forensic accounting issues. It is not only the need to protect the integrity of the data that justifies the use of specialized 2 of 8
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley
Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com
knowledge, skills, and abilities of the computer forensic specialist, but also ______________________________. A.
The requirement in court to prove that the data was not inadvertently altered
B.
The need to preserve the credibility of the forensic examination profession
C.
Their ability to find hidden information, deal with encrypted data, and retrieve previously deleted or erased files.
D.
Their ability to find accounting anomalies within large data sets through the use of CAATTs.
11.
Students (of forensic accounting and fraud examination) should understand that, with regard to digital evidence, only those with specialized training, experience, and appropriate professional certifications should _____________________. A.
Be involved in establishing materiality thresholds for IT audits B.
Use CAATTs to do “black box” or “white box” investigations
C.
Initially handle digital evidence
D.
Provide expert testimony
12.
To maintain data integrity and admissibility, the antifraud/forensic accounting professional needs to be able to _____________________________________. A.
Safely boot up and operate computers as soon as they are seized in a search
B.
Reconcile their work back to initially retrieved “master” datasets
C.
Defrag all seized computer hard drives to ensure that deleted files are not occupying unused space
D.
Acquire some mastery of any number of tools used to gather and protect digital evidence such as Road MASSter3, EnCase, UNERASER for Windows, Data Rescue 5 for Apple Computers
13.
It may be possible to recover deleted emails if _______________________. A.
A program such as Privacy Guardian was used by the perpetrator
B.
The service provider is named in the warrant (e.g., Google for gmail)
C.
An MIS or IT professional uses the “Defrag” command while the computer is in safe mode
D.
An email recovery tool is used prior to compaction/overwrite of data storage location
14.
Fraud examiners and forensic accountants need to be able to _______________, and they need to understand _______________________________. A.
Identify situations that demand a forensic computer specialist; how legal proceedings against a perpetrator can be jeopardized if evidence is gathered by one who lacks appropriate skills
3 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley
Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com
B.
Immediately copy all hard drives seized during a search so that embedded countdown software doesn’t automatically destroy all the data they contain; how such data is stored and indexed
C.
Develop familiarity with CAATs; the differences between “black box” and “white box” audit environments
D.
Deal with the sheer volume of electronic data; how to examine that data without compromising it
15.
Fraud examiners and auditors use data analysis software as ___________________, detecting a potential fraud in situations for which manual examination would prove extremely difficult or impossible. A.
A substitute for paper and pencil computations for
B.
An internal control useful for
C.
The ultimate system of red flags
D.
Supplements to analytical work in
16.
The fraud examiner or auditor must have an understanding of what could go wrong, what did go wrong, and how those concerns would manifest in the information system. This requires knowledge of the schemes, the industry, the organization, its IT control environments, its history of fraud, and other aspects outlined in the steps to __________________. With this foundation, the antifraud professional has an idea of what he or she is looking for. A.
Develop a targeted risk-assessment
B.
Utilize an H-E Matrix
C.
Analyzing accounting and non-financial data anomalies
D.
Conducting a fraud examination
17.
The expression, “a rifle shot” approach as opposed to a “shotgun” approach when referring to data extraction and analysis refers to: A.
Conducting a large series of tests such as a Benford’s Law test on data to look for specific patterns
B.
Developing a targeted risk assessment followed by incorporating IT tools and techniques that search for specific anomalies.
C.
Convicting a perpetrator with a precise analysis of highly detailed transactions
D.
Carefully evaluating (potentially) thousands of anomalies that may be indicative of fraud, errors, internal control breakdowns, or other issues.
18.
Nonfinancial, processes, control points, demographics, geographic, business sector product line, etc. are examples of types of digital data that: A.
By their nature are difficult to correlate with financial transactions.
B.
Can be disaggregated to help formulate conclusions and opinions.
C.
Do not lend themselves very well to electronic analysis.
4 of 8
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley
Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com
D.
Are better analyzed using “paper-and-pencil” approaches
19.
_____________ is like an activity log that captures file details, such as who created the file, when, who last edited the file and when, etc. This data can be crucial to answering many of the questions—who, what, when, where, and how. A.
A computer hard drive index
B.
A master file overview
C.
A safe mode partitioned drive
D.
Metadata 20.
The suggestion that, “The examiner may stratify the preliminary results to identify subgroups that are more like to be of concern,” is recommended in an AICPA publication when _______________________________. A.
Working in an audit setting with many key subgroups (such as defense contractors)
B.
No application-specific audit software is available for the type of data being analyzed (e.g., utilities meter readings)
C.
An initial big data examination that leads to a large number of anomalies
D.
Beginning your career as a fraud examiner so that you can learn to refine your hypotheses development skills about areas of concern
21.
Fraud and forensic examinations often have scope limitations. These serve to ____________________________________________________________________. A.
Establish that any and all pertinent data will be made available to examiners
B.
Focus and shape the examination while permitting a deep dive into the details under
examination
C.
Eliminate the need to do a complex targeted risk-assessment
D.
Develop a reasonable expectation upon which deviations can be accurately and effectively identified
22.
________________ are defined as “evaluations of financial information through analysis of plausible relationships among both financial and non-financial data …” A.
Analytical procedures
B.
Targeted correlations
C.
Scope limitations and targeted risk-assessment
D.
Coefficient analyses
23.
A critical aspect of substantive _______________ is the development of ________________ upon which deviations and anomalies can be accurately and effectively identified. A.
Critical thinking; data relationships
B.
Auditing; targeted risk-assessment
5 of 8
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley
Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com
C.
Analytical procedures; a reasonable expectation
D.
Examinations; big data sets
24.
Investigators can learn a lot about data by observing how variables _________, ____________ or have little to no relationship with one another. A.
Move together; disparately
B.
Are entered into company books; by whom and when
C.
Interact under stress; are ignored
D.
Are accurate; or inaccurate
25.
Looking for correlations where none had previously existed, as well as correlations that no
longer exist _________________________. A.
Is often practiced by novice examiners because it’s easy but isn’t really useful in a real-world fraud examination
B.
Can be a good technique if more difficult analyses are not within your skillset
C.
Is discouraged as a practice because it looks like a fishing expedition to the jury
D.
May suggest further investigative steps
26.
Graphics have at least three distinct roles in an examination. First, they can be used as an investigative tool. Second, graphics can help the investigator identify holes in the case or problem areas where further examination is required. Third:
A.
Graphics can reduce the amount of time it takes to investigate a case.
B.
Graphics can be useful to communicate investigative findings, conclusions, and results.
C.
Graphics can demonstrate to the jury that the investigator has done their duty of care in the investigation.
D.
Graphics can be printed in color to make the evidence more compelling to the jury, whereas accounting reports, etc. tend to be only black and white.
27.
A/an __________________ is useful for identifying major players who are central to an examination and to identify linkages between those players. A.
Timeline
B.
Flow diagram
C.
Predication matrix
D.
Association matrix
28.
A/an __________________ is a graphic representation of known and suspected associations among businesses, individuals, organizations, telephone numbers, addresses, email accounts, websites, etc. A.
Relationship matrix
B.
Link chart
6 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley
Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com
C.
Flow diagram
D.
Timeline
29.
You are investigating a case of suspected fraud in a Tri-state area chain of convenience stores. In all, there are 172 stores. Of these, 22 are operated by tribal governments. As your investigation unfolds, you suspect that there may be a connection between the regional manager of the tribal-based stores and one of the regional managers of multiple non-tribal-based stores, but you don’t have any evidence to support this notion at present. In creating an association matrix, how would you illustrate the possible connection between the two individuals?
A.
A solid black line
B.
A question mark placed between the two names
C.
A dashed line
D.
A solid red line
30.
Link charts and other graphics are not only beneficial as investigative and communication tools but can also be helpful in _________________________. A.
Demonstrating intent
B.
Prepping demonstrative evidence for trial
C.
Identifying shortcomings in the case and areas where further work is necessary
D.
Prevailing in a Daubert Challenge
31.
A/an __________________ allows the investigator to analyze the movements of events, activities, and commodities. A.
Relationship matrix
B.
Flow diagram
C.
Association matrix
D.
Timeline
32.
You have completed an investigation of a complex money laundering scheme whereby an art gallery was “selling” ordinary paintings for tens of thousands of dollars. In actuality, several drug cartels were “buying” the paintings under shell company names by wiring payments to the gallery. Once enough transactions were completed, the art gallery owner transported cash in moving boxes in the back of his pickup truck across the US/Mexican border. What kind of graphic would you create to demonstrate the movement of money into the country and then back out again?
A.
A flow diagram
B.
A link chart
C.
An association matrix
D.
A timeline 7 of 8
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley
Test bank written by Brian L. Carpenter, PhD, CFE ∙ (989) 205-4182 ∙ Brian@BrianLCarpenter.com
33.
A/an __________________ organizes information about events or activities chronologically to determine what has, or may have occurred, and the impact that these actions have had on the activity under examination.
A.
Link diagram
B.
Timeline C.
Association matrix
D.
Flow diagram
34.
_________________ can be used in a number of situations to oversee cases and case data,
organize it in meaningful ways, and even present information for use in reports during testimony.
A.
CAATTs
B.
PowerPoint
C.
Bates numbering
D.
Case management software
8 of 8
Related Documents
Related Questions
please answer with reason
arrow_forward
Match definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerg. A/An _____________is an electronic barrier that prevents unauthorized access to an organization’s computer network
arrow_forward
Match definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerb. ___________________occurs when management prepares misleading financial statements
arrow_forward
What is a key prerequisite for using electronic bank account management (eBAM) to reduce paperwork?
Bank-provided treasury management system
Upgrade from BAI2 to BTRS
TWIST standards
Initial relationship development
arrow_forward
Match definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerl. An insurance policy that reimburses a company for any losses due to employee theft isa/an .__________________________
arrow_forward
Your boss knows that you are taking a fraud examina- tion course at a local university. He is interested in learning more about data-driven fraud detection and asks you to prepare a short memo briefly explaining data-driven fraud detection methods and techniques. 1. List three data analysis methods and techniques and briefly explain them.
arrow_forward
Explain the difference between computer fraud and general fraud. Explain both categories of fraud in relation to accounting information system.
arrow_forward
V4. Hayden Corporation uses an enterprise resource planning (ERP) system. In their audit of receivables and revenues, the auditors have identified the following data elements in the corporation’s database that may be used for data analytics applications:
Customer balance
Customer credit limit and credit rating
Customer total annual sales
Customer purchases by date
Customer returns by date
Customer name
Customer shipping address
Required:
a. Describe two data analytic applications that might be used to audit the existence of receivables and occurrence of sales.
b. Describe one data analytic application that might be used to audit the valuation of receivables.
arrow_forward
Computer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you

Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Related Questions
- please answer with reasonarrow_forwardMatch definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerg. A/An _____________is an electronic barrier that prevents unauthorized access to an organization’s computer networkarrow_forwardMatch definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerb. ___________________occurs when management prepares misleading financial statementsarrow_forward
- What is a key prerequisite for using electronic bank account management (eBAM) to reduce paperwork? Bank-provided treasury management system Upgrade from BAI2 to BTRS TWIST standards Initial relationship developmentarrow_forwardMatch definitions with vocabulary terms) Use theseterms to complete the statements that follow. You can use a term more than once or not at all.Bank reconciliation Firewall Misappropriation of assetsCash equivalents Fraud triangle Outstanding checkController Fraudulent financial reporting PhishingDeposits in transit Imprest system Remittance adviceFidelity bond Internal control Treasurerl. An insurance policy that reimburses a company for any losses due to employee theft isa/an .__________________________arrow_forwardYour boss knows that you are taking a fraud examina- tion course at a local university. He is interested in learning more about data-driven fraud detection and asks you to prepare a short memo briefly explaining data-driven fraud detection methods and techniques. 1. List three data analysis methods and techniques and briefly explain them.arrow_forward
- Explain the difference between computer fraud and general fraud. Explain both categories of fraud in relation to accounting information system.arrow_forwardV4. Hayden Corporation uses an enterprise resource planning (ERP) system. In their audit of receivables and revenues, the auditors have identified the following data elements in the corporation’s database that may be used for data analytics applications: Customer balance Customer credit limit and credit rating Customer total annual sales Customer purchases by date Customer returns by date Customer name Customer shipping address Required: a. Describe two data analytic applications that might be used to audit the existence of receivables and occurrence of sales. b. Describe one data analytic application that might be used to audit the valuation of receivables.arrow_forwardComputer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning

Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning