TEST BANK for Forensic Accounting and Fraud Examination 2nd Edition. by Mary-Jo Kranacher and Dick

Page 1

CHAPTER 1

Module 1

1. Which of the following is NOT one of the four essential elements of fraud under common law?

A. A material false statement

B. Reliance on the false statement by the victim

C. Knowledge that the statement was false when it was spoken

D. Use of email, wire, or telephone with a criminal intent to deceive

2. The “felonious stealing, taking and carrying, leading, riding, or driving away with another’s property, with the intent to convert it or deprive the owner thereof” is the legal definition of:

A. Embezzlement

B. Tort

C. Larceny

D. Fraud

3. A fiduciary is someone who:

A. Swears an oath before taking office

B. Acts for the benefit of another

C. Betrays the trust of another

D. Controls access to an organization’s cash or assets

4. An unauthorized assumption and exercise of the right of ownership over goods or personal chattels belonging to another, to the alteration of their condition or the exclusion of the owner’s rights is the definition of:

A. Collusion

B. Concealment

C. Capital misappropriation

D. Conversion

5. The intentional, deliberate misstatement, or omission of material facts or accounting data that is misleading and, when considered with all the information made available, that would cause the reader to change or alter his or her judgment or decision is defined by the Association of Certified Fraud Examiners as:

A. Financial statement fraud

B. Financial statement misstatement

C. Financial statement concealment

D. Financial statement re-statement

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 11

6. Which of the following is an example of financial statement and reporting fraud?

A. Failing to post audit results on the company’s website

B. Debt ratio is materially higher than industry standards

C. Improper timing of revenue and expense recognition

D. Net income for any quarterly filing is 17% or more below analyst predictions

7. The essential characteristics of financial statement fraud are:

A. The misstatement is material and intentional and the users of the financial statements are investors in publicly traded companies.

B. This misstatement is material and intentional and the preparers of the financial statements have a fiduciary obligation to the organization.

C. The misstatement is material and intentional and the preparers of the financial statements fail to report the misstatement to the SEC or other applicable authority.

D. The misstatement is material and intentional and the users of the financial statements have been misled.

8. As a result of the Sarbanes-Oxley Act (2002), which of the following became part of the business landscape?

A. Assessment of internal controls, preservation of evidence, whistleblower protection and increased penalties for securities fraud

B. Mandatory separation of duties, two-factor authentication for online transactions, and prohibition of fraudulent financial reporting

C. Mandatory quarterly reporting of shell company beneficial ownership, mandatory criminal background checks on all publicly traded company officers and directors, and annual review of internal controls by the SEC

D. Auditing firm competence certification, annual disclosure of conflicts of interest by the board of directors, prohibition of illegal gratuities and penalties for whistleblowers

9. The occupational fraud and abuse classification system (fraud tree) arranges organizational frauds in which three categories?

A. The act, concealment, and conversion

B. Existence of a fiduciary relationship, breach of duty, harm to the plaintiff or benefit to the fiduciary

C. Asset misappropriation, corruption, and financial statement fraud

D. Incentive, opportunity, and rationalization.

10. Internal fraud committed by one or more employees of an organization is more commonly referred to as:

A. Fiduciary breach and embezzlement

B. Insider trading and market timing

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 11

C. Occupational fraud and abuse

D. Check tampering and billing schemes

11. The approach to investigating fraud recommended by the text:

A. Identify the specific law that was violated

B. Examine relevant evidence with an eye toward demonstrating three attributes of fraud

C. Defer decisions that are suited to an attorney’s expertise

D. Provide reasonable evidence in support of any opinion of guilt

12. The three attributes of a fraud are:

A. The scheme or fraud act, the concealment activity, and the conversion or benefit.

B. The motive, rationalization and opportunity.

C. The intent, the planning, and the execution of a fraudulent act.

D. Asset misappropriations, corruption, and financial statement fraud and other fraudulent statements.

13. Who said, “White collar criminals consider your humanity as a weakness to be exploited …”?

A. Dr. Joseph T. Wells

B. Sherron Watkins

C. Sam E. Antar

D. Andrew Fastow

Module 2

14. Forensic accounting is the application of financial principles and theories to facts or hypotheses in a legal dispute and consists of two primary functions:

A. Litigation advisory services and investigative services

B. Expressing an opinion of guilt or innocence in court regarding audit results and documenting the steps taken to reach that opinion

C. Subjecting accounting data to a Benford Analysis and explaining the results to a judge or jury

D. Providing courtroom testimony and administrative technical guidance to attorneys

15. Forensic and Valuation Services (FVS) professionals can expect that:

A. Their opinion will be carefully noted in court.

B. The attorney for opposing counsel to defer to the FVS professional’s expert opinion on matters pertaining to forensic accounting.

C. Their work will be carefully scrutinized by the opposing side and that engagements are adversarial in nature.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 11

D. Mediation, arbitration, and negotiations are directed by FVS professionals.

16. Which of the following is NOT typical of forensic and litigation advisory services?

A. Cost and lost profits associated with construction delays.

B. Divorce and matrimonial issues.

C. Environmental issues.

D. Stating an expert opinion about the guilt or innocence of a plaintiff or defendant in a court of law.

Module 3

17. Forensic accounting and fraud examination require at least three major skill types:

A. Inquisitive, persuasive, and authoritative

B. Equanimity, objectivity, and a commitment to excellence

C. Technical competence, investigative, and communication

D. Specialization in law or accounting, experience, and ongoing professional development

Module 4

18. Under current auditing standards, the auditor is required to:

A. Undertake a fraud-risk assessment but not for planning and performing auditing procedures to detect immaterial misstatements.

B. Undertake a fraud-risk assessment to include planning and performing auditing procedures to detect immaterial misstatements.

C. Undertake a fraud-risk assessment but not for planning and performing auditing procedures to detect immaterial misstatements unless such misstatements are caused by fraud (rather than error).

D. Undertake a fraud-risk assessment to include planning and performing auditing procedures to detect immaterial misstatements whether caused by fraud or error.

19. The interrelationship among auditing, fraud examination, and forensic accounting is dynamic and changes over time because of:

A. the Internet and other technological advances

B. high profile fraud cases such as Enron, Tyco, and WorldCom

C. emerging research by the ACFE which casts doubts on previously existing theories of criminality

D. political, social, and cultural pressures.

20. Fraud examination is the of resolving allegations of fraud from tips, complaints, or accounting clues.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
Test
L.
CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 11
by Mary-Jo Kranacher and Dick Riley
bank written by Brian
Carpenter, PhD,

A. Tradecraft

B. Art and science

C. Discipline

D. Accounting technique

Module 5

21. If a company generates $12,000,000 in annual sales and has an operating margin of 5%, how many additional dollars in sales would it need to generate to make up for fraud losses of $180,000?

A. $3,600,000

B. $360,000

C. $180,000

D. $1,800,000

22. According to the ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse, median fraud losses are the highest in cases of:

A. Asset misappropriation

B. Corruption

C. Financial reporting fraud

D. Insider trading

23. According to the ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse, what kind of fraud scheme resulted in the greatest percentage of cases?

A. Billing

B. Check tampering

C. Expense reimbursements

D. Skimming

24. According to the ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse, what is the median loss for schemes that ran 19-24 months in duration?

A. $178,000

B. $100,000

C. $150,000

D. $45,000

25. According to the ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse, what percentage of asset misappropriation cases involved the creation of fraudulent physical documents?

A. 60.7%

B. 49.3%

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 11
by Mary-Jo Kranacher
Dick Riley
Brian
Carpenter,

C. 52.9%

D. 42.2%

26. According to the ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse, remain the most frequent means by which occupational fraud is detected.

A. Internal audits

B. Management reviews

C. Tips

D. Account reconciliations

27. According to the ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse, the largest source of tips that fraud is occurring comes from:

A. Customers

B. Vendors

C. Shareholders

D. Employees

28. According to the ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse, employees caused median losses that were more than twice as large as those of employees.

A. Male; female

B. Female; male

C. Hourly; salaried

D. Salaried; hourly

29. When it comes to fraud loss amounts in organizations, the data shows that there is a direct correlation between loss and ________.

A. Average; perpetrator’s intelligence

B. Average; perpetrator’s position

C. Median; perpetrator’s intelligence

D. Median; perpetrator’s position

30. Although most cases in the ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse involved a single perpetrator, when two or more persons conspired, the median loss was more than times higher.

A. Two

B. Seven

C. Nine

D. Four

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 11
Brian
Carpenter,

31. According to the ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse, survey respondents were presented with a list of 17 common behavioral red flags associated with occupational fraud and asked to identify which, if any, of these warning signs had been displayed by the perpetrator before the fraud was detected. Rank the presence of the following four red flags in order of their prevalence from highest to lowest percentage of cases in which they were identified.

A. Living beyond means, financial difficulties, past-employment related problems, excessive pressure from within organization

B. Living beyond means, financial difficulties, wheeler-dealer attitude, unusually close association with vendor/customer

C. Living beyond means, financial difficulties, addiction problems, divorce/family problems

D. Living beyond means, financial difficulties, social isolation, complained about inadequate pay

32. According to the ACFE’s 2016 Report to the Nations on Occupational Fraud and Abuse, what percent of cases were perpetrated in companies with fewer than 100 employees?

A. 72.8%

B. 12.8%

C. 30.1%

D. 49.7%

33. Antifraud professionals logically conclude that small organizations are particularly vulnerable to occupational fraud and abuse. The results from fraud surveys bear this out: losses in the smallest companies were comparable to or greater than those in organizations with the largest number of employees. It is suspected that this phenomenon exists for two reasons.

A. Smaller businesses have fewer divisions of responsibility and there is a greater degree of trust where people know one another personally.

B. Smaller businesses employ fewer highly trained business managers and employees are less supervised.

C. Smaller businesses are more mission driven by nature and less inclined to formally orient new employees to their responsibilities.

D. Smaller businesses employ more people with a wheeler-dealer mindset and don’t solicit competitive bids as frequently.

34. Which three antifraud measures are associated with the largest reduction in median losses (though not among the most commonly implemented antifraud controls)?

A. Proactive data monitoring/analysis, management review, surprise audits

B. Proactive data monitoring/analysis, management review, fraud training for employees

C. Proactive data monitoring/analysis, management review, hotline

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 7 of 11

D. Proactive data monitoring/analysis, management review, code of conduct

35. 29.3% of respondents to the 2016 ACFE survey cited a lack of as the victim organizations’ primary issue that contributed to the fraudster’s ability to perpetrate the scheme.

A. Management review

B. Amoral corporate culture

C. Employee fraud education

D. Internal controls

36. A common complaint among those who investigate fraud is that organizations and law enforcement ___________________________________________.

A. Fail to understand the many ways in which fraud and other white-collar fraud can be perpetrated

B. Do not keep pace with the growing sophistication of fraud and other white-collar offenses

C. Do not do enough to punish fraud and other white-collar offenses

D. Are overwhelmed with other concerns to the extent that fraud and other whitecollar offenses are regarded as inconsequential in the grand scheme of things.

37. Regarding criminal prosecutions of occupational fraud and their outcomes, although the percentage of cases referred to prosecution gradually from the ACFE’s 2012 to the 2016 reports, the percentage of cases that prosecutors successfully pursued ___________.

A. Decreased; increased

B. Increased; decreased

C. Decreased; decreased

D. Increased; increased

38. One goal of the ACFE survey was to try to determine why organizations frequently decline to take legal action against fraudsters. In cases where no legal action was taken, the survey provided respondents with a list of commonly cited explanations and asked them to mark any that applied to their case. Which of the following was NOT one of the explanations cited by the survey’s participants?

A. Fear of bad publicity

B. Internal discipline sufficient

C. Lack of evidence

D. Credibility compromise

Module 6

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 8 of 11

39. Given that occupational fraudsters do not have distinguishing outward characteristics to identify them as such, the most effective way to catch a fraudster is to:

A. Set aside professional skepticism

B. Rely on your own value system

C. Think like one

D. Accept evidence without being critical of it

40. Professional skepticism can be broken into three attributes. Which one of the following is NOT one of those three attributes?

A. A commitment to persuasive evidence

B. A willingness to give others a presumption of goodwill until they prove otherwise

C. A questioning mind and a critical assessment of the evidence

D. A recognition that the plaintiff and/or the defendant may be masking the true underlying story

41. During the course of an investigation, you will encounter “loose threads” or “red flags” such as accounting anomalies. When encountering such anomalies, the fraud professional should:

A. Evaluate any personal biases that cause you to suspect fraud

B. Assume that it probably indicates dishonest conduct by someone in the organization

C. Pull on it and see what happens

D. Recognize that its mere existence is very likely proof of fraud

42. One of the best ways to ruin an investigation, fail to gain a conviction, or lose a civil case, is to:

A. Take disparate pieces of financial and non-financial data to tell a story of who, what, when, where, how, and why

B. Base investigative conclusions on logic and arguments that the defendant is a “bad person”

C. Connect the dots in a case consistent with the investigator’s interpretation of the evidence

D. Excessively rely on evidence, especially when the plaintiff has a clear track record of ethical conduct or is an upstanding community leader

43. To prove fraud, the investigator has to deal with the issue of:

A. Professional skepticism

B. Prior bad acts

C. Intent

D. Specific laws that were broken

44. The triangle of fraud action is composed of which three elements:

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 9 of 11

A. Incentive, opportunity, rationalization

B. Surveillance, invigilation, documentation

C. Devise a scheme, execute it, launder the proceeds

D. Act, concealment, conversion

45. In most occupational fraud cases, it is that there will be direct evidence of the crime.

A. Likely

B. Unlikely

C. Certain

D. Impossible

46. You are a fraud examiner or forensic accountant that is about to conclude an investigation. You have gathered evidence that will allow you to compellingly connect the who, what, when, where, and why dots in court. You are also reasonably certain there is additional evidence that will support your conclusions, but you have been unable to find any. In the world of fraud investigations, moving forward without such evidence is:

A. Not ethical

B. Not lawful

C. Not unusual

D. Not in conformity with ACFE investigative standards

47. Using the fraud theory approach to investigate a case, which step should be your first in an investigation?

A. Create hypotheses

B. Draw conclusions

C. Gather related data/evidence

D. Identify a specific law or laws that may have been broken

48. When using a hypotheses-evidence matrix to evaluate evidence in support of any particular hypothesis in a fraud case, it is crucial to understand that:

A. We can never prove any hypothesis

B. We can never disprove intent

C. We shouldn’t become distracted by the “direction” of evidence

D. We shouldn’t become distracted by evidence that seems to eliminate alternative hypotheses

49. There are essentially three tools available to fraud examiners, regardless of the nature of the fraud examination or forensic accounting investigation. Which of the following is NOT one of these three tools?

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 10 of 11

A. Skill in examining financial statement, books and records, and supporting documents

B. Interviewing skills

C. Preserving a crime scene from contamination

D. Observation (behavior, displays of wealth, specific offenses)

50. Using non-financial data to corroborate financial information is:

A. Powerful and its value cannot be overstated

B. Amateurish and used primarily by inexperienced investigators

C. Dangerous because it is usually misunderstood by juries

D. Acceptable on an extremely limited basis

51. Link charts, flow charts, commodity and money flow diagrams, timelines are:

A. Popular in the movies, but rarely used in the real world of fraud investigation

B. Useful during the hypothesis stage of an investigation but generally not beyond it

C. Important as both investigative tools and communication tools

D. Generally make complicated material less understandable because they leave too much room for speculation and interpretation compared to actual data

Module 7

52. is the totality of circumstances that lead a reasonable, professionally trained, and prudent individual to believe that a fraud has occurred, is occurring, and/or will occur. All fraud examinations must be based on it.

A. Postulation

B. Predication

C. Proposition

D. Premise

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
bank
by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 11 of 11
by Mary-Jo Kranacher
Dick Riley Test
written
Brian
Carpenter,

CHAPTER 2

Module 1

1. A number of theories about why the vast majority of people do not commit crime have been set forth over time. Which of the following is NOT one of the reasons cited in the text?

A. Social conditioning/parental upbringing

B. Fear of punishment

C. To act in a just and moral manner according to society’s standards

D. Desire for rewards

2. The term occupational fraud and abuse is defined as:

A. The use of one’s occupation for status enrichment through misuse or misapplication of the employing organization’s resources or assets.

B. The use of one’s occupation for personal enrichment through the unintentional misuse or misapplication of the employing organization’s resources or assets.

C. The use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of a different organization’s resources or assets.

D. The use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization’s resources or assets.

3. Four common elements to occupational fraud and abuse schemes were first identified by ACFE in its 1996 Report to the Nation on Occupational Fraud and Abuse. Which of the following does not contain all four elements?

A. The activity is clandestine, violates the employee’s fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, may or may not result in costs to the employing organization’s assets, revenues, or reserves.

B. The activity is clandestine, violates the employee’s fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, and is a violation of state and/or federal law(s).

C. The activity is clandestine, violates the employee’s fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, and costs the employing organization assets, revenues, or reserves.

D. The activity is clandestine, violates the employee’s non-fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, and costs the employing organization assets, revenues, or reserves.

4. The term white-collar crime was coined by in 1939, when he provided the following definition: crime in the upper, white-collar class, which is composed of respectable or at least respected, business and professional men.

A. Steve Albrecht

B. Edwin H. Sutherland

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 7

C. Joseph T. Wells

D. Donald R. Cressey

5. Organizational crime occurs when companies, corporations, not-for-profits, government bodies, and otherwise legitimate and law-abiding organizations are:

A. involved in unethical conduct

B. involved in organized crime

C. involved in a civil offense

D. involved in a criminal offense

6. Unfair pricing, unfair business practices, violation of the FCPA and tax evasion are examples of:

A. Ordinary corporate behavior

B. Occupational fraud and abuse

C. Organizational crime

D. More of a problem nationally than internationally

7. Civil litigation issues such as damage claims, lost wages, disability, wrongful death, assets and business valuations, costs and lost profits associated with construction delays or business interruptions, insurance claims, intellectual property infringement, environmental issues, tax claims are examples of the kinds of issues for which:

A. The RICO Act was adopted

B. Forensic litigation advisory services are offered by forensic accountants

C. The Sarbanes-Oxley Act was adopted

D. SAS99 was adopted

8. Money laundering, mail and wire fraud, criminal conspiracy and racketeering are examples of crimes associated with:

A. The fraud triangle

B. A private or civil wrong or injury, other than breach of contract, for which the law will provide a remedy in the form of an action for damages

C. Organized crime

D. Occupational fraud and abuse

9. Black’s Law Dictionary defines a tort as:

E. A private or civil wrong or injury, other than breach of contract, for which the law will provide a remedy in the form of an action for damages

F. An unlawful conduct of business affairs with funds derived from illegal acts

G. When two or more people intend to commit an illegal act and take some steps toward its implementation

H. Non-compliance with agency, regulatory, and court requirements

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by
L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 7
Brian

10. The legal standard for the tort of negligence does NOT include the following element:

A. Damages

B. Duty

C. Cause in Fact

D. Intent

11. A critical aspect of civil litigation for the forensic accountant and fraud examiner is the understanding that:

E. Both sides (plaintiff and defendant) are expected to tell their story

F. Both sides (plaintiff and defendant) are expected to present only facts in court

G. Both sides (plaintiff and defendant) are expected to countersue each other as a strategy

H. Both sides (plaintiff and defendant) are expected to negotiate a settlement

Module 2

12. In the fraud perpetrator profile presented in the text, which set of characteristics summarizes the typical fraud perpetrator?

A. Male, middle-aged to retired, with the company for five or more years, never charged or convicted of a criminal offense, well educated, accountant, upper management, or executive, generally acts in collusion with others

B. Male, middle-aged to retired, with the company for five or more years, previously charged or convicted of a criminal offense, well educated, accountant, upper management, or executive, acts in alone

C. Male, middle-aged to retired, with the company for five or more years, never charged or convicted of a criminal offense, well educated, line employee or lower management, or executive, acts in collusion with others

D. Male, middle-aged to retired, with the company for five or more years, never charged or convicted of a criminal offense, well education, accountant, upper management, or executive, acts alone

13. One of the interesting aspects of the characteristics of fraud perpetrators is that they do not typically have ______________.

A. Respect within their community

B. Much knowledge of accounting standards

C. A criminal background

D. A college degree

14. Edwin H. Sutherland (1883-1850), a criminologist, coined the term white-collar crime in 1939 and later developed the theory of whose basic tenet is that crime is learned.

A. Constructivist association

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 7

B. Fraud triangle association

C. Attributional association

D. Differential association

15. Donald R. Cressey (1919-1987) used his doctoral dissertation to study embezzlers, whom he called “trust violators.” Upon completion of his research, he developed what still remains as the classical model for the occupational offender. In 1991, Dr. Steve Albrecht organized Cressey’s three conditions into a tool that has become known as the “fraud triangle.” Which answer below constitutes the three legs of the fraud triangle?

A. Perceived opportunity, perceived motive, and intellectualization

B. Perceived pressure, perceived isolation, and rationalization

C. Perceived motive, perceived opportunity, and minimization

D. Perceived pressure, perceived opportunity, and rationalization

16. Cressey identified six categories of non-shareable financial pressures that prompted embezzlers to act. These included violation of ascribed obligations, business reversals, physical isolation, status gaining, employer-employee relationships, and ______________.

A. Financial greed

B. Problems resulting from personal failure

C. Depression or other mental health issues

D. Amoral value system

17. In Cressey’s view, there were two components of perceived opportunity necessary to commit a trust violation: and technical skill.

E. General information

F. Accounting know-how

G. Observed gaps in internal controls

H. Knowledge of financial fraud schemes

18. Fraud deterrence begins _______________.

A. In the existence of sound internal controls

B. In the organizational mission and values

C. In the employee’s mind

D. In the beliefs of the culture at large

19. When considering antifraud measures within an organization, the axiom that “fraud deterrence begins in the employee’s mind” most closely means that there has to be a _________________.

E. Perception of detection

F. Perception of punishment (if caught)

G. Perception of fairness within all levels of the organization

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 7

H. Perception of shared values within the organization

20. Findings in the ACFE’s 2016 Report to the Nations suggest that organizations that lacked were more susceptible to asset misappropriation schemes.

A. Employee perception of detection

B. A proper tone at the top

C. Internal controls

D. A reporting mechanism

21. Cressey observed that rationalization as it applies to occupational fraud occurs the crime.

A. After

B. Before

C. While

D. Seldom

22. One of the most fundamental observations of the Cressey study was the _____________, i.e., that the conditions under which a trust violation occurs necessitate all three elements (of what was later named the fraud triangle).

E. Conjuncture of events

F. Timing of events

G. Circumstances of events

H. Sequence of events

23. Findings in the ACFE’s 2016 Report to the Nations indicate that at least one warning sign had been displayed by the perpetrator before the fraud was detected in more than 91% of cases. In 57% of cases, two or more such red flags were seen. According to the study, the six most commonly observed behavioral red flags were: living beyond means, financial difficulties, unusually close association with a vendor or customer, a “wheeler-dealer” attitude, recent divorce or family problems, and ______________.

I. Control issues or unwillingness to share duties

J. Addiction problems

K. Irritability, suspiciousness, or defensiveness

L. Excessive pressure from within the organization

Module 3

24. While Dr. Steve Albrecht’s research findings on fraud perpetrator characteristics were very similar to the non-shareable problems and rationalizations identified by Cressey, Albrecht introduced the into the actions of the fraudsters.

A. The role of compensation

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 7

B. The role of the organization

C. The role of social isolation

D. The role of (an unfair) performance evaluation system

25. Dr. Steve Albrecht substituted for rationalization in the development of the “Fraud Scale.”

A. Emotional distress

B. Greed

C. Personal integrity

D. Sociopathic tendencies

26. In a 2004 CPA Journal article, Wolfe and Hermanson argue that the fraud triangle could be enhanced to improve both fraud prevention and detection by considering a fourth element, ________________.

A. Internal control environment

B. Myers-Briggs Personality Types

C. The role of arrogance

D. Individual capability

27. In 2010, Jonathan Marks argued for the role of in fraud.

A. Age

B. Myers-Briggs Personality Types

C. Arrogance (or lack of conscience)

D. Garden variety greed

28. Crowe expanded the fraud triangle into a pentagon by adding and ___________.

A. Compensation equity and cultural norms

B. Arrogance and competence

C. Myers-Briggs Personality Types and educational attainment

D. Internal control environment and organizational pressure

29. Significant research suggests that increasing may be the best way to deter employee theft.

A. The threat of punishment by the employer

B. The presence of internal security

C. The perception of detection

D. The frequency of fraud prevention education

Module 4

and Fraud
Ed.)
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 7
Test bank project for Forensic Accounting
Examination (2nd
by Mary-Jo Kranacher and Dick Riley Test bank written by Brian
Carpenter,

30. In addition to the fraud triangle, typical motivations of fraud perpetrators may be identified with the acronym M.I.C.E. This stands for money, ideology, _________, and ego/entitlement.

E. Coercion

F. Conversion

G. Collusion

H. Concealment

31. According to the AICPA, the “Achilles Heel” of an organization’s antifraud efforts is and ___________________.

A. An amoral corporate culture; an arrogant CEO

B. Missing internal controls; lack of management review

C. Collusion; management override

D. A weak board of directors; an arrogant CEO

Module 5

32. In contrast to the fraud triangle which US courts have deemed to be more of a theoretical concept rather than a set of measurable standards or a specific, practical methodology for arguing that fraud occurred, the triangle of fraud action can be used in developing prosecutorial evidence. In particular, the element of provides a compelling argument that the act was intentional.

A. The Act

B. Conversion

C. Opportunity

D. Concealment

33. The triangle of fraud action is sometimes referred to as _______________.

A. The fraud triangle

B. The elements of fraud

C. The fraud diamond

D. Crowe’s Fraud Pentagon™

7 of 7
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com

CHAPTER 3

Module 1

1. (75) One reality of what is known as the criminal justice funnel is:

A. Few cases result in convictions and incarcerations

B. A majority of cases result in convictions and incarcerations

C. Regulatory agencies play an important role in monitoring illegal activities

D. Civil and criminal cases cannot be pursued simultaneously

Module 2

2. (76) Individual rights are grounded in four amendments to the US Constitution associated with due process. Which of the following is not one of these four amendments?

A. The Fourth Amendment prohibits unreasonable searches and seizures

B. The Seventh Amendment which entitles the accused the right to a speedy trial

C. The Fourteenth Amendment entitles a person to due process of law and equal protections under the law

D. The Fifth Amendment provides that a person cannot be compelled to provide incriminating information against himself in a criminal case

3. (76) Regarding interviews conducted by a nonpublic entity and the Sixth Amendment, an employee:

A. Does not have a right to consult a lawyer prior to an interview but has a right to have one present during one

B. Does not have a right to have a lawyer present during an interview but has a right to consult one prior

C. Does not have a right to have a lawyer present or to consult one prior to the interview

D. Has a right to have a lawyer present during an interview and to consult one prior

4. (76) In order for a confession to be valid, it must be deemed to be:

E. Voluntary F. Coerced

G. Factual H. Sincere

5. (77) The overriding rule regarding searches and search warrants is that individuals have:

A. A right to not self-incriminate

B. An expectation of absolute privacy within their home or vehicle

C. A reasonable expectation of privacy

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 7

D. A right to privacy in the workplace (such as lockers, desks, etc.)

6. (77) A workplace search is considered reasonable under two circumstances: The search must be justified at its inception because it is likely to reveal evidence of work-related misconduct, and:

E. The search is necessary to further the investigation.

F. The search is necessary to satisfy a court order.

G. The search is necessary to preserve public order.

H. The search is necessary to operational efficiency.

7. (77) In the contexts of searches, the expression “fruit from the forbidden tree” means:

A. Any information derived from confidential informants cannot be introduced if the CI has a felony record.

B. Any information from evidence that was in “plain view” of law enforcement cannot be introduced.

C. Any information derived from voluntary consent to search cannot be introduced.

D. Any information derived from illegal evidence cannot be introduced.

8. (78) Surveillance is generally legal, however, once the investigator enters the realm of electronic (audio) surveillance, the laws become more complicated. Generally federal law prevents ________________________:

A. The interception and/or recording of wire, oral, or electronic communications except if it is collected by a certified fraud examiner (CFE) as part of a legitimate investigation.

B. The interception and/or recording of wire, oral, or electronic communications except if it is recorded in a public venue.

C. The interception and/or recording of wire, oral, or electronic communications except by law enforcement officers with a warrant.

D. The interception and/or recording of wire, oral, or electronic communications except if it is evidence of a class B or higher felony investigation.

9. (79) The Daubert standard is related to the admissibility of expert testimony (expert opinions). Under the Daubert standard, the trial judge makes an assessment of whether an expert’s scientific testimony is based on reasoning or methodology that is scientifically valid and can properly be applied to the facts at issue. Which of the following is NOT one of the considerations in determining whether the methodology is valid?

A. Whether the theory or technique in question can be used and has been tested.

B. Whether the theory or technique in question has been verified through a doubleblind study that includes a control group.

C. Whether the theory or technique has been subject to peer review and publication.

D. Whether the theory or technique has attracted widespread acceptance within a relevant scientific community.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and
Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 7
Mary-Jo
Dick

Module 3

10. (80) While grand juries have great leeway related to issuing subpoenas, the Fourth Amendment requires reasonableness. To meet the reasonableness standard, the subpoena must be likely to generate evidence that is:

E. Relevant to the issue under consideration, be particular and reasonably specific, and be limited to a reasonable time frame.

F. Relevant to the issue under consideration, be particular and reasonably specific, and be limited to class B felony (or higher) investigations.

G. Relevant to the issue under consideration, be particular and reasonably specific, and be based on a higher than average probability that a crime has been committed.

H. Relevant to the issue under consideration, be particular and reasonably specific, and must meet the Daubert standard.

11. (81) A search warrant has several advantages over a subpoena. Which of the following is NOT one of the advantages described in the text?

A. A warrant allows the holder of the warrant, not the target of the defense counsel, to decide which documents are relevant and must be produced.

B. A warrant avoids, but does not eliminate, the possibility of the destruction of evidence.

C. A warrant gives the investigator the ability to interview key witnesses while the search is being conducted.

D. A warrant gives the investigator the ability to seize any unlawful item that may be discovered in the search if it is part of a class B (or higher) felony.

Module 4

12. (81) Generally, evidence is admissible in court if it is relevant, its probative value outweighs any prejudicial effects, and:

A. It is trustworthy, meaning that it is presented by credible witnesses.

B. It is trustworthy, meaning that it is subject to examination and cross-examination.

C. It is trustworthy, meaning that it is fact based rather than opinion.

D. It is trustworthy, meaning that it is neutral in its impact on the jury.

13. (82) Even relevant evidence may be excluded from judicial proceedings if it is prejudicial, confusing, or ____________. A. Contradictory B. Material C.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 7
Misleading D. Inconclusive

14. (82) Prior to admissibility of evidence in court, the attorney must lay the foundation demonstrating relevance, materiality, and (reliability).

A. Validity

B. Competence

C. Probative value

D. Non-speculative

15. (82) You are testifying in a criminal trial where the CFO of a publicly traded company is accused of embezzling $2.7 million. Which of the following would be considered facts at issue?

A. A Panama Papers leak showing the existence of an offshore shell company account with the CFO listed as the beneficial owner.

B. Whether or not the CFO stole the money.

C. An email from the CFO directing the Head of Accounting to disregard the absence of invoices for purchases of “business consulting services” authorized by the CFO.

D. Documentation of special purpose entities created and controlled by the CFO that do not appear on the company’s balance sheet.

16. (82) Documentary evidence is at the heart of most fraud and forensic accounting investigations. Five considerations must be given to any piece of documentary evidence: The document must not have been forged, original documents are preferred, the document must not be hearsay or objectionable, the document needs to be authenticated, and the document must be _____________.

A. Illustrative (or summative)

B. Probative in value

C. Unbiased

D. Reliable

17. (82) The chain of custody protects against the of evidence as a result of investigators losing control of it.

A. Shredding

B. Possible corruption

C. Leaking

D. Unauthorized distribution

18. (82) Evidence is anything legally presented at trial to and convince a jury.

A. Link the facts at issue into a story

B. Explain or demonstrate the facts (such as a PowerPoint presentation)

C. Prove a contention

D. Secure a guilty verdict

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 7

19. (82) Evidence may be testimonial, real or demonstrative, or ______________.

E. Circumstantial or direct

F. Probative in value

G. Expert opinion-based (if admissible)

H. Sealed under the Foreign Intelligence Act of 1978

20. (82) Demonstrative evidence may include photographs, charts, diagrams, drawings, scale models, but because it is not real evidence it must not and it must not materially alter any significant aspect of the facts at issue.

A. Have been outside the chain of custody

B. Be speculative or conjectural

C. Raise doubts in the mind of the jury

D. Create prejudice

21. (82) The best evidence rule allows copies of documents to be presented at trial under:

A. No circumstance whatsoever

B. The rules of admissibility

C. Certain circumstances

D. Oath that the copy has been altered

Modules 5 & 6

22. (84) The primary purpose of a civil action is to:

E. Recover losses and possibly reap punitive damages

F. Redress criminal wrongdoing through incarceration

G. Reduce the case load in criminal courts

H. Restore societal faith in the court system

23. (84) is the process by which each side may explore the merits of the other side’s arguments by obtaining documentary and testimonial evidence.

A. No lo contendere

B. Cross examination

C. Discovery

D. Cease and desist

24. (86) A civil action requires a of the evidence, meaning that the evidence stacks up slightly more heavily on one side than the other. This contrasts with the criminal threshold of “ ____________________. ”

E. Preponderance; beyond a reasonable doubt

F. Predication; proof-positive

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 7

G. Probative evaluation; facts at issue

H. Proportionality; beyond any reasonable doubt

Module 7

25. (86) Basic (accounting) bookkeeping involves the recording, classifying, and summarizing of economic events in a logical manner for the purpose of providing accounting, financial, and information for decision making.

I. Nonfinancial

J. Factual

K. Investment

L. Complex

26. (86) In an audit or investigation, the antifraud professional must design to identify anomalies, investigate those anomalies, form and test hypotheses, and evaluate the evidence generated.

A. Statistical models

B. Algorithms

C. A spreadsheet with conditionally formatted cells

D. Procedures

Module 8

27. (93) An audit is performed to ensure that ___________________________________.

A. Reasonable assurance of SOX compliance can be attained by holders of a company’s stock.

B. The organization is complying with PCAOB, FASB, and AICPA accounting standards.

C. The financial statements are fairly presented and are free from material misstatement.

D. Financial fraud is not occurring within the organization.

28. (93) Professional skepticism entails three overlapping concepts: An attitude that includes a questioning mind and a critical assessment of audit evidence, conducting of the engagement that recognizes the possibility of material misstatement due to fraud, and with less-than-persuasive evidence.

A. Tentative acceptance

B. Professional tolerance

C. Dissatisfaction

D. Discarding documents

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 7

29. (94) The Sarbanes-Oxley Act of 2002 was signed into law to address corporate governance and accountability as well as public accounting responsibilities in improving the quality, reliability, integrity, and transparency of financial reports. Which of the following is NOT one of the measures the law aimed to accomplish?

A. Establishing higher standards for corporate governance and accountability

B. Creating an independent regulatory framework for the accounting profession

C. Establishing new protections for corporate whistleblowers

D. Diminishing fraud, waste and abuse among 501(c)(3) tax-exempt charities

30. (94) The Sarbanes-Oxley Act of 2002 authorized the SEC to issue implementation rules on many of its provisions intended to improve corporate governance financial reporting, and audit functions. Which of the following was NOT one of the rules summarized in the textbook?

A. New standards of professional conduct for attorneys

B. Certifications of legality by the owners of special purpose entities

C. Disclosures regarding a Code of Ethics for Senior Financial Officers and Audit Committee Financial Experts

D. Conditions for use of non-GAAP financial measures

31. (94) The fundamental purpose of the COSO ERM framework approach is to help entities ensure that they will be able to achieve their operational financial objectives and goals. Which of the following are NOT included in the framework?

A. Achieving high-level strategic goals and the entity’s mission

B. Effective and efficient use of the company’s operational resources

C. Safeguarding of company resources by preventing loss through fraud, theft, waste, inefficiency, bad business decisions, etc.

D. Whether realistic organizational goals and objectives are set

32. (105) The primary role of is to protect investors, create long-term shareholder value, ensure investor confidence and support strong and efficient capital markets.

E. Corporate governance

F. Certified Fraud Examiners and CPAs

G. The SEC, PCAOB and COSO ERM Framework

H. Wall Street analysts

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 7 of 7

CHAPTER 4

1. Known as “off-book” frauds, skimming schemes involve the theft of cash before it is recorded in the victim company’s books. As a result, __________________________.

A. Such schemes are typically used by corrupt CEOs/CFOs

B. It may be difficult to detect that money has been stolen

C. SOX standards impose stricter penalties on skimmers

D. Salespeople, tellers, and wait staff are obviously not the most likely candidates to skim funds because they need their jobs

2. A cashier at Pretty Good Shoes, Inc. sold a pair of shoes to a cash paying customer who did not wait for a receipt. Instead of ringing up the sale and placing the cash in the drawer, the cashier rang “no sale” and then pocketed the cash after the customer left. Which type of fraud strategy did the cashier utilize?

E. Skimming

F. Lapping

G. Filching

H. Layering

3. Perhaps the key to preventing sales skimming is to maintain a at any point where cash enters an organization.

I. Viable oversight presence

J. Dispersion of cash registers throughout the store

K. Continuous presence of management

L. Roster of trustworthy employees

4. One simple measure that makes it easy to detect off-hours sales is to compare the organization’s hours of operation to cash register _________________.

M. Same store daily average sales totals

N. Voided transaction totals

O. Beginning/ending cash in the drawer compared to daily deposit slips

P. User log-in/log-out time records

5. Skimming receivables requires than skimming sales.

Q. Less risk of detection

R. More opportunity

S. More effort

T. Less effort

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 6

6. You have been hired by the owner/CEO of Tread Lightly Tires, a family held private company in the automotive tire business, to investigate whether a back office receivables clerk has been skimming customer payments. Which of the following, if it exists, will greatly aid in your investigation?

U. Accurate inventory records

V. Surveillance footage from the cash register area

W. Whether the clerk has an unusually close relationship with one or more large vendors

X. A second set of books

7. As the bookkeeper for Somewhat Healthy Foods, Inc., Ted stole $250,000 over four years (using an intricate lapping scheme). In cases such as this, it is common for the perpetrator to have developed a reputation as a/an ________________.

Y. Substandard employee because they have a bad attitude and are disliked by coworkers

Z. Average employee because they do what they’re supposed to do, but will not go the extra mile or put in overtime if needed

AA. Model employee because they put in a lot of overtime and rarely take vacations

BB. Dangerous individual because they often threaten people around them

8. If the accounting duties associated with accounts receivable are properly so that there are independent checks of all transactions, skimming payments is very difficult to commit and very easy to detect.

CC. Regulated

DD. Separated

EE. Ordered

FF. Documented

9. Whereas skimming schemes involve the theft of ___________, cash larceny schemes involve the theft of money ___________.

GG. Checks only; and checks

HH. Off-book funds; that has already appeared on a victim company’s books

II. Cash at the point of sale; during the bookkeeping process

JJ. Company assets; with criminal intent

10. In the occupational fraud setting, a cash larceny may be defined as the without the consent and against the will of the employer.

KK. Intentional taking away of an employer’s cash

LL. Theft of more than $1,000 (in either currency or checks)

MM. Skimming of cash before it hits the company’s books

NN. The theft of more than $10,000 (in either currency or checks)

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 6

11. A large percentage of cash larceny schemes occur at the point of sale because ______________.

OO. Skimming, by comparison, is much more difficult

PP. It is easy to conceal

QQ. Low level employees are typically less honest than management

RR. That’s where the money is

12. If a retail cashier perpetrates larceny, there will be an imbalance between the and the .

SS. Register tape; cash drawer

TT. Register user log-in/log out records and store hours

UU. Cash drawer; bank deposit slips

VV. Register sales; store’s inventory

13. In point of sale cash larceny schemes, several methods are used by fraudsters to conceal their thievery. These include thefts from other registers, death by a thousand cuts, reversing transactions, altering cash counts or register tapes, and _________________.

WW. Padding the perpetual inventory

XX. Volunteering to work overtime and rarely taking vacations

YY. Appearing to be a model employee

ZZ. Destroying register tapes

14. Most cash larceny schemes only succeed because of a lack of ____________.

AAA. Qualified people

BBB. Internal controls

CCC. Training

DDD. Trust (in the organization)

15. Not all cash larceny schemes occur at the point of sale. Larceny of receivables is generally concealed through one of three methods: force balancing, reversing entries and _____________.

EEE. Thefts from other registers

FFF. Skimming

GGG. Destruction of records

HHH. Appearing to be a model employee

16. Within the context of concealing larceny, adjusting customer accounts with unauthorized “courtesy discounts” is an example of _____________.

III. Reversing entries

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and Dick Riley Test bank written by
L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 6
Mary-Jo
Brian

JJJ. Destruction of records

KKK. Force balancing

LLL. Shrinkage

17. Within the context of concealing larceny, making unsupported entries in the company’s books to produce a fictitious balance between receipts and the ledger is an example of:

MMM. Destruction of records

NNN. Force balancing

OOO. Lapping

PPP. Reversing entries

18. The most important factor in preventing cash larceny from deposits is ______________.

A. Separating duties

B. To hire honest people

C. Entrusting new employees

D. Requiring the person who prepares the deposit to also receive and log incoming payments

19. A key anti-fraud control in preventing/detecting deposit larceny and lapping is:

E. Placing surveillance cameras at each point of sale

F. Assigning unique ID numbers to cashiers

G. Prohibiting deposits from being made in night drops

D. Itemizing deposit slips

20. In general, noncash misappropriations fall into one of the following categories: misuse, unconcealed larceny, asset requisitions and transfers, purchasing and receiving schemes, and _______________.

E. Vendor fraud

F. Deposit larceny

D. Fraudulent shipments

E. Bribery and corruption

21. There are essentially two ways a person can misappropriate a company asset: the asset can be ____________, or it can be _______________.

A. Misused; stolen

B. Misclassified in inventory; “borrowed”

C. Misstated (on the balance sheet); concealed altogether

D. Misdirected to a shell company; deposited in an offshore account

22. Most noncash larceny schemes are not very ____________.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
CFE (989) 205-4182
4 of 6
by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD,
Brian@BrianLCarpenter.com

E. Logical

F. Easy to perpetrate

D. Complicated

E. Easy to prevent/detect

23. To prevent larceny of noncash assets, the duties of requisitioning, purchasing, and the assets should be segregated.

F. Inventorying

G. Classifying

H. Tagging

D. Receiving

24. When inventory is stolen, the key concealment issue for the fraudster is _________.

A. Shrinkage

B. Removing the stolen inventory from the premises

C. Trust

D. Physical access (to secure areas)

25. While inventory shrinkage may be a red flag that fraud is occurring, it is not _______________.

E. An indicator with which management should be overly concerned

F. A reliable indicator of anything other than normal business fluctuations

G. An unambiguous signal

H. An anomaly

26. One of the simplest methods for concealing shrinkage is to change the inventory record so that it matches the inventory count.

I. Warehouse; sales floor

J. Digital; manual

K. Perpetual; physical

L. Inspection of the; random

27. inventory and other assets is a relatively common way for fraudsters to remove assets from the books before or after they are stolen.

A. Writing off

B. Fictitious sales of

C. Simply walking off with

D. False shipments of

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test
written
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 6
by Mary-Jo Kranacher
Dick Riley
bank
by Brian
Carpenter,

28. To prevent fraudulent shipments of merchandise, organizations should make sure that every is matched to an approved before the merchandise goes out.

E. Transaction; system

F. Warehouse worker; supervisor of shift leader

G. Sales record; order form

D. Packing slip; purchase order

29. A significant increase in could indicate an inventory theft scheme.

E. Warehouse employee turnover

B. Scrap levels

C. Changing usual vendors

D. Perpetual inventory

30. Assets should be removed from operations only with _______________.

E. The proper authority

F. An internal auditor’s approval

G. Verification of perpetual inventory

H. Proper adjustments to journal entries

31. In the purchasing function, it is important to separate the duties of requesting (requisitioning) goods, ordering goods, receiving goods, maintaining perpetual inventory records, and _______________.

I. Verifying of physical (against the perpetual) inventory

J. Executing purchasing

K. Spot checking supporting documents

D. Issuing payments

6 of 6
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com

CHAPTER 5

1. In a ____________________, the perpetrator uses false documentation such as an invoice, purchase order, or credit card bill to cause his employer to issue payment for some fraudulent purpose.

A. False documentation scheme

B. Billing scheme

C. Skimming scheme

D. Corruption scheme

2. Billing schemes generally fall into one of three categories: shell company schemes, nonaccomplice vendor schemes, and _______________.

A. Personal purchases schemes

B. Check writing schemes

C. Skimming schemes

D. False documentation schemes

3. One basic fraud detection approach is to run a computer query that compares to the in the accounts payable system.

E. Names of vendors; shell company invoices

F. Invoices; purchase orders

G. Employees’ home addresses; addresses of vendors

H. Employee names; payment authorizers

4. Those with the authority to approve purchases would be among the most likely to engage in since they have fewer hurdles to overcome than other employees.

I. Personal purchases schemes

J. Skimming schemes

K. False documentation schemes

L. Billing schemes

5. A primary purpose of is to prevent any one person from having too much control over a particular business function.

A. Separating duties

B. Conducting criminal history checks of employees

C. Oversight and supervision

D. Antifraud training

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 7
Mary-Jo

6. Many times, shell companies schemes involve the purchase of services rather than goods such as “consulting services.” Why is this?

E. Because services have no fixed market price, it is harder to compare value.

F. Because services are often authorized by organizational management, no one questions them.

G. Because services are not tangible, it is more difficult to confirm or deny their receipt.

H. Because services are non-durable, it is more difficult to capitalize them.

7. A subcategory of shell company schemes in which actual goods or services are sold to the victim company are known as pass through-schemes because:

I. The perpetrator has to devise a way to add value to actual goods and services before they pass through to the victim company.

J. The perpetrator has to pass through customs to place stolen funds in offshore bank accounts.

K. The perpetrator has to pass through several layers of internal controls to make the fraud work.

L. The perpetrator purchases actual goods and services which simply pass through a shell company to the victim company at inflated prices.

8. One of the best ways to prevent and detect shell company schemes is to maintain and regularly update a list of:

M. Known shell companies in order to compare names of vendors with it.

N. Approved vendors that should be verified by someone independent of the purchasing function.

O. Offshore banks whose routing numbers can be compared to vendor bank accounts (using the endorsements on cashed checks).

P. Purchases by employees that have no purchasing authority (because no one suspects them).

9. One common red flag useful in detecting fraudulent invoices is.

Q. The often poor printing/formatting quality used

R. A lack of detail

S. A disproportionate cost relative to the services rendered

T. An unanticipated/inexplicable vendor discount

10. Sally was a secretary/assistant bookkeeper at a local non-profit food pantry. Part of her duties included opening mail, processing invoices, and authorizing payments. She used her position to intentionally pay some bills twice, then requested that recipients return one of the checks which she then intercepted and subsequently deposited into her own bank account. Sally’s scheme is known as a:

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 7

U. Double-bill and intercept scheme

V. Pay-and-return scheme

W. Pass-through scheme

X. Forged maker scheme

11. Prevention of nonaccomplice vendor invoicing schemes is largely dependent on:

A. Purchasing functional controls

B. Hiring honest employees

C. The competence of internal auditors

D. Regular ethics training

12. Dr. Rudding was superintendent of a charter school. Because of his responsibilities, the school issued a credit card to him to use when making certain kinds of purchases (such as travel expenses while on school business). Over time, Dr. Rudding perceived that no one on his board was reviewing the credit card statements, nor was he questioned by anyone in the business department, so he began using the card to fill up his own car, buy coffee on the way to work, and take his wife out to fine dining restaurants. The kind of fraud that Dr. Rudding committed is known as a:

E. Pay-and-return scheme.

F. Pass-through scheme.

G. Shell company scheme.

H. Personal purchasing scheme.

13. The most important step in preventing credit card fraud is ____________________:

A. Conducting thorough review of each credit card statement.

B. Requiring users to obtain a purchase order prior to using the card.

C. Spot checking receipts for appropriateness.

D. Implementing a policy that prohibits users from making personal purchases with company cards.

14. There are five principal methods use to commit check tampering. Which of the following is NOT one of the five?

E. Forged maker schemes

F. Forged endorsement schemes

G. Shell company schemes.

H. Authorized maker schemes.

15. Jed is an accounts payable clerk for a mid-sized office supply company. Although he has access to check stock, he is not a signer. One day he decided to “borrow” some company money to cover some past-due personal bills by forging his boss’s signature on a company check. One of Jed’s biggest challenges will likely be:

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 7

I. Facing prosecution if he gets caught.

J. Concealing the forged check from the company.

K. Producing a reasonable facsimile of his boss’s signature.

L. Whether to make the check payable to himself or his wife (using her maiden name).

16. A key to preventing check forgeries is to maintain a strict stet of procedures for the handling of outgoing checks, which include safeguarding blank check stock, establishing rules for custody of checks that have a been prepared but not signed, and

A. Separating the duties of check preparation and check signing.

B. Using a signature stamp or mechanical signer.

C. Making checks payable to “Cash”

D. Requiring check signers to reconcile the bank statement

17. A scheme whereby an employee intercepts a company check intended for a third party and converts the check by signing the third party’s name on the endorsement line is known as a fraud.

E. False purchase requisition

F. Pay-and-return

G. Intercept and conversion

H. Forged endorsement

18. One of the most common breakdowns of internal controls in forged endorsement fraud is:

I. “Rubber stamp”/inattentive supervisors that sign checks without proper scrutiny.

J. Making checks payable to “cash.”

K. Failing to secure blank check stock under lock and key.

L. Returning the signed check to the employee that prepared it.

19. When organization bank statements are reconciled, double endorsements on checks should always raise suspicions, particularly when the second signer is ______________.

A. An employee of the organization

B. A relative of a vendor company key employee

C. A signature stamp or an automated signature

D. A ghost employee

20. James Dunham was the CEO at a small non-profit ministry dependent on donor contributions that sent medical doctors and supplies to Haiti. The name of the non-profit was “Limye Medical Missions” (Limye means light in Haitian Creole). Eventually, the board received a tip from an employee that James had been stealing money from the organization. The investigation revealed that the way James did this was to direct his office staff to place the mail unopened on his desk each day. When James returned from lunch, he entered his office and locked his door and sorted the mail. He placed

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 7
by Mary-Jo Kranacher
Dick Riley
Brian
Carpenter,
__________:

contributions into two stacks. One stack contained only checks that were made payable to Limye Medical Missions. These were deposited in the ministry’s bank account. The other stack contained checks made payable simply to, “Limye.” To these checks, James simply added the words “and Friends, Inc” on the payee line. The latter were then deposited by James into a shell company bank account called Limye and Friends. The type of check tampering scheme used by James is known as a scheme:

E. Fraudulent payee

F. Tacking on

G. Payments diversion

H. Forged endorsement

21. Most successful altered payee schemes occur when the person who prepares checks also has:

A. Access to those checks after they have been signed.

B. A knowledge of offsetting debits and credits.

C. A perceived pressure and a perceived opportunity.

D. An unusually close relationship with one or more company vendors.

22. In almost all successful altered payee schemes, the perpetrator was able to prepare checks and __________________.

E. Approve invoices for payment

F. Forge the maker’s signature reasonably well

G. Cash them at a local bank without any suspicions

H. Reconcile the bank statement

23. The most basic way an employee accomplishes an authorized maker scheme is to:

I. Have authority to approve purchases as well as maintain the general ledger.

J. Forge the signature of an authorized signer.

K. Override controls designed to prevent fraud.

L. Appear to be a model employee.

24. Which of the following represents the three main categories of payroll fraud?

A. Ghost employee schemes, falsified hours and salaries schemes, commission schemes.

B. Forged maker schemes, forged endorsement schemes, and personal expense schemes.

C. The act, concealment and conversion

D. Check tampering, erasable ink, and intercepted check schemes

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
Test
L.
CFE (989) 205-4182
5 of 7
by Mary-Jo Kranacher and Dick Riley
bank written by Brian
Carpenter, PhD,
Brian@BrianLCarpenter.com

25. For a ghost employee scheme to work, four things must happen: (1) the ghost must be added to the payroll, (2) timekeeping and wage rate information must be collected and submitted for processing, (3) a paycheck must be issued to the ghost, and (4):

A. The check must be delivered to the perpetrator or accomplice.

B. Income tax withholding must be filed in the name of the ghost.

C. An accomplice of the fraudster must cash the check.

D. At least three after-hours specter sitings on company property must have been independently reported in the previous pay period

26. Regardless of how hiring of new employees is handled within a business, it is that are in the best position to put ghosts on the payroll.

E. The CEO and CFO

F. The person or persons with authority to add new employees

G. Perpetrators of occupational fraud

H. Supervisors

27. There are four methods by which employees typically abuse the expense reimbursement process. Which of the following is NOT one of these?

I. Mischaracterized expense reimbursements

J. Multiple reimbursements

K. Extravagant expense reimbursements (e.g., flying first class instead of coach)

L. Overstated expense reimbursement

28. In preventing and detecting overstated expense reimbursement schemes, it is particularly important that the organization require:

M. Employees to submit itineraries or travel agency receipts

N. Employees to report their expenses accurately

O. Copies of credit card statements

P. Original receipts for all expense reimbursements

29. There are a number of red flags that may indicate an employee is seeking reimbursement for fictitious travel and entertainment expenses. One of the most common is the employee who claims items particularly high dollar items were paid for _________:

Q. Without obtaining a receipt

R. In cash

S. Purportedly for business but are actually personal

T. With another employee’s P-card

30. An organization’s accounting system should be set up to that are coded as travel and entertainment expense.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 7
by Mary-Jo Kranacher
Dick Riley
Brian
Carpenter,

A. Flag duplicate payment amounts

B. Require original credit card statements in lieu of receipts for expenses

C. Run an automatic Benford analysis on all expenses (especially on 0’s and 5’s)

D. Closely scrutinize expenses

31. Fraudulent cash register disbursement schemes differ from cash register skimming and larceny in that when the money is taken from the cash register:

E. It is always a collusive act involving an employee and an accomplice.

F. It is recorded on the register tape.

G. It results in a credit to inventory because the merchandise was not actually returned.

H. It leaves the victim company’s books in balance.

32. There are two methods that perpetrators who commit fraudulent register disbursements use to impede detection. These are:

I. Model employee and rarely takes vacations.

J. Steal inventory equal to the disbursement and adjusting the perpetual inventory records.

K. Small disbursements and destruction of records.

L. Post a credit to perpetual inventory records and take part in the physical count.

33. The best way for organizations to prevent fraudulent register disbursements is to always maintain

M. A policy permitting cashiers to have access to the register control key.

N. Appropriate separation of duties.

O. Hidden camera surveillance of all cash register areas.

P. Cashier authority for reversing their own transactions (but no one else’s).

Test bank project for Forensic Accounting and Fraud Examination (2nd
205-4182
7 of 7
Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989)
Brian@BrianLCarpenter.com
___________________________:

CHAPTER 6

1. In the ACFE Fraud Tree, corruption schemes are broken down into four classifications. Which of the following is NOT one of the four?

A. Bribery

B. Bid rigging

C. Economic extortion

D. Conflict of interest

2. Offering, giving, receiving, or soliciting anything of value to influence an official act is the definition of:

A. Bribery

B. Economic extortion

C. Bid rigging

D. Illegal gratuity

3. The key difference between bribery and commercial bribery is that in cases of commercial corruption:

E. Something of value is offered to influence to a government agent in order to influence a business decision

F. Something of value is offered to reward a transaction rather than influence it

G. Something of value is offered to influence a business decision rather than an official act of government

H. Something of value is offered to reward a government decision rather than to influence it

4. Conflicts of interest are essentially different from bribery, illegal gratuities, and economic extortion cases in that a conflict of interest occurs when an employee, manager, or executive, has ________________________________.

A. An undisclosed economic or personal interest in a transaction that adversely affects the organization.

B. A relative with less than two degrees of consanguinity serving on the organization’s board of directors.

C. Materially benefited from a business transaction whose profits should have gone to his/her organization.

D. An officer/director position on the board of another company with which the employing organization does business (e.g., purchasing insurance)

5. Bribery schemes generally fall into two broad categories:

E. Governmental acts and commercial decisions

F. Conflict of interest and self-dealing schemes

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 7

G. Kickbacks and bid-rigging schemes

H. Bribery and corruption schemes

6. In a kickback scheme, the funds come directly from:

A. The victim company

B. A nonaccomplice vendor

C. An accomplice vendor

D. Employees with purchasing authority

7. Internal auditors for Stuff You Need for Your House, Inc., uncovered what appears to be a kickback scheme amounting to some $30,000 in over-billing by a vendor in the previous 18 months. The company has contacted you to investigate the fraud in order to identify the perpetrator(s). All things being equal, which of the following employees is likely to be involved?

A. The purchasing manager

B. A ghost employee

C. The warehouse manager

D. The head of accounts receivable

8. Ted is Director of External Affairs for a large pharmaceutical company. Part of his responsibilities include coordinating the company’s national lobbying efforts in order to create more favorable business conditions for the operations of its six regional distribution centers. If Ted decides to create a slush fund with company money in order to provide bribes and gratuities for legislators and others, which way would he most likely use to generate the necessary money for the slush fund?

E. Use cash from falsified travel and entertainment expenses

F. Divert funds from nonaccomplice vendors engaged in overbilling schemes

G. Approve the formation of an offshore shell company through an entity such as Mossack Fonseca

H. Divert funds to lobbyists through invoices for “consulting fees,” “referral fees,” “commissions,” or the like

9. By regularly monitoring the prices paid for good and services as compared to market rates, which type of fraud is an organization trying to detect?

I. Gouging schemes

J. Kickback schemes

K. Commission schemes

L. Bribery schemes

10. Because any examination of a kickback scheme will likely necessitate a review of the corrupt vendor’s books, all contracts with supplies should contain a clause.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and Dick Riley Test bank written by
L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 7
Mary-Jo
Brian

M. “right to independent counsel"

N. “right to terminate without cause”

O. “right to audit”

P. “right to be reimbursed for kickbacks”

11. is a process by which several bidders conspire together to split up contracts and ensure that each gets a certain amount of work.

Q. Bid phishing

R. Bid pooling

S. Bid peaking

T. Bid conspiring

12. Payments to offshore bank accounts in cash or by wire; undocumented business entertainment expenses; unusual payments for commissions, loans, temporary employees and directors’ fees are red flags associated with possible:

U. Shell company schemes

V. Bid rigging

W. FCPA violations

X. Economic extortion

13. The UK Bribery Act parallels the FCPA in many aspects, however, one key difference is that the former provides no exception for ________________________.

A. Facilitating payments (for things such as obtaining permits)

B. UK citizens acting outside of the UK

C. Bribery of public officials

D. An unduly complex legal or banking structure

14. Illegal gratuities are similar to bribery schemes except there is not necessarily:

E. A code of ethics violation for most companies and government employees

F. Economic extortion

G. Intent to influence a particular business decision

H. A cash payment

15. Economic extortion is basically the flip side of a bribery scheme.

I. Instead of an illegal gratuity, the payment comes with an explicit or implied threat to harm the vendor unless they capitulate to demands.

J. Instead of a vendor offering a payment to an employee to influence a decision, the employee demands a payment from a vendor in order to make a decision in that vendor’s favor.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 7

K. Instead of a private company, the payment comes with an explicit or implied threat to harm a government employee unless they capitulate to demands.

L. Instead of cash, “rewards” such as free international vacation may be used.

16. The majority of conflict of interest schemes fit into one of two categories:

A. Purchasing schemes and sales schemes

B. Bribery and illegal gratuities

C. Conflict of interest and economic extortion

D. Kickback and “pay it forward” schemes

17. The majority of conflict schemes are:

E. Not necessarily tied to an economic interest

F. Undisclosed

G. Purchasing schemes

H. Sales schemes

18. The majority of conflict schemes are schemes, and the most common of these is the scheme.

I. Billing; extortion

J. Undisclosed; purchasing

K. Purchasing; billing

L. Sales; gratuities

19. Not every false billing scheme is categorized as a conflict of interest. For a scheme to be classified as a conflict of interest:

M. The relationship with the vendor company has to be disclosed in advance unless the cost of goods are cheaper.

N. The employee (or a friend or relative of the employee) must have some ownership or employment interest in the vendor that submits the invoice.

O. The employer has an undisclosed conflict of interest in one or more a shell companies.

P. The fraudster’s intent is unlawful in a conflict of interest scheme, whereas in a false billing scheme, they are merely unethical.

20. Shell company schemes are classified as:

Q. Economic extortion

R. Undisclosed relationship schemes

S. False billing schemes

T. Conflict of interest schemes

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 7
Mary-Jo

21. A short rule of thumb that can be used to distinguish between overbilling schemes that are classified as asset misappropriations and those that are conflicts of interest: if the bill originates from a in which the fraudster has an economic or personal interest, and if the fraudster’s interest in the company is undisclosed to the victim company, then the scheme is a conflict of interest.

A. Real company

B. Shell company

C. Offshore bank

D. Nonaccomplice vendor

22. A board member of a school voted in favor of the school doing a bond issue to acquire a multi-million-dollar piece of property for a future campus. It was later discovered that the board member’s wife had part-ownership in the property, a fact that the board member never disclosed to the school. What kind of fraud scheme did the board member perpetrate?

A. A conflict of interest scheme

B. A false billing scheme

C. A bid rigging scheme

D. A duty of care scheme

23. Bob was CFO for a chain of Lucky Clucky chicken franchises owned by Tim. By virtue of Bob’s position as CFO, he knew that Tim was planning to open another store in a particular location. Bob hurriedly created a shell company using his wife’s maiden name as the beneficial owner and then purchased the location. The shell company then resold the property to Tim’s company a few weeks later for a greasy little profit of $172,000. What kind of purchasing scheme did Bob commit?

E. A business diversion scheme.

F. None. It’s a free market.

G. A resource diversion scheme.

H. A turnaround sale

24. are violations of the rule that a fiduciary, agent, or employee must act in good faith, with _______________, in the best interest of the principal or employer.

A. Conflict of interest schemes; full disclosure

B. Purchasing schemes; clear intent

C. Shell company schemes; full transparency

D. Ethical lapses; proper duty of care

25. To detect conflicts of interest, organizations should concentrate on establishing to receive tips and complaints.

E. A whistle-blower protections policy

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 7
Mary-Jo

F. Robust internal controls

G. An anonymous reporting mechanism

H. A segregation of duties policy

26. In any antifraud effort, we must always keep in mind that will deter occupational fraud; we must attack the problem _________________.

I. Nothing can ultimately; from a psychological point of view

J. Fostering trust in employees; with a presumption of goodwill

K. No one factor; on several fronts

L. It is people who will ultimately; through anti-fraud training and internal controls

27. The deterrence of occupational fraud and abuse begins in the _______________.

M. Classroom

N. Implementation of sound internal controls

O. Hiring process

P. The employee’s mind

28. There are at least six positive steps that organizations can employ to increase the perception of detection: employee education, proactive fraud policies, a higher stance, increased use of analytical review, surprise audits where feasible, and _____________.

Q. Anti-fraud messaging (such as posters) displayed throughout the organization

R. Adequate reporting programs

S. Foster a climate of trust

T. Prosecute offenders

29. Fraud reporting programs should emphasize at least six points: fraud, waste, and abuse occur at some level in nearly every organization; this problem cost jobs, raises, and profits; the organization actively encourages employees to come forward with information; there are no penalties for furnishing good-faith information; there is an exact method for reporting, such as a telephone number or address; and ________________.

U. Incentives offered for information leading to successful prosecution of fraudsters

V. Mandatory participation in regular anti-fraud training

W. A report of suspicious activity does not have to be made to the employee’s immediate supervisor

X. Adequate compensation (to deter wages in kind motivated frauds)

30. According to the ACFE’s Report to the Nations, _________________________(i.e., employees, vendors, customers, and anonymous individuals) are the most common means by which occupational fraud is detected.

Y. Surprise audits of

Z. Tips from various sources

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and
Riley Test bank written by
L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 7
Mary-Jo
Dick
Brian

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com

AA. Confessions by individuals

BB. Red flags observed among

7 of 7

CHAPTER 7

1. Among the factors associated with financial statement fraud, the most common is pressure on upper management to ______________.

A. Comply with PCAOB regulations

B. Show earnings

C. Manage board relationships

D. Increase market share

2. There are three main groups of people who commit financial statement fraud. In descending order of likelihood of involvement, they are as follows: Senior management, mid- and lower-level employees, and ___________________.

A. Organized criminals

B. Government bureaucrats

C. Directors and officers of governing boards

D. Employees with purchasing authority

3. According to a 2010 study of 347 financial statement frauds from 1998 to 2007 conducted by the Committee of Sponsoring Organizations of the Treadway Commission (COSO), is the group most likely to commit financial statement fraud.

E. Publicly traded companies

F. Privately held enterprises

G. Senior management

H. Organized criminals

4. Senior managers and business owners may “cook the books” for any of several reasons: to conceal true business performance, to preserve personal status/control, and to __________________________.

I. Deceive stockholders

J. Comply with PCAOB-mandated income targets

K. Maintain personal income/wealth

L. Get revenge on the organization (e.g., wages in kind)

5. In FRF, senior management may business performance to meet certain objectives.

M. Destroy accounting records that reflect

N. Frame another employee as a fraudster to conceal their own

O. Delay the production of financial reports that show actual

P. Overstate or understate

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 7

6. There are three general ways in which fraudulent financial statements can be generated: playing the accounting system, beating the accounting system, and ____________________.

Q. Inverting the accounting system (i.e., intentionally reversing debits and credits)

R. Claiming to have no knowledge of fraudulent transactions in the accounting system

S. Coercing employees who control the accounting system

T. Going outside the accounting system

7. Using data spanning 2002-2013 from the ACFE Report to the Nations on Occupational Fraud and Abuse, and made available through the Institute for Fraud Prevention (IFP), the authors examined private company FRF cases in comparison to those at public companies and found several key differences. These included the observation that a stronger antifraud environment in public companies appears to lead public company FRF perpetrators to use perhaps to make the fraud less obvious, rather than other fraud schemes such as fictitious revenues.

U. Off balance sheet liabilities

V. Bribery and illegal gratuities

W. Timing differences

X. Classifying expenditures as assets

8. The premise of the is that the activity of a business enterprise should be kept separate and distinct from its owners and other business entities.

Y. Monetary unit

Z. Going concern

AA. Economic entity assumption

BB. Periodicity principle

9. Fraud, in the going-concern context, usually results from attempts by an entity to _____________________.

CC. Overstate/understate its assets

DD. Conceal its terminal business condition

EE. Establish a sales value for the asset without selling it

FF. Conceal the existence of special-purpose entities (SPEs)

10. Fraud can occur when purposeful attempts are made to manipulate the concept. For example, through controlling the year-end cut-off in financial figures, many companies boost their current net income by counting revenue from the following year early, and by delaying the post of this year’s expenses until the following year.

A. Matching

B. Periodicity

C. Historical cost

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 7
Mary-Jo

D. Transparent disclosure

11. Many major financial frauds have resulted from the purposeful omission of in the financial statements.

E. Periodicity

F. Note disclosures

G. Conflicts of interest

H. Net realizable value (NRV) of assets

12. Materiality, according to GAAP, is a concept.

A. User-oriented

B. Transparency

C. Universal

D. Regulatory

13. An example of in accounting is the use of the rule as it relates to inventory valuation. That simply means that if a company paid one dollar for a widget and at a later date the price fell fifty cents, the lower of those two prices should be carried on the balance sheet; the resulting price fall should then be recorded on the income statement. If a company’s financial statements violate the constraint, they could be fraudulent.

E. Transparency; “matching;” transparency

F. Periodicity; “smoothing earnings;” periodicity

G. Conservatism; “lower of cost or market”; conservatism

H. Materiality; “net present value;” materiality

14. If a company changes the way it keeps its books from one year to the next, and if these changes have a material impact on the financial statements, they must be disclosed in a note. Fraud occurs when is intentionally avoided to show false profits.

A. Consistency

B. Net realizable value

C. Relevance

D. Clarity

15. Financial statements are the responsibility of company ____________.

E. Bookkeepers

F. Shareholders

G. Management

H. External auditors

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 7

16. Financial statement fraud schemes are most often perpetrated against financial statements by management.

I. Publicly traded companies that are required to prepare

J. PCAOB regulations pertaining to

K. GAAP requirements for preparation of

L. Potential users of

17. The term financial statement includes almost any financial data presentation prepared according to or another __________________.

M. The CEO’s reasonable interpretation; officer within the company

N. Generally accepted accounting principles; comprehensive basis of accounting

O. A professional auditor’s opinion; legitimate source of accounting expertise

P. SEC rulings; regulatory body such as the PCAOB

18. Financial statement frauds can be broken down into five distinct categories: concealed liabilities and expenses, _______________, improper asset valuations, improper disclosures, and timing differences.

A. Fictitious revenues

B. Senior management fraud

C. Materiality

D. Inflated inventory

19. is defined as the use of deliberate misstatements or omission of amounts or disclosures of financial statements to deceive financial statement users, particularly investors and creditors.

E. “Earnings management”

F. Financial statement fraud

G. Defalcation

H. Irrelevancy

20. in the quality and reliability of financial statements, caused by alleged fraudulent activities, is the most damaging and costly effect of financial statement fraud.

I. Increased instances since 2000 of material misrepresentations

J. Worldwide decline in market capitalization can be observed

K. Loss of public confidence

L. Increased regulatory compliance costs

21. Which of the following categories of harm resulting from fraudulent financial statements was NOT presented in the text?

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 7

M. It jeopardizes the integrity and objectivity of the auditing profession.

N. It makes the capital markets less efficient.

O. It results in huge litigation costs.

P. It increases taxpayer costs for corrections as a result of white collar convictions.

22. schemes involve the recording of sales of goods or services that did not occur.

Q. Bribery and corruption

R. Matching

S. Disclosure

T. Fictitious or fabricated revenue

23. Generally speaking, revenue is recognized when it is realized or realizable and _____________.

U. Recorded

V. Received

W. Invoiced

X. Earned

24. are a form of fictitious revenue scheme in which a sale is booked even though some terms have not been completed and the rights and risks of ownership have not passed to the purchaser.

Y. Off balance sheet liabilities

Z. Sales with conditions

AA. Material omissions

BB. Undisclosed speculative revenue recognition (SAB 104)

25. Which of the following red flags was NOT listed in the text as being associated with fictitious revenues?

CC. Rapid growth or unusual profitability

DD. Recurring negative cash flows from operations

EE. Significant, unusual, or highly complex transactions, especially those to period end

FF. Intentional omissions of disclosures regarding accounting principles and policies

26. Persuasive evidence of an arrangement does not exist, delivery has not occurred or services have not been rendered, the seller’s price to the buyer is not fixed or determined, or collectability is not reasonably assured are all examples of common problems associated with which type of financial statement fraud?

GG. Liabilities/expense omissions

HH. Premature revenue recognition

II. Improper disclosures

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 7
by Mary-Jo Kranacher and Dick Riley
Brian
Carpenter,

JJ. Off balance sheet special-purpose entities

27. Liability omissions, subsequent events, management fraud, related-party transactions, and accounting changes are all associated with which type of financial statement fraud?

KK. Timing differences

LL. Revenue recognition

MM. Improper disclosures

NN. Channel stuffing

28. Inventory valuation, accounts receivable, business combinations, and long-term assets are categories that involve which kind of financial statement fraud?

A. Improper asset valuation

B. Revenue recognition

C. Improper disclosures

D. Undisclosed related-party transactions

29. There are traditionally two methods of percentage analysis of financial statements:

E. Certified analysis and non certified analysis

F. In-depth analysis and cursory analysis

G. Vertical analysis and horizontal analysis

H. Disclosure analysis and related-party transactions analysis

30. Current ratio, quick ratio, debt to equity, and return on assets are all examples of what kind of analysis:

A. Ratio analysis

B. Inventory turnover

C. Horizontal analysis

D. Analysis of nonfinancial numbers

31. Stewart was an iconic CEO with a $32-million-a-year salary until he was convicted of embezzlement. An internal auditor was the first to notice a red flag on a balance sheet ratio. What did she notice?

E. A decrease in the company’s debt to equity ratio

F. A decrease in the company’s current ratio

G. An increase in the company’s quick ratio

H. An increase in the company’s profit margin ratio

32. When conducting a fraud examination, variables such as weather data, employee headcount, production facilities, and production capacity might provide useful clues. These types of data are known as:

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 7

A. Non-financial measures (NFMs)

B. Dupont Expression

C. Return on assets (ROA)

D. Return on equity (ROE)

33. One of the challenges of detecting financial statement fraud is that:

E. Auditors tend to over-analyze even relevant NFMs

F. The financial statements of publicly traded companies are insufficiently regulated

G. Either the CEO or the CFO was involved in 89% of financial statement frauds studied (implying an override in traditional internal controls)

H. Employees within the accounting department can commit immaterial frauds

34. Organizational avoidance of setting unachievable or unreasonable financial goals is an example of:

A. Reducing the pressure to commit financial statement fraud

B. Reducing the opportunity to commit financial statement fraud

C. Reducing the grounds for rationalizing financial statement fraud

D. Reducing the incentives for reaching performance targets

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 7 of 7
by Mary-Jo Kranacher
Dick Riley
Brian
Carpenter,

CHAPTER 8

1. must take the lead in establishing, implementing, and maintaining a formal fraud risk management program.

A. Corporate shareholders

B. Board and management

C. Regulatory agencies such as the PCAOB and SEC

D. Internal auditors

2. “Management is responsible for adopting sound accounting policies and for establishing and maintaining internal control that will, among other things, initiate, authorize, record, process, and report transactions (as well as events and conditions) consistent with management’s assertions embodied in in the financial statements.” What is the source of this standard?

A. SAS No. 1

B. COSO Internal Control Framework, Section 3

C. SEC Regulation D Rule 502

D. PCAOB Standard No. 1

3. Because prevention through segregation of duties, approvals, and authorizations is not possible in a collusive environment, the principal internal control procedures will be centered on _____________.

E. Authority

F. Mitigation

G. Detection

H. Deterrence

4. Generally, three procedures are effective in identifying breakdowns in internal controls due to override and collusion: journal entries recording in the books and records, as well as other adjustments to financial information should be examined for proper back-up document; significant accounting estimates needs to be reviewed; and

I. Care should be taken by the board to ensure that the external auditor is indeed, independent in fact, and in appearance.

J. A properly functioning board-operated audit committee which has the ability to independently investigate anomalies should be established.

K. A robust whistleblower mechanism should be implemented and its existence widely published throughout the organization.

L. Unusual “one-time” transactions should be scrutinized to ensure they have an appropriate underlying business rationale.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and
Riley Test bank written by
L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 7
Mary-Jo
Dick
Brian
___________________________.

5. The 2016 ACFE Report to the Nations found that of existing controls is the second most frequently observed internal control weakness that contributed to fraud; the lack of internal controls was the only weakness more frequently cited by the ACFE’s survey respondents.

M. A lack of clarity

N. A lack of awareness

O. Overly complex design

P. Override

6. The perception of the public particularly with regard to asset misappropriation, corruption, and misstated financial statements is that independent auditors are:

Q. Largely corrupt and untrustworthy themselves

R. Responsible for fraud detection

S. Not generally trained in the specific techniques of fraud examination

T. Antiquated in the age of big data and artificial intelligence (AI)

7. When conducting an audit, the auditor has a responsibility to design audit tests to address the risk of management override of internal controls. can be discerned by looking for evidence of concealment such as missing documents, altered documents, nonreconcilable items, misinformation obtained during management inquiries, and other indicators of concealment.

U. Errors

V. Scope

W. Intent

X. Red flags

8. is a relative concept. A misstated amount that would be immaterial to a large company could be large enough to wipe out the net worth of most small companies.

A. Materiality

B. Truth

C. Fraud

D. An external audit

9. The materiality amount once established is for the duration of the audit engagement.

E. Essentially a footnote

F. Not set in stone

G. Fixed and cannot be adjusted

H. Determined by management

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 7

10. involves deliberate actions by management to meet specific earnings objectives, generally for private gain.

A. “Earnings management”

B. “Willful non-transparency”

C. “Vertical and horizontal ratios”

D. “Ego/Entitlement”

11. Management has some latitude to manage earnings as long as the choices are considered ____________, however, any sign of deliberate efforts to do so should be considered a red flag by auditors, because it can be fraud, whether or not material.

E. Reasonable by investors

F. Necessary to achieve performance bonuses

G. GAAP-compliant

H. Board approved

12. The board’s audit committee is with regard to management override and high-level management collusion.

I. A persistent relic of another era in management

J. An unnecessary layer if an internal auditor (or team) exists

K. An optional approach to board oversight but not recommended for publicly traded companies

L. An integral internal control mechanism

13. The primary deterrent effect of an internal audit group is related to:

M. The skillsets of the individual(s) involved.

N. Its ability to parse large volumes of data.

O. The increased perception that fraud perpetrators will be detected.

P. Assisting senior management in establishing the “tone at the top.”

14. A major difference between auditors and fraud examiners is that most auditors __________________. Fraud examiners and forensic accountants who detect fraud go beyond this. They determine whether _____, whether expenditures make sense, and whether all aspects of the documentation are in order.

Q. Are not trained in detecting fraud; red flags exist

R. Merely match documents to numbers to see whether support exists and is adequate; the documents are real or fraudulent

S. Have at least a 5% threshold for materiality; fraud at any threshold exists

T. Don’t have the interview skills to assess fraud; people make inconsistent statements

15. In most cases, asset misappropriation, corruption, and financial statement fraud last about from inception to conclusion.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 7
by Mary-Jo Kranacher
Dick Riley
Brian
Carpenter,

A. 24 months

B. 6 months

C. 2.4 months

D. 16 months

16. is an attempt to identify the fraud as early as possible, in contrast to the optimal situation in which the fraud is prevented or deterred.

E. Conducting an annual fraud risk assessment

F. Separation of duties

G. Effective fraud detection

H. Implementing internal controls that prevent collusion

17. are part of the day-to-day operations of most organizations and are often observed by auditors.

I. Earnings management

J. Transaction adjustments

K. Risks

L. Anomalies

18. The starting point for the antifraud professional or forensic accountant is an attitude of ______________________.

A. Professional skepticism

B. Unbiased professionalism

C. Professional pessimism

D. Professional rigor

19. Generally, enhanced skepticism has three defining elements. First it includes the recognition that fraud may be present. Second, professional skepticism is exemplified by a professional’s attitude, an attitude that includes a questioning mind and a critical assessment of evidence. Third, professional skepticism asks professionals to make a commitment to __________________________.

E. Doing whatever it takes to convict the guilty

F. Persuasive evidence to determine whether or not fraud is present

G. Never giving up when it comes to identifying and locating more evidence

H. Extending a presumption of goodwill unless or until evidence suggests otherwise

20. Fraud detection techniques require that fraud and forensic accounting professionals pay particular attention to the possibility of because it suggests deception.

A. Concealment

B. Collusion

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 7

C. Override of internal controls

D. Conversion

21. There are two major approaches to fraud detection:

E. Through tips (allegations) and the preponderance of evidence

F. Through external audits and internal audits

G. Through the identification of red flags and through a targeted risk assessment

H. Through the use of covert and overt surveillance (both physical and digital)

22. The first step to detecting fraud is to build an understanding of the organization and the environment in which it operates. The second step is to ______________________.

A. Develop an understanding of the control environment the environment as opposed to the controls themselves.

B. Develop an audit plan that includes discussions with senior management about potential fraud risks

C. Develop a network of insiders who may have knowledge of actual fraud

D. Remind your team of the importance of professional skepticism

23. Most red flags are:

E. Indicators of fraud if one knows how and where to look.

F. Typically, indicative of fraud if a targeted risk assessment was not completed.

G. Not indicators of fraud but are a function of the dynamic environment in which organizations operate.

H. Indicators of unskilled fraudsters who don’t have sufficient knowledge to conceal their defalcations.

24. Irregularities such as missing documents, excessive voids or credit memos, excessive write-offs, duplicate payments, second endorsement on checks, and questionable handwriting are all examples of:

A. Accounting anomalies

B. Analytical anomalies

C. Behavioral red flags

D. Internal control irregularities and weaknesses

25. From a fraud perspective, internal controls have at least three different objectives:

E. Increase perception of detection, improve deterrence, and create a reporting mechanism

F. Deterrence, detection, and mitigation

G. Segregation of duties, checks and balances, and detection

H. Prevention, deterrence, and detection

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 7
Mary-Jo

26. Data such as laundromat electricity usage and cycle time, beer purchase quantities, and travel dates are examples of:

I. Accounting anomalies

J. Nonfinancial numerical performance data

K. Red flags that have little to no potential value in verifying or disproving fraud

L. Tend to be “corrupted” sources of data

27. The targeted fraud risk assessment approach assumes that there should be a direct relationship between the and the _________________________.

M. Specific industry involved; risk levels typically associated with that industry

N. Accounts receivable department; accounts payable department

O. Level of risk associated with a material weakness in the company’s controls; amount of attention devoted to that area during an audit

P. Organization’s tolerance for risk; implementation of appropriate internal controls

28. An overview of the fraud risk assessment process includes the following components:

Q. Propose the scope of the audit, execute the scope, report the findings to the board, and reply to management concerns.

R. Money, Ideology, Coercion, and/or Ego/Entitlement (MICE).

S. Act, concealment, and conversion.

T. Evaluate the fraud risk factors, identify possible fraud schemes and scenarios, prioritize individual fraud risks, evaluate mitigating controls.

29. The text outlines a ten-step approach to implementing a targeted fraud risk assessment. Which of the following is NOT one of those steps.

U. Identify the “process owner” for each of the identified significant processes.

V. Identify the parties who have the ability to commit the potential fraud.

W. Identify specific vendors that have a reputation for fraud within the industry.

X. Identify, understand, and evaluate the company’s operating environment and the pressures that exist.

30. When the text refers to a “process owner,” it is referring to an individual who has:

Y. Subject matter expertise in the processes that should be used within the industry.

Z. Significant influence or sway in the processes used by the organization to accomplish its goals, but little ability to alter those processes despite “owning” them.

AA. The responsibility for conducting a particular aspect of a targeted fraud risk assessment.

BB. Day-to-day authority and ability to alter standard operating procedures to accomplish the goals and objectives of the organization.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 7

31. Residual fraud risk includes those that are not adequately mitigated by control activities, and, as such, requires a fraud audit response.

A. Fraud schemes

B. Personnel

C. Industry norms

D. Company specific characteristics

32. The risk of management override and collusion are residual fraud risks and require a specific audit response, if detection activities do not exist.

E. Occasionally

F. Always

G. Rarely

H. Never

33. In an electronic environment that captures a huge amount of transactions annually, many transactions and data relationship anomalies appear to be a potential fraud or error. To utilize the computer environment effectively, must be completed.

A. The targeted fraud risk assessment process

B. A hypothesis/null hypothesis matrix

C. CAATT training by the auditor or examiner

D. A Benford analysis on all journal entries

34. The most challenging issue regarding fraud detection in a digital environment is the potential for:

E. The inherent susceptibility of digitally stored data to be fraudulently altered without detection.

F. Historical transaction data to be lost over time due to the high costs of digital storage.

G. An over-whelming number of fraud symptoms (i.e., red flags).

H. Hackers and other unauthorized users gaining access to proprietary information.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 7 of 7
by Mary-Jo Kranacher and Dick Riley
Brian
Carpenter,

CHAPTER 9

1. To complete a fraud examination, the fraud examiner or forensic accountant needs to answer the essential questions of with ________________.

A. Opportunity, motive, and rationalization; conviction

B. Money, ideology, coercion, and ego/entitlement (MICE); clarity

C. Who, what, when, where, and why; evidence

D. Which specific fraud laws were violated; authority

2. You have been hired by the prosecution to provide expert testimony in a fraud case you helped investigate. As you provide answers to key questions around the fraud examination, your testimony will be more convincing to the judge and jury if you:

E. Can articulate a clear opinion about the guilt of the perpetrator(s).

F. Have woven the answers into a coherent storyline grounded in the evidence.

G. Ground your answers in the elements of the fraud triangle, particularly with respect to motive.

H. Omit any reference to evidentiary shortcomings in your testimony.

3. Fraud professionals need to understand that no one is better at generating alternative theories of a case than _____________________.

I. A certified fraud examiner

J. Sophisticated perpetrators with a deep knowledge of accounting

K. Judges that legislate from the bench

L. Opposing attorneys

4. An excellent tool to analyze evidence and develop a compelling storyline is the _______________________.

A. Hypothesis-Evidence Matrix

B. The Fraud Triangle

C. A correlation coefficient of .95 or greater for each variable associated with the fraud

D. Use of software tools such SAS or IDEA geared toward fraud analysis

5. is defined as the totality of circumstances that would lead a reasonable, professionally trained, and prudent individual to believe that a fraud has occurred, is occurring, or is about to occur.

E. Premonition

F. Prevarication

G. Probable cause

H. Predication

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 7

6. Typically, a few are not in themselves sufficient as a basis for a fraud examination.

A. Red flags

B. Instances of missing cash or other assets

C. Tips with some corroborating evidence

D. Falsified financial reports

7. Auditors and accountants often direct their fraud prevention and deterrence efforts toward using internal controls to minimize because fraud is highly improbable without it.

E. Perceived pressure

F. Opportunity

G. Competing hypotheses

H. Coercion and entitlement

8. The difference between a mistake and fraud is ____________. If the fraud examiner or forensic accountant cannot prove it, a civil or criminal conviction for fraud most likely cannot be sustained.

I. Perceived pressure

J. Rationalization

K. Intent

L. Ego/entitlement

9. The main benefit of using the elements of fraud in an investigation is that in virtually every fraud or financial crime, ____________________.

M. It eliminates the need to develop a compelling storyline grounded in the evidence

N. Fraudsters use them in attempt to outwit fraud examiners

O. Courts are required to consider the findings admissible

P. The evidence of each element can be developed

10. In fraud cases, evidence of in particular, provides some of the best circumstantial evidence that the act and conversion (benefits) were intentional.

A. Concealment

B. Motive, intent, concatenate, and elude (MICE)

C. A bribe

D. Rationalization

11. There is a debate in the profession about whether tracing money to a perpetrator’s bank account is sufficient evidence of conversion, or whether the fraud examiner or forensic accountant needs to show how the ill-begotten money was used. Legal precedent indicates

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 7

that tracing the money into the hands of the perpetrator or his or her bank account is____________________.

E. Insufficient

F. Sufficient

G. More powerful than showing how the perpetrator benefited from it

H. Only useful to the extent that you can show how the money was used

12. Things such as the timing of key transactions, altered documents, concealed documents, destroyed evidence, missing documents, false statements, patterns of suspicious activity, and breaks in patterns of expected activity are examples of that may indicate the act, concealment, or conversion in fraud.

I. Predication

J. Direct evidence

K. Circumstantial evidence

L. MICE

13. is defined as anything perceivable by the five senses, any proof, such as testimony of witnesses, records, documents, facts, data, and tangible objects, legally presented at trial to prove a contention and to induce a belief in the minds of the jury.

M. Predication

N. Perceptibility

O. The Federal Rules of Evidence

P. Evidence

14. Generally, evidence is admitted at trial provided that: it is relevant to the issue at hand, any probative effect outweighs any prejudicial effect, and the evidence is ________.

Q. Direct (rather than circumstantial)

R. Trustworthy

S. Compelling

T. Reasonably conclusive

15. Three types of evidence may be offered at trial: testimony, real, and ____________.

A. Demonstrative

B. Compelling

C. Reliable/trustworthy

D. Non-prejudicial

16. Most fraud and forensic accounting cases are proved with evidence.

E. Demonstrative

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 7

F. Direct

G. Documentary

H. Circumstantial

17. To be admitted at trial, evidence must be shown to have unique identifiers (preferable), or that the chain of evidence has been followed. This process is known as:

I. Verisimilitude certification

J. Authentication

K. Chain of custody audit

L. Invigilation

18. You are a fraud examiner investigating a case involving a large amount of physical evidence (e.g., emails, journal entries, checks, etc.). In addition to having a system for gathering, documenting, organizing, retaining, and retrieving the evidence, you also need to review it for relevance, reliability, and _.

A. Validity

B. Demonstrative value

C. Probative value

D. Authenticity

19. In essence, are where evidence intersects with the tools and techniques of the antifraud and forensic accounting profession.

E. Probative values

F. Red flags

G. Examinations

H. Daubert challenges

20. Analysis of cash flows, analysis of competing hypotheses, consideration of analytical and accounting anomalies, big data and data analytics, consideration of the fraud triangle, use of graphical tools for analysis and communication, internal controls, the control environment and opportunity, interviewing for information and admissions, analysis of nonaccounting and nonfinancial numbers and metrics, financial statement and ratio analysis, consideration of red flags, and analysis of related parties are all examples of:

I. Direct evidence.

J. Methods by which evidence can be assessed for validity and reliability.

K. Board and management responsibilities.

L. Forensic accounting and fraud examination tools/techniques.

21. evidence is the backbone of most financial forensic examinations.

M. Compelling

N. Demonstrative

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
Test
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 7
by Mary-Jo Kranacher and Dick Riley
bank written by Brian
Carpenter,

O.

Documentary

P. Circumstantial

22. is an examination technique that considers periods before, during, and after a suspected fraud has occurred.

Q. Consideration of red flags

R. Invigilation

S. Earnings management

T. Defalcation

23. In a civil case, interviews are most often carried out in the form of ____________.

A. Depositions

B. Negotiations

C. Indictments

D. Covertly recorded conversations

24. You are conducting a fraud examination in which a confidential informant told you that the key suspect purchased a brand new luxury vehicle with cash that was embezzled. Which kind of report should you obtain to verify this?

E. Large Cash Purchase Report (LCPR)

F. Suspicious Activity Report (SAR)

G. Currency Transaction Report (CTR)

H. IRS Form 8300

25. The value of ________, to include “smoking gun” evidence of financial crimes, fraud, motivations for activity, and other information cannot be overstated.

I. Wiretaps

J. Email

K. Video surveillance

L. Confidential informants

26. True big data, data analytics, and data mining software doesn’t just change the presentation, but actually discovers among the data.

M. Materiality

N. Fraud schemes

O. Previously unknown relationships

P. Patterns/breaks in patterns

27. According to ACFE research, are the most common concealment methods for all three categories: asset misappropriation, corruption, and financial reporting fraud.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 7

A. Creating fraudulent documents and altering physical documents

B. Creating fraudulent transactions in the accounting system

C. Creating fraudulent electronic documents or files

D. Creating fraudulent audit records

28. Accounting books and records that are found during the course of an examination to have been altered provide compelling evidence of ______________.

A. Concealment

B. Conversion

C. Concatenation

D. Collusion

29. You are a fraud examiner who is investigating a suspected embezzlement. As you comb through the general ledger looking for debit entries to offset credits to cash, which account of those listed below is the most commonly used in concealment in such cases?

E. Debits to equity

F. Debits to liabilities

G. Debits to expense accounts

H. Debits to revenues

30. The most common means for hiding real estate and business ownership is to __________________________________________.

I. Place the titles in an undisclosed safe deposit box

J. Make payments to insurance policies from unknown accounts

K. Pay down mortgages without running the payments through known bank accounts

L. Transfer those assets to another party over which the person holding the assets has some element of control

31. Using indirect methods to estimate assets controlled by an entity, or income to an entity, is referred to as ________________.

M. “financial ghosting”

N. “financial profiling”

O. “intrusion upon seclusion”

P. “conjectural accounting”

32. The primary challenge related to using financial profiling methods is the _________________________________________.

A. Amount of legwork involved in developing sources of information

B. Difficulty in dealing with offshore banks and foreign laws

C. Identification of shell company beneficial owners

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 7

D. Difficulty in accessing tax returns without a court order

33. The provides circumstantial evidence that amounts paid for assets and expenditures exceed income from known sources for a given period of time.

E. Bank records method

F. Invigilation method

G. Net worth method

H. Lifestyle analysis method

34. In preparing to rebut defenses to cash from unknown sources, the fraud examiner should develop an evidence trail, if possible, which suggests that defenses are not feasible. Four common defenses to unknown sources of cash include the assertion that the cash was: accumulated in prior periods, obtained by gift or inheritance, obtained from loan proceeds, or a result of:

I. Selling some other asset (such as a painting)

J. Foreign held investments

K. Frugality

L. Lottery or gambling winnings

35. The primary benefits of using public sources of data such as the local county courthouse, database searches, Internet searches, and other extra-organizational sources of data are that open sources of data provide evidence of conversion, and can be useful in

M. Cases where the perpetrator deals mostly in cash

N. Expressing an opinion of guilt grounded in the evidence

O. Developing new leads

P. Investigating high profile suspects

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 7 of 7
________________________.

CHAPTER 10

1. In the fraud examination and forensic accounting professions, nothing is more important to the successful resolution of a case than the ability to conduct thorough interviews of and interrogation of ________________________.

A. Subjects and targets; witnesses

B. Employees and board members; fraudsters

C. Witnesses; subjects and targets

D. Fraudsters; felons

2. is the systematic questioning of a person who has knowledge of events, people, evidence, and other details surrounding a fraud or forensic accounting issue.

E. Interrogating

F. Interviewing

G. Canvassing

H. Structured dialoguing

3. generally involves the questioning of a suspect, target, or uncooperative witness to obtain evidence, to obtain an admission of guilt or complicity in an act, or to give the interviewee an opportunity to volunteer facts and circumstances that may eliminate them as a suspect or target of the examination.

I. Interviewing

J. Examination

K. Interrogation

L. Instigation

4. In a fraud examination, evidence is usually gathered in a manner that moves from to __________.

M. Facts; hypothesis

N. Hypothesis; facts

O. Specific; general

P. General; specific

5. By arranging interviews in order of probable culpability, the fraud examiner is in a position to ______________________________________.

A. Have as much information as possible by the time the prime target is interviewed

B. Save the time and cost of depositions until last for the most probable targets

C. Use lawful threats (e.g., jail, conviction, fines) for uncooperative suspects

D. Seek any additional grand jury indictments needed based on the evidence gathered

6. Under which kind of fraud would an examiner start with the suspected perpetrator?

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 8

E. Cases of collusion where a co-conspirator agrees to testify against the perpetrator

F. Fraudulent representations (such as tax returns and financial statements)

G. Almost every instance where the suspected perpetrator has a prior fraud conviction

H. If surveillance footage contains “smoking gun” evidence against the perpetrator

7. You are a fraud examiner who has been hired to investigate a potential embezzlement case. In which order should you go about gathering the evidence?

I. Document analysis, neutral third-party witnesses, co-conspirator(s), corroborative witnesses, target.

J. Target, co-conspirator(s), corroborative witnesses, document analysis, neutral thirdparty witnesses.

K. Document analysis, neutral third-party witnesses, corroborative witnesses, coconspirator(s), target.

L. Target, co-conspirator(s), corroborative witnesses, neutral third-party witnesses, document analysis.

8. Many antifraud professionals, forensic accountants, and attorneys will suggest that the outcome of an interview or interrogation may be determined before the first question is asked. What is the underlying belief to this axiom?

M. If you position yourself as an expert, witnesses will generally be reluctant to lie.

N. Professional experience trumps attempts at concealment in most frauds.

O. Eyewitness testimony is reasonably reliable.

P. Preparation is the primary key to success.

9. You are a fraud examiner investigating the theft of a company’s automotive parts inventory. After reviewing documents and interviewing witnesses, you have narrowed the list of probable perpetrators to three warehouse workers who appear to have colluded with each other: a forklift operator, a shift leader, and a loader. All three have high school diplomas and earn about 15% more than minimum wage (except for the shift leader, who earns a little more). You decide to interview the forklift driver first (on the belief that the shift leader and the loader are the probable the primary targets). As you talk, you use the terms, “collusion,” “defalcation,” and “predication.” Which of the following statements is most applicable?

Q. You should use technical terms and language whenever possible as a power dynamic to persuade witnesses into cooperating with you.

R. You should avoid technical terms and language because they may confuse the interviewee.

S. You should use technical terms and language frequently, especially with people not trained in accounting or forensics because it may prompt them to confess sooner because they tend to assume you know what you are doing.

T. You should avoid technical terms and language because it may cause the interviewee to want to play “one-upmanship” games with you.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 8
by Mary-Jo Kranacher
Dick Riley
Brian
Carpenter,

10. Instead of taking detailed notes during an interview, the authors advise jotting down keywords. The reason they recommend this is that:

A. Taking extensive notes distracts interviewers from their main responsibility to watch and listen.

B. Taking extensive notes tends to make witnesses uncomfortable which may cause them to be less forthcoming.

C. Taking extensive notes allows the opposing side to obtain them during discovery which may reveal your side’s strategy.

D. Taking extensive notes is impractical and will cause interviews to last unnecessarily long, thereby fatiguing both the examiners and witnesses.

11. Interviewers need to have complete command of the facts, events, dates, other relevant details, especially in potentially adversarial interviews, in order to _____________________________.

E. Appear to not be caught off guard by previously unknown information

F. Present a professional image that establishes the authority of the interviewer

G. Focus on more granular details that would likely be known only by the subject or target

H. Deflate attempts at misdirection and deception by the subject or target

12. One issue that arises in interviews is the use of checklists and prewritten questionnaires. The main benefit of these is that the interviewer will be well prepared and less likely to miss an important inquiry. However, checklists can _________________.

I. Be subpoenaed by opposing counsel which may give it information it didn’t have

J. Create tunnel vision and distract the interviewer from looking for signs of deception

K. Cause the interviewer to lose credibility with the witness because they make the interviewer look like they don’t know what they’re doing

L. Inadvertently divulge to a witness critical information known to the interviewer

13. In a typical interview, in what stage would the question be asked, “Is there anyone else I should speak with about the matter?”

A. The close

B. The nadir

C. The introduction

D. The body

14. You are conducting an admission-seeking interview of a suspected embezzler. At some point during the interview, you might say something like, “I totally get it. You were under such financial pressure at home, you just didn’t see any other way out. That’s a pretty common feeling, if you ask me, especially in this day and age where we’re expected to do

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 8

so much at work with so few resources.” What are you attempting to do by saying this to the target?

E. Make yourself feel less conflicted about being confrontational.

F. Gain the confession without reducing the legal responsibility for the act.

G. Establish a firm moral boundary in the target’s mind between right and wrong.

H. Make yourself seem more human to a jury if the case goes to trial.

15. Regardless of whom we interview, and about what, there are five general types of questions we can ask: introductory, informational, assessment, closing, and

I. Probative

J. Relational

K. Admission-seeking

L. Confirmation

16. In conducting an interview, it is advisable to indicate your name and your company but not to use your title. Why is this?

A. The more informal the interview, the more relaxed the respondent will be.

B. Titles can be misleading. As an example, how much authority does a company senior vice-president possess v. the company’s executive vice-president?

C. Putting too much Personally Identifiable Information (PII) into the public about yourself can compromise your privacy and security.

D. Plain sounding titles such as “associate” may lead the respondent to think you don’t have any real expertise or authority.

17. Engaging in “small talk” for a few minutes at the beginning of an interview is:

E. Not advisable because it’s not on-point where the purpose of the interview is concerned.

F. Not advisable because most people see it for what it is: a banal social custom.

G. Advisable because it can be a means of breaking the ice and establishing a flow of communication.

H. Advisable because you want to extend the interview for as long as possible in an attempt to breakdown the witness.

18. There are few hard-and-fast rules in interviewing, but one of them is:

I. Seek continuous agreement.

J. Get a commitment for assistance.

K. Ask non-sensitive questions.

L. Question only one person at a time.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and
Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 8
Mary-Jo
Dick
____________.

19. Given a choice between using the words, “theft” or “shortage,” an interviewer should generally opt for “shortage.” This is because:

A. Words that normally put people on the defensive should be avoided.

B. Interviewees who are innocent may feel that you are implying they are to blame.

C. Until the facts are resolved, you don’t actually know whether the shortage is attributable to theft.

D. It may help lull a target into a false sense of security because he may assume that the interviewer doesn’t believe a theft has occurred.

20. is the process of observing behavior before critical questions are asked, as opposed to doing so during questioning.

E. Indexing

F. Norming

G. Reflective feedback

H. Posturing

21. Admission-seeking questions are reserved specifically for individuals whose culpability is reasonably certain. Such questions have at least three purposes: (1) to distinguish the innocent from the culpable, (2) to obtain a valid confession, and (3) ______________________.

I. To identify potential co-conspirators or other matters salient to the investigation

J. To establish a rapport with the subject and make them feel relaxed

K. To obtain from the confessor a written statement acknowledging the facts.

L. To establish the credibility of the respondent

22. During the admission-seeking interview, the interviewer must, at some point, make a direct accusation of the subject. Which of the following accusations below would best serve this purpose?

M. We have reason to believe that you …

N. Our examination has clearly established that you

O. It seems likely, based on statements from your co-workers, that you …

P. You are suspected of

23. One of the most effective techniques for stopping or interrupting a denial is _________________________.

A. Through the use of a delaying tactic

B. To confront the accused about their persistence in lying

C. Through appearing to be confused

D. To offer a moral rationalization

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 8

24. Rather than being confrontational in interviews, constantly seek agreement from the accused. No matter what the accused has supposedly done, do not express shock, outrage, or condemnation. This posture is recommended because:

E. Only trained experts in a controlled environment should risk provoking a suspect.

F. It limits the interviewer’s liability to formal charges of harassment.

G. The goal is to remain in control while still appearing compassionate and understanding.

H. The evidence in the case may ultimately point elsewhere.

25. In the course of an admission-seeking interview, you could display physical evidence of the fraud, discuss the testimony of witnesses, or discuss the accused’s deceptions. All of these may be useful to:

A. Defuse alibis

B. Establish rapport

C. Increase fear

D. Appear compassionate

26. In an admission-seeking interview, there comes a point at which the accused is deliberating whether or not to confess. When this occurs, the interviewer should present an alternative question to the accused which forces him or her to make one of two choices. One alternative allows the accused a morally accepted reason for the misdeed; the other paints the accused in a negative light. Regardless of which answer the accused chooses, her or she is acknowledging guilt. This is known as a/an:

A. Benchmark admission

B. Fork-in-the-road admission

C. Lesser-of-two evils admission

D. Exculpatory admission

27. As with any interview, there are three general approaches to obtaining the verbal confession: chronologically, by transaction, or by:

E. Association

F. Display of physical evidence

G. Event

H. Official documentation (e.g., tax return)

28. Because of the nature of the psychology of confessions, most confessors will lie about one or more aspects of the offense, even though confirming overall guilt. When this happens during the verbal confession, the interviewer should .

I. Offer a moral rationalization for the lie but make sure the confessor knows that you know he lied

J. Firmly but politely debunk the confessor’s lie with the evidence

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 8

K. Gently confront the confessor while remaining as compassionate as possible

L. Make a mental note of the discrepancy and proceed as if the falsehood had been accepted as truthful

29. is an essential element in all criminal and civil actions involving fraud.

M. Motive

N. Intent

O. Conversion

P. Ego/entitlement

30. Once the subject has admitted to remembering the first instance, the interviewer should ___________________________________.

A. Say to him or her to “tell me about it”

B. Express some moral indignation so that the confessor knows he or she has done wrong

C. Remind the confessor that actions have consequences

D. Immediately get the confessor to sign a written statement

31. Most frauds are solo ventures committed without the aid of an accomplice. However, the interviewer should still seek to determine whether other parties were involved. Which choice from the list below would be the best way to phrase this?

E. Did someone else know?

F. Who else knew besides you?

G. Give me the names, right now, of everyone who knew besides you!

H. Who are the other losers involved in this?

32. When it is time to obtain a signed statement from the confessor, which approach is best?

I. The interviewer should have the confessor draft the statement, preferably in his or her own handwriting.

J. The interviewer should suggest that the confessor’s legal counsel draft a statement.

K. The interviewer should prepare the statement for the confessor to sign.

L. The interviewer should have the confessor dictate the statement to him or her for signature.

33. Giving vague or evasive answers to questions, avoiding eye contact with the interviewer, casting guilt to others in general but not specifically, and being indignant may be signs of ____________________________________________.

M. The interviewer having failed to adequately prepare

N. A pathological liar

O. Stress that may accompany deception

P. A confessor who is almost ready to admit their guilt

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 7 of 8

34. According to research, the average person’s ability to judge deception is relatively poor. Some studies have indicated that interviewers fail to identify lies as much of the time.

Q. 25%

R. 50%

S. 35%

T. 70%

35. Generally, truthful behavior includes direct answers that give the impression that the interviewee has nothing to hide, spontaneous answers that indicate that the interviewee has nothing to think about, a perception by the interviewee of attentiveness and interest in the interview outcomes, an orientation toward the interviewer, and

U. Increased or decreased use of illustrators in speech during threatening questions

V. Being overly friendly and polite

W. Appearing outwardly unconcerned

X. Behavioral consistency between verbal and nonverbal cues

36. A liar will often request that the interviewer “Check with my wife,” or “Talk to my minister.” Why do they say this?

A. To add credibility to the false statement.

B. To vindicate themselves.

C. To gain sympathy from the interviewer.

D. To identify co-conspirators without having to name them.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 8 of 8
________________________.

CHAPTER 11

1. The starting point for the use of electronic data in the fraud or forensic accounting area, as a means of fraud prevention and deterrence is a/an _______________________.

A. Evaluation of the integrity of the data and their related systems

B. Robust antifraud training program focused on the IT infrastructure

C. Anti-virus, malware detection system running in the background of all company IT

D. Suitable software that can crunch big data sets (such as Excel or IDEA)

2. Many of the process controls applicable to paper-based information systems are analogous to the internal controls surrounding digital information systems. An information technology system (IT) audit consists of (1) planning, (2) test of controls, and (3) _____________.

A. Auditor training on specific systems with which the fraud examiner may be unfamiliar

B. Substantive tests

C. An audit plan whose scope limitations receive buy-in from the company

D. Establish a materiality threshold for IT errors that may be encountered

3. Batch controls are that ensure data integrity for groups of transactions as they move through the system.

E. System-generated criteria

F. Used to detect input errors by flagging those transactions that fall outside accepted ranges

G. Techniques to ensure that data relationships within a record make sense

H. Operator generated flags

4. Fraud professionals in the IT audit environment need to be cognizant of the possibility that ___________________________________________________.

A. IT personnel may not understand accounting standards and terminology

B. Sophisticated spear-phishing attacks may have altered the data in the system

C. One or more of the IT systems personnel may be colluding with others to commit or conceal fraud.

D. Ghost IT systems can exist within a company (much like shell companies) that can be almost impossible to detect

5. The IT professional may be in a unique position to commit and conceal a fraud, simply because ______________________________________.

A. They can make important data disappear while credibly explaining it was caused by malware or a hard drive crash

B. They sometimes have access to all of a company’s financial transaction data

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 8

C. So few others understand IT and how data can be manipulated

D. They often know how to navigate the Dark Web undetected

6. The assertions of management related to financial statements include (1) the existence of assets and transactions, (2) the completeness of the transactions reflected in the financial statements and related notes, (3) proper disclosure of all rights and obligations associated with assets and liabilities, (4) the reasonableness of the valuation of transactions and balances reflected in the financial statements, and (5) _____________________________________.

E. Proper financial statement presentation and disclosure of the related notes

F. Certification of responsibility for the internal control environment

G. Formal attestation of any incidents of known fraud since prior audit

H. Internal auditor statement that they have not been coerced into overri ding controls

7. Electronic evidence refers to any evidence captured ___________________.

A. With the assistance of IT or MIS professionals working in collaboration with investigators

B. By examining the unused space on computer hard drives (assuming files have not been lost due to defragging)

C. Through the use of digital tools such as Road MASSter 3 and EnCase

D. By computers and electronic devices

8. As with other digitized information, the challenge with electronic communication is ____________________________.

A. The ways in which it can be encrypted

B. The sheer volume of exchanges

C. Identifying the total universe of devices on which the information could exist

D. That software has been invented to make it irretrievable by investigators

9. One of the main concerns in the digital environment is related to the initial acquisition of the evidence. Auditors and forensic accountants may when they first encounter digital evidence.

E. Attempt to “do too much”

F. Copy a hard drive with a special device

G. Seize it during a search without first confirming that it is covered by the warrant

H. Feel overwhelmed by certain technologies

10. Forensic accountants and fraud examiners seldom perform the work that is within the expertise of computer forensic professionals usually, computer and electrical engineers and management information systems (MIS) personnel who have specialized training and experience in digital evidence associated with fraud and forensic accounting issues. It is not only the need to protect the integrity of the data that justifies the use of specialized

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 8
by Mary-Jo Kranacher
Dick Riley
Brian
Carpenter,

knowledge, skills, and abilities of the computer forensic specialist, but also ______.

A. The requirement in court to prove that the data was not inadvertently altered

B. The need to preserve the credibility of the forensic examination profession

C. Their ability to find hidden information, deal with encrypted data, and retrieve previously deleted or erased files.

D. Their ability to find accounting anomalies within large data sets through the use of CAATTs.

11. Students (of forensic accounting and fraud examination) should understand that, with regard to digital evidence, only those with specialized training, experience, and appropriate professional certifications should _____________________.

A. Be involved in establishing materiality thresholds for IT audits

B. Use CAATTs to do “black box” or “white box” investigations

C. Initially handle digital evidence

D. Provide expert testimony

12. To maintain data integrity and admissibility, the antifraud/forensic accounting professional needs to be able to _____________________________________.

A. Safely boot up and operate computers as soon as they are seized in a search

B. Reconcile their work back to initially retrieved “master” datasets

C. Defrag all seized computer hard drives to ensure that deleted files are not occupying unused space

D. Acquire some mastery of any number of tools used to gather and protect digital evidence such as Road MASSter3, EnCase, UNERASER for Windows, Data Rescue 5 for Apple Computers

13. It may be possible to recover deleted emails if _______________________.

A. A program such as Privacy Guardian was used by the perpetrator

B. The service provider is named in the warrant (e.g., Google for gmail)

C. An MIS or IT professional uses the “Defrag” command while the computer is in safe mode

D. An email recovery tool is used prior to compaction/overwrite of data storage location

14. Fraud examiners and forensic accountants need to be able to _______________, and they need to understand _______________________________.

E. Identify situations that demand a forensic computer specialist; how legal proceedings against a perpetrator can be jeopardized if evidence is gathered by one who lacks appropriate skills

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
Test
CFE (989) 205-4182
3 of 8
by Mary-Jo Kranacher and Dick Riley
bank written by Brian L. Carpenter, PhD,
Brian@BrianLCarpenter.com

F. Immediately copy all hard drives seized during a search so that embedded countdown software doesn’t automatically destroy all the data they contain; how such data is stored and indexed

G. Develop familiarity with CAATs; the differences between “black box” and “white box” audit environments

H. Deal with the sheer volume of electronic data; how to examine that data without compromising it

15. Fraud examiners and auditors use data analysis software as ___________________, detecting a potential fraud in situations for which manual examination would prove extremely difficult or impossible.

A. A substitute for paper and pencil computations for

B. An internal control useful for

C. The ultimate system of red flags

D. Supplements to analytical work in

16. The fraud examiner or auditor must have an understanding of what could go wrong, what did go wrong, and how those concerns would manifest in the information system. This requires knowledge of the schemes, the industry, the organization, its IT control environments, its history of fraud, and other aspects outlined in the steps to __________________. With this foundation, the antifraud professional has an idea of what he or she is looking for.

E. Develop a targeted risk-assessment

F. Utilize an H-E Matrix

G. Analyzing accounting and non-financial data anomalies

H. Conducting a fraud examination

17. The expression, “a rifle shot” approach as opposed to a “shotgun” approach when referring to data extraction and analysis refers to:

A. Conducting a large series of tests such as a Benford’s Law test on data to look for specific patterns

B. Developing a targeted risk assessment followed by incorporating IT tools and techniques that search for specific anomalies.

C. Convicting a perpetrator with a precise analysis of highly detailed transactions

D. Carefully evaluating (potentially) thousands of anomalies that may be indicative of fraud, errors, internal control breakdowns, or other issues.

18. Nonfinancial, processes, control points, demographics, geographic, business sector product line, etc. are examples of types of digital data that:

A. By their nature are difficult to correlate with financial transactions.

B. Can be disaggregated to help formulate conclusions and opinions.

C. Do not lend themselves very well to electronic analysis.

Test bank project for Forensic Accounting and Fraud Examination (2nd
CFE
205-4182
4 of 8
Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD,
(989)
Brian@BrianLCarpenter.com

D. Are better analyzed using “paper-and -pencil” approaches

19. is like an activity log that captures file details, such as who created the file, when, who last edited the file and when, etc. This data can be crucial to answering many of the questions who, what, when, where, and how.

A. A computer hard drive index

B. A master file overview

C. A safe mode partitioned drive

D. Metadata

20. The suggestion that, “The examiner may stratify the preliminary results to identify subgroups that are more like to be of concern,” is recommended in an AICPA publication when _______________________________.

A. Working in an audit setting with many key subgroups (such as defense contractors)

B. No application-specific audit software is available for the type of data being analyzed (e.g., utilities meter readings)

C. An initial big data examination that leads to a large number of anomalies

D. Beginning your career as a fraud examiner so that you can learn to refine your hypotheses development skills about areas of concern

21. Fraud and forensic examinations often have scope limitations. These serve to ____________________________________________________________________.

A. Establish that any and all pertinent data will be made available to examiners

B. Focus and shape the examination while permitting a deep dive into the details under examination

C. Eliminate the need to do a complex targeted risk-assessment

D. Develop a reasonable expectation upon which deviations can be accurately and effectively identified

22. are defined as “evaluations of financial information through analysis of plausible relationships among both financial and non-financial data …”

E. Analytical procedures

F. Targeted correlations

G. Scope limitations and targeted risk-assessment

H. Coefficient analyses

23. A critical aspect of substantive is the develop ment of upon which deviations and anomalies can be accurately and effectively identified.

A. Critical thinking; data relationships

B. Auditing; targeted risk-assessment

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 8

C. Analytical procedures; a reasonable expectation

D. Examinations; big data sets

24. Investigators can learn a lot about data by observing how variables _________, or have little to no relationship with one another.

E. Move together; disparately

F. Are entered into company books; by whom and when

G. Interact under stress; are ignored

H. Are accurate; or inaccurate

25. Looking for correlations where none had previously existed, as well as correlations that no longer exist _________________________.

A. Is often practiced by novice examiners because it’s easy but isn’t really useful in a real-world fraud examination

B. Can be a good technique if more difficult analyses are not within your skillset

C. Is discouraged as a practice because it looks like a fishing expedition to the jury

D. May suggest further investigative steps

26. Graphics have at least three distinct roles in an examination. First, they can be used as an investigative tool. Second, graphics can help the investigator identify holes in the case or problem areas where further examination is required. Third:

A. Graphics can reduce the amount of time it takes to investigate a case.

B. Graphics can be useful to communicate investigative findings, conclusions, and results.

C. Graphics can demonstrate to the jury that the investigator has done their duty of care in the investigation.

D. Graphics can be printed in color to make the evidence more compelling to the jury, whereas accounting reports, etc. tend to be only black and white.

27. A/an is useful for identifying major players who are central to an examination and to identify linkages between those players.

A. Timeline

B. Flow diagram

C. Predication matrix

D. Association matrix

28. A/an is a graphic representation of known and suspected associations among businesses, individuals, organizations, telephone numbers, addresses, email accounts, websites, etc.

A. Relationship matrix

B. Link chart

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
Test
CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 8
by Mary-Jo Kranacher and Dick Riley
bank written by Brian L. Carpenter, PhD,

C. Flow diagram

D. Timeline

29. You are investigating a case of suspected fraud in a Tri-state area chain of convenience stores. In all, there are 172 stores. Of these, 22 are operated by tribal governments. As your investigation unfolds, you suspect that there may be a connection between the regional manager of the tribal-based stores and one of the regional managers of multiple non-tribal-based stores, but you don’t have any evidence to support this notion at presen t. In creating an association matrix, how would you illustrate the possible connection between the two individuals?

A. A solid black line

B. A question mark placed between the two names

C. A dashed line

D. A solid red line

30. Link charts and other graphics are not only beneficial as investigative and communication tools but can also be helpful in

A. Demonstrating intent

B. Prepping demonstrative evidence for trial

C. Identifying shortcomings in the case and areas where further work is necessary

D. Prevailing in a Daubert Challenge

31. A/an allows the investigator to analyze the movements of events, activities, and commodities.

A. Relationship matrix

B. Flow diagram

C. Association matrix

D. Timeline

32. You have completed an investigation of a complex money laundering scheme whereby an art gallery was “selling” ordinary paintings for tens of thousands of dollars. In actuality, several drug cartels were “buying” the paintings under shell company names by wiring payments to the gallery. Once enough transactions were completed, the art gallery owner transported cash in moving boxes in the back of his pickup truck across the US/Mexican border. What kind of graphic would you create to demonstrate the movement of money into the country and then back out again?

E. A flow diagram

F. A link chart

G. An association matrix

H. A timeline

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
CFE (989) 205-4182
7 of 8
by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD,
Brian@BrianLCarpenter.com
_________________________.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com

33. A/an organizes information about events or activities chronologically to determine what has, or may have occurred, and the impact that these actions have had on the activity under examination.

A. Link diagram

B. Timeline

C. Association matrix

D. Flow diagram

34. can be used in a number of situations to oversee cases and case data, organize it in meaningful ways, and even present information for use in reports during testimony.

A. CAATTs

B. PowerPoint

C. Bates numbering

D. Case management software

8 of 8

CHAPTER 12

1. The common fraudster is usually depicted with the following characteristics: first-time offender, middle-aged, male, well-educated, married with children, trusted employee, in a position of responsibility, and possibly considered a “good citizen” through works in the community or through a church organization. The terminology used to refer to such a person has gravitated over time from “accidental” to fraudster.

A. “Non-accidental”

B. “Intentional”

C. “Predator”

D. “Situational”

2. A repeat offender is not a fraudster; he or she is better described as a __________.

A. Situational; predator

B. Accidental; situational fraudster

C. Predator; white collar criminal

D. White collar criminal; situational fraudster

3. crimes occur when public and private companies, nonprofits, and government entities; otherwise, legitimate and law-abiding organizations are involved in a pattern of activity.

A. Organizational; criminal

B. Corporations; suspicious

C. Situational fraudster perpetrated; unregulated

D. Predator perpetrated; financial

4. Because the activities of predators and organizational crimes are more deliberate from the outset than those of the situational fraudster, they are _______________, have more __________________, and are

E. More collusive by definition; offshore banking activities; more difficult to investigate

F. Better organized; sophisticated concealment schemes; well-prepared to deal with auditors and other oversight mechanisms

G. More expensive; reach into the banking system; usually foreign entities

H. Harder to detect; offshore banking activities; complex in their internal structure

5. and include the following: money laundering associated with organized criminal activities, terrorism financing, money flows associated with drug trafficking, tax evasion, deliberate misrepresentation of an entity’s performance, and deliberate bankruptcy misreporting. Violations arising from these schemes may

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 7
by Mary-Jo Kranacher
Dick Riley
Brian
Carpenter,

include money laundering, corruption, tax fraud, financial statement fraud, conspiracy, and mail and wire fraud.

I. Crime rings; drug cartels

J. Career politics; shareholder controlled corporations

K. Complex frauds; financial crimes

L. FCPA provisions; FinCen monitoring

6. A central element of complex frauds and financial crimes is that of ___________.

A. Collusion

B. Invigilation

C. A more difficult-to-follow money flow (once it goes offshore)

D. Being more sophisticated than situational fraud.

7. When collusion is in involved in complex frauds, dollar losses ___.

E. Are usually to large to accurately estimate

F. Decrease dramatically

G. Increase dramatically

H. That are recovered by investigators can be shared among multiple jurisdictions

8. Research suggests that collusive fraud leaders are more likely to be with and a/an _________________.

I. Individuals with accounting know -how; a C-suite position; ability to override internal controls

J. Highly respected community leaders; a graduate degree; opportunity

K. Highly educated; ego/entitlement problems; non-shareable financial problem

L. Younger males; close ties to customers or vendors; wheeler-dealer attitude

9. The primary concern when collusion is involved is that are generally ineffective in preventing fraud and other financial crimes.

M. Auditors

N. Preventive internal controls

O. Governing boards of corporate entities

P. PCAOB mandates

10. internal controls include independent checks on performance and assurance of compliance with applicable laws and regulations.

Q. Research-based

R. Robust

S. Preventive

T. Detective

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 7

11. Another element of complex frauds and financial crimes is that perpetrators often mix with _____________________.

U. Business; pleasure

V. Legitimate business activities; their unlawful transactions

W. Accounting know -how; a criminal mindset

X. Unlawfully derived funds; shell companies and offshore bank accounts

12. When conducting a complex fraud investigation, it is critical for fraud and forensic accounting professionals to be aware that a greater may exist, even if it is not recognized as a _______________.

A. Organization; legal entity

B. Scam; problem out the onset of the investigation

C. Number of players; collusive fraud

D. Underlying scam; fraud at first glance

13. One of the main challenges for examiners in complex fraud and financial crimes investigations is to ________________________________.

E. Avoid becoming a target of organized crime rings

F. Isolate the illicit activities from the legitimate activities

G. Identify specific internal controls failed to prevent it

H. Identify the true beneficial owners of shell companies

14. is an important part of the process of dismantling an organization, particularly with complex frauds or financial crimes.

I. Instituting solid internal controls

J. Identifying and convicting criminal ringleaders

K. Asset forfeiture or seizure

L. Use of case management software

15. by seizing operational assets, confiscating cash, and freezing funds is an effective tool for forensic professionals in pursuit of their responsibilities.

A. Dismantling the organization

B. Concluding a complex fraud investigation

C. Sending clear message to criminals occurs

D. Increasing the materiality threshold of an audit

16. Financial statement fraud is, more often than not, _______________.

E. A function of organized crime

F. Usually involves rank-and-file employees as opposed to this in the c-suite

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 7

G. Against the law

H. A complex fraud

17. Corruption is by its very nature and tends to be _________.

I. Situational; organized

J. Unlawful; situational

K. Collusive; predatory

L. Organized; situational

18. The USA Patriot Act prohibits U.S. financial institutions from allowing correspondent account transactions with __________________.

M. Banks located in countries on the FCPA watchlist

N. Offshore banks

O. Shell banks

P. Money Service Businesses (MSBs)

19. is one of the workhorses of federal white-collar prosecutions and is available, among other statutes, to investigate and prosecute complex frauds and financial crimes.

Q. The DOJ

R. Mail fraud

S. Wire fraud

T. The Bank Secrecy Act (1970)

20. is the act of engaging in criminal activity as a structured group, and individuals in organized criminal organizations are often prosecuted for it under RICO.

A. Racketeering

B. Collusion

C. Predation

D. Organized crime

21. With respect to terrorist groups and money, the goal of fraud examiners and financial forensic professionals is to the international banking system.

E. Gain the cooperation of

F. Intercept wire deposits made in

G. Deny them access to

H. Track their investment activities in

22. Islamic terrorists have been known to use less restrictive overseas banks, or informal banking systems known as to smuggle cash.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 7

I. Adab

J. Hawala

K. Riba

L. Barzakh

23. Similar to the fraud triangle for the situational fraudster, the is necessary as a precursor set of conditions for terrorist activities to exist.

M. “organized crime fraud triangle”

N. “terrorism triangle”

O. “middle east triangle"

P. “collusive organizations triangle”

24. is, essentially, any activity designed to hide the nature, location, source, ownership, or control of proceeds used for, or derived from, criminal activity. Any time an examiner sees evidence consistent with this definition, a money laundering issue may exist.

Q. Conversion

R. Concealment

S. Organized crime

T. Money laundering

25. Money is can be easily transferred between individuals or entities, and that most persons would accept as an item of value or as a form of payment for goods, services, and debts owed.

A. Anything of value that

B. The root of fraud when it

C. A tracking problem when it

D. Necessary for terrorism and it

26. The process of laundering money relies upon movement and takes place in three distinction stages:

E. Depositing, structuring, withdrawing

F. Non-shareable pressure, opportunity, rationalization

G. Placement, layering, integration

H. The act, concealment, conversion

27. From the perpetrator’s perspective, the main issue with is ensuring that the source of the money and transaction itself appear to be legitimate.

I. Placement

J. Integration

K. Concealment

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 7
by Mary-Jo Kranacher
Dick Riley
Brian
Carpenter,

L. Collusion

28. A conspiracy involves three elements: (1) the co-conspirators must have an agreement (actus reus) between them, (2) the co-conspirators must act or demonstrate in inclination to commit a crime, and (3) _____________________________________.

A. The participants must mentally commit to the act through their state of mind (mens rea or intent)

B. The co-conspirators must have an active plan toward committing an SUA (ut actio)

C. The co-conspirators must demonstrate a collusive will (actum pra varicatione)

D. The participants have to possess prior knowledge that their intended act was unlawful (prior scientia)

29.

________________, went into effect on October 28, 2004. This Act effectively allows the first bank to touch a check to image the front and back of the check and then shred the original. Fraud examiners will have access to the electronic images that can serve as evidence.

A. Check Clearing for the 21st Century Act

B. The USA Patriot Act

C. The Bank Secrecy Act

D. The Know Your Customer Act (KYC)

30. With regard to the movement of money (value), the three V’s are important: volume, ___________, and venue.

E. Variety

F. Verve

G. Velocity

H. Valuation

31. offer an alternative to banks for both financial services and money laundering. This industry includes check cashers, money transmitters, foreign exchange dealers, and sellers of money orders, stored value products, and travelers’ checks.

I. Casinos

J. Shell banks

K. Credit unions

L. Money Service Businesses (MSBs)

32. is the process by which criminals use a legitimate trade to disguise their criminal proceeds from their unscrupulous sources.

M. Informal Value Transfer System (IVTS)

N. Attempts to avoid OFAC (Office of Foreign Assets Control)

O. Trade-Based Money Laundering (TBML)

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and Dick Riley Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 7
Mary-Jo
Brian
Carpenter,

P. Using prepaid Access Devices

33. Lack of transparency of can be a desirable characteristic for some legitimate uses of shell companies, but it is also an attribute that can make some shell companies ideal vehicles for money laundering and other illicit financial activity.

Q. Offshore banking

R. Beneficial ownership

S. Country of origin

T. High net-worth individuals

34. The primary distinction in whether an individual has committed tax fraud or simply committed an error is ______________________________________.

A. The intent of the individual

B. Whether the return was mailed or filed electronically

C. The knowledge (accountant) of the person filing it

D. Documentation

All bankruptcy cases are filed at the _____________________________.

E. State Bankruptcy Commission in which the person or entity resides

F. State court level in which the person or entity resides

G. Local courthouse in which the person or entity resides

H. Local district of the U.S. Bankruptcy Court

35. Bankruptcy crimes are investigated by the and prosecuted by the _____________, if warranted.

I. IRS; U.S. Treasury

J. FBI; U.S. Attorney’s Office

K. State Attorney General; state Bankruptcy Commission

L. FinCen Criminal Division; U.S. Bankruptcy Court

36. is the excessive sale of securities by a broker for the purposes of generating commissions.

A. Churning

B. Flipping

C. Round trip transacting

D. Front running

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
Kranacher and Dick Riley Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 7 of 7
by Mary-Jo
Brian
Carpenter,

CHAPTER 13

1. is an illegal offense that is committed where the computer or electronic data device is the criminal act.

A. Computer phishing; reprogrammed to carry out

B. Computer hacking; a tool in

C. Computer fraud; an object of

D. Computer crime; integral to

2. and are any defalcation, fraud, or financial crime accomplished by tampering with computer programs, data files, operations, equipment, or media, and resulting in losses sustained by the organization whose computer was compromised.

A. Computer-based fraud; financial crimes

B. Cybercrime; complex frauds

C. Computer crime; asset misappropriation schemes

D. Financial crimes; blockchain compromises

3. One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________.

E. Through the Dark Web where the value of the stolen funds can be stored on hidden servers

F. In violation of computer internal controls whether by management override or other means

G. With the intent to execute a fraudulent scheme or financial criminal act

H. When a hacker or virus successfully bypasses the firewall protecting financial data

4. is defined as an act where the computer hardware, software, or data is altered, destroyed, manipulated, or compromised due to acts that are not committed with the intent to execute financial fraud.

A. Computer crime

B. Hacking

C. Phishing

D. Distributed Denial of Service (DDoS)

5. Damaged equipment, restoration of data or programs, lost sales, lost productivity, and harm to reputation or goodwill are examples cited by the text of economic losses associated with:

E. Computer fraud

F. Computer crimes

G. Computer compromises

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and Dick Riley Test bank written by
L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 6
Mary-Jo
Brian

H. Computer risks

6. In a digital world, is often stored on computer servers of service providers and financial institutions, which do not necessarily have to exist in the jurisdiction of activity where the account holder resides.

I. Personally Identifiable Information (PII)

J. Value

K. A virus or malware program

L. Blockchain data

7. Bl ockchain is an example of:

M. Anti-phishing software

N. A cryptocurrency

O. A trojan horse virus

P. Distributed ledger technology

8. One of the greatest threats to information systems, in terms of digital crime, comes from:

Q. Organized criminals especially in around the former Soviet Union

R. Robotics Process Automation (RPA)

S. Employees inside an organization

T. HTTP exploits and buffer overflow exploits

9. The most prevalent method of committing computer fraud is ________________________________.

A. Alteration or falsification of input transactions (and/or documents)

B. Digital device hacking

C. Social engineering

D. Network weaving

10. Access privileges beyond those required to perform assigned job functions, exception reports not reviewed and resolved, access logs not reviewed, production programs run at unusual hours, and lack of separation of duties in the data center are cited in the text as examples of:

E. Social engineering

F. Red flags that may suggest a heightened risk to exposure from outside attacks and Distributed Denial of Service (DDoS) and ransomware such as Wannacry

G. Typical weaknesses existing in logical controls that exist in most small to medium organizations

H. Indicators of insider computer fraud that suggest increased risk and require additional security

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
Test
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 6
by Mary-Jo Kranacher and Dick Riley
bank written by Brian
Carpenter,

11. You have just completed a fraud examination in which you concluded, based on security camera footage, that an outside intruder entered the company dressed as a computer repair person. The footage shows the intruder chatting amiably with several individuals in the bookkeeping department, followed by logging onto their computers as they stand watching over his shoulder, using credentials they shared when he showed them his vendor badge (which was counterfeit). This type of attack is executed using:

I. Spear phishing

J. Shoulder surfing

K. Social engineering

L. a Trojan horse

12. Properly designed and implemented can be used to minimize the risk that any intercepted data can be used for nefarious purposes.

M. Logical controls

N. Encryption techniques

O. Simulation and modeling techniques

P. Privilege escalation exploits

13. Adequate hacker detection programs contain three primary components: (1) log files should be printed and regularly reviewed by the data security officer, (2) the data security function should have sufficient resources and staff to administer passwords, maintain security software, review system activity reports and follow up on potential security violations, and (3):

A. Periodic reviews of telecommunications security should be performed by internal or external auditors or other professionals

B. Anti-social engineering training for all users with passwords

C. Buffer over-flow backup and redundancy streaming with auto EXE piggybacking

D. Use of distributed ledger technology

14. Following someone with a badge reader in through a door, using an authorized user’s identification and password to gain digital device access, and tapping into the terminal link of a user to cause the device to believe that both terminals are the same person are ways that can be used to gain access to restricted areas. These techniques are known as

A. Piggybacking/impersonation

B. Simulation and modeling

C. Social engineering

D. Salami techniques

15. include management security policies, user authentication systems, data access controls, network firewalls, security awareness training, encryption

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
CFE (989) 205-4182
3 of 6
by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD,
Brian@BrianLCarpenter.com
_________________________.

algorithms, penetration testing, intrusion detection software, and incident response plans are examples of:

E. Privilege escalation exploits

F. Heuristic techniques

G. Anti-cybercrime social engineering

H. Logical controls

16. Which of the following is NOT one of the “top ten” Internet schemes in 2017:

A. Two-factor authentication similes

B. Advance feel loans/credit arrangers

C. Phishing/spoofing

D. Friendship and sweetheart swindles

17. Digitally connected consumers who (a) have social media presence, (b) tend to shop online, and (c) adopt new technologies have a higher risk of fraud.

E. 62%

F. 30%

G. 50%

H. 110%

18. In a pyramid scheme, the real profit is earned not by the sale of the product, but by the sale of _____________.

I. Foreign “tax-free” trusts

J. Prime bank notes

K. Get rich quick schemes such as “$50,000 First Ten Months” and “Secrets of Millionaires”

L. New distributorships

19. A fraud scheme in which the fraudster offers extremely high yields in a relatively short period of time (e.g., “a year and a day”) in which they purport to have access to “bank guarantees” is known as a scheme.

M. Prime bank traunch

N. Prime bank debacle

O. Prime bank note

P. Prime bank Ponzi

20. A type of Internet fraud that is intended to fool users into entering sensitive data (such as a password or credit card number) into a malicious website that impersonates a legitimate website is known as:

Q. Captcha

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
Test
written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 6
by Mary-Jo Kranacher and Dick Riley
bank
Brian
Carpenter,

R. Phishing

S. Spear phishing

T. Pharming

21. The U.S. government agency charged with investigating counterfeiting, credit card fraud, and some computer crimes is the:

A. Secret Service

B. Financial Crimes Enforcement Network (FINCEN)

C. Financial Action Task Force (FATF)

D. Internet Cybercrime Counterinsurgency Center (IC3)

22. Several attributes of the Internet make it an attractive operational location for criminal enterprises. First, individuals and businesses have come to realize that information is power. Criminals have determined they can profit by stealing and selling information. Second, cyberspace gives the criminal a worldwide reach. Third, The World Wide Web is relatively anonymous. Fourth:

E. The Dark Web makes it impossible to track, identify, capture, and prosecute cybercriminals.

F. Beyond the difficulty of catching cybercriminals is successfully prosecuting them.

G. Cybercriminals frequently use blockchain technology (i.e., distributed ledgers) to conceal their cybercrime.

H. The majority of cybercrime originates from offshore havens such as Nevis and St. Kitts where local laws allow criminals to flourish.

23. Money laundering, which involves disguising the origins of illegally generated cash flow to give it the appearance of legitimate income, is on the Internet due to ___________________.

I. Challenging; the pervasive number of scams

J. Impeded; federal watchdog agencies such as FinCen that track money flows

K. Enhanced; the near anonymity that can be achieved

L. Decreasing; an increased risk of detection by law enforcement

24. Worldwide efforts, often led by U.S. law enforcement, the International Monetary Fund (IMF), and the World Bank, have tried multiple approaches to combat money laundering in cyberspace, including measures aimed at reducing the ability to make anonymous financial transactions, mapping global payments to develop a better understanding of the flow of money, facilitating international information sharing, requiring all financial transactions to include “Know Your Customers” policies, and _______________________.

M. Conducting raids on cybercriminals coordinated with law enforcement from other countries

N. Harmonizing and coordinating international money movement regulations

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 6
by Mary-Jo Kranacher
Dick Riley
Brian
Carpenter,

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com

O. Digitizing all currency in order to improve ownership transparency

P. Inserting digital “die packs” into transactions so that money can be traced anywhere

25. A 1996 study placed the total annual value of global Internet money laundering at:

A. $500 billion

B. $50 billion

C. $500 million

D. $5 trillion

26. The primary federal law enforcement agencies that investigate domestic crime on the Internet include the FBI, the Secret Service, ICE, the U.S. Postal Inspection Service, and:

E. FinCen

F. IC3

G. The U.S. Attorney General

H. The ATF

27. IC3 refers to an agency that receives Internet-related criminal complaints, furthers research, and refers criminal complaints to federal, state, local, or international law enforcement/regulatory agencies. What do the letters stand for?

I. Internet Cybercrime Conviction Center

J. Internet Complaints Cybercrime Center

K. Internet Crime Complaint Center

L. Internet Cybercrime Counterinsurgency Center

6 of 6

CHAPTER 14

1. Ethics has certain key elements. Which of the following is NOT one of the four described elements in the text?

A. Ethics involves questions requiring reflective choice and their consequences to the individual and others (decision problems).

B. Ethics is often a useful guide for determining a course of action that is technically correct but that might be otherwise considered imprudent or unlawful

C. Ethics is concerned with outcomes, the assigned impact associated with making a decision where the impact reflects the underlying values of individuals and organizations.

D. Ethics considers the rules and regulations that are in place to guide behavior as well as the consequences for breaking those rules and regulations.

2. Three ethical principles were discussed in the text: (1) The imperative principle, (2) the utilitarian principle, and (3) ____________________________.

A. The generalization principle

B. The situational principle

C. The societal principle

D. The moral norm principle

3. Professions are set apart by five characteristics. Which of the following is NOT one of the five characteristics listed in the text?

E. Standards of conduct for dealing with the public, other professionals, and clients

F. A specialized body of knowledge

G. Mandatory certification or licensure of professional practitioners

H. An organizational body devoted to the advancement of responsibilities for the profession

4. Certified Fraud Examiners (CFE), as designated by the Association of Certified Fraud Examiners (ACFE), have a code of ethics. Which of the following is NOT one of the eight elements of that code?

A. A Certified Fraud Examiner, in conducting examinations, will obtain evidence or other documentation to establish a reasonable basis for expressing opinions regarding the guilt or innocence of applicable persons or parties.

B. A Certified Fraud Examiner shall not engage in any illegal or unethical conduct, or any activity which would constitute a conflict of interest.

C. A Certified Fraud Examiner shall continually strive to increase the competence and effectiveness of professional services performed under his or her direction.

D. A Certified Fraud Examiner will comply with lawful orders of the courts, and will testify to matters truthfully and without bias or prejudice.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 8

5. is the foundation for fraud deterrence and prevention both by individuals within an organization and by the organization itself.

E. Training

F. Internal controls

G. The tone at the top

H. Ethics

6. Ethics at the organizational level starts with __________________.

I. Sound hiring practices

J. Corporate governance

K. Senior management

L. Training

7. The first step in developing an ethical culture is _________.

A. A code of ethics signed by all personnel

B. To conduct criminal background checks on key employees

C. To establish a thorough antifraud training program

D. A fraud -risk assessment using COSO standards

8. One of the most effective antifraud deterrents is a hotline to receive anonymous tips from employees, customers, suppliers, vendors, contractors and others. According to the 2016 ACFE Report to the Nations, tips and accidental discovery account for almost of fraud detection.

E. 80%

F. 64%

G. 40%

H. 15%

9. Creating an antifraud environment also means minimizing opportunities for fraud. To accomplish this goal, companies need to establish and maintain a good internal control environment; _________________________; alert vendors and contracts to company policies; create tip hotlines; create expectations that fraudsters will get caught and will be punished; and proactively audit for fraud.

I. Select a competent external auditor

J. Conduct criminal background checks on key employees

K. Perform antifraud training on a regular basis

L. Monitor employee relationships for collusive potential

10. Best practices to deter fraud include ___________, surprise audits and reviews, open -door policies by upper-level management, and of internal controls.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 8
Mary-Jo

A. Job rotation; periodic testing

B. Criminal background checks on key personnel; annual review

C. Antifraud training; widespread dissemination

D. A fraud risk management assessment; evaluating the effectiveness

11. The who, what, where, when, how, and why are questions fraud examiners and forensic professionals often investigate once fraud is discovered. Those same attributes need to be considered, proactively, ________________________.

E. At the commencement of each audit cycle

F. As companies develop their antifraud environment

G. When tips are reported or allegations of fraud are made

H. Before shareholders invest their money

12. According to longitudinal research by the Ethics & Compliance Initiative (ECI), the most common form of ethical misconduct is leader ship

I. Having failed to take fraud risk seriously within the organization

J. Having been observed lying to employees and external stakeholders

K. Saying one thing but doing another (i.e., contradiction between words and behavior)

L. Perpetrating financial statement fraud

13. According to longitudinal research by the Ethics & Compliance Initiative (ECI), misconduct drops substantially when organizations have in place. Yet, only one in five employees [surveyed] indicate that their company had such.

A. Strong cultures

B. Strong leaders

C. Strong antifraud training

D. Strong reporting mechanisms

14. The text provides a five-step approach to compliance, fraud prevention, deterrence, and detection. Which of the following is NOT one of those five steps?

E. Know the exposures (brainstorming, risk assessment, audit planning)

F. Translate exposure into likely symptoms

G. Treat every red flag seriously because most indicate some kind of fraud

H. Pursue symptoms to their logical conclusion and ground examination conclusions in the evidence (evidence-based decision-making)

15. A robust compliance program helps an organization to and improve ______________,

I. Satisfy PCAOB obligations; its bottom line

J. Understand its obligations; its performance

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 8
_________________________.

K. Manage operational risks; shareholder relationships

L. Proactively identify risks; ethical behavior

16. The expectation of good governance and compliance efforts requires the attention of the _______________________________, to ensure overall ethical behavior in the organization, regardless of the type of organization (public, private, government, or notfor-profit) and regardless of relative size or industry.

A. Organization’s board of directors or equivalent oversight body

B. CEO and CFO

C. Internal and external auditors

D. Employees across all levels of the organization

17. Robust policies and processes are efficiency and effectiveness.

E. Useful but not always essential to operational

F. Critical elements of compliance

G. Sometime inadvertent impediments to organizational

H. Required for compliance but may not necessarily improve operational

18. Generally, compliance issues need to be examined the allegation.

A. At one level higher than the level of

B. In light of who makes

C. Relative to the likelihood of

D. That will validate or invalidate

19. With respect to organizational compliance, the text recommends being proactive, as well as following three best practices including communicating expectations, training employees in areas important for organizational compliance, and

E. Pursuing symptoms to their logical conclusion and ground examination conclusions in the evidence (evidence-based decision-making)

F. Ensuring overall ethical behavior in the organization, regardless of the type of organization (public, private, government, or not-for-profit) and regardless of relative size or industry

G. Making available a variety of reporting mechanisms, including anonymous tip hotlines

H. Knowing the exposures (brainstorming, risk assessment, audit planning)

20. Internal controls and fraud prevention efforts are not always _______________. In essence, the perceived benefits of prevention do not, or may not, exceed the costs of setting up robust prevention efforts. In some cases, while the cost of prevention is known, the benefits of prevention are much harder to quantify.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 8
by Mary-Jo Kranacher and Dick Riley
Brian
Carpenter,
__________________________.

I. Effective at their intended purposes

J. Leadership’s most effective tools

K. Cost-effective

L. Welcomed by board and management as necessary

21. Anecdotally, fraud deterrence is centered on two ideas: (1) the fear of getting caught, and (2) _____________________.

A. The fear of getting punished

B. A way for people to report tips anonymously

C. Internal controls

D. Accountability

22. Deterrence efforts should include detection controls (e.g., supervisory reviews, surprise audits). Such efforts would-be fraudsters are likely to get caught.

E. Prove

F. Create the perception that

G. Aren’t necessary in every size of organization, even though they suggest that

H. Encourage reporting by assuring tipsters that

23. One key aspect of effective deterrence is that the organization’s antifraud efforts need to be ________________.

I. Researched (in line with best practices)

J. Communicated

K. Critically evaluated by the board and management as to their effectiveness over time

L. Assessed by internal and external auditors

24. It’s the of those at the top that is more effective in encouraging personnel at all levels to act appropriately.

A. Conduct

B. Message

C. Authority

D. Accountability

25. The primary role of corporate governance is to investors, create long-term shareholder value, ensure investor confidence, and support strong and efficient capital markets.

E. Attract

F. Be a conduit for

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 8

G. Retain

H. Protect

26. The text list six mechanisms for effective corporate governance. Which of the following is NOT one of those six?

I. An organizational code of conduct supported by an embedded culture of honesty and ethical behavior

J. An independent and empowered board of directors

K. The offices of board president and CEO residing with the same individual

L. Effective legal and regulatory compliance and risk assessment

27. The fulfills its risk management responsibility by monitoring the organization’s effort to identify, prioritize, and respond to organizational risks.

M. Internal auditing department

N. Public relations team

O. External auditor

P. Audit committee

28. The words and actions of organizational leadership need to communicate the following: compliance is expected, fraud is not tolerated, fraudulent/unethical behavior is dealt with swiftly and decisively, and _________________________________.

A. Whistleblowers will not suffer retribution

B. Prosecution is to be expected

C. No one, including leadership, is above the law

D. Antifraud is everyone’s responsibility

29. Professional skepticism includes three key points: (1) A recognition that fraud, illegal acts, and unethical behavior may be present, (2) an attitude that includes a questioning mind and a critical assessment of audit evidence to carefully examine red flags, and (3) a commitment to _________________________________.

E. Striving to increase the competence and effectiveness of professional services performed under his or her direction.

F. Persuasive evidence (whether or not fraud or some other bad act is present)

G. Ensuring overall ethical behavior in the organization, regardless of the type of organization (public, private, government, or not-for-profit) and regardless of relative size or industry

H. Effective legal and regulatory compliance and risk assessment

30. One of the keys to fraud deterrence is to prevent, to the extent possible, applicants who have a demonstrated track record of from becoming employees.

I. Less than satisfactory job performance

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 8

J. Related parties transactions

K. Improper conduct, unethical behavior, or prior frauds

L. Being uncooperative

31. In terms of closing down the fraud triangle role of _______________, accountants properly trained and motivated, are integral to effective compliance and antifraud efforts.

M. Concealment

N. Motive

O. Rationalization

P. Opportunity

32. An effective fraud risk management and compliance program is at the heart of fraud deterrence. According to the Fraud Risk Management Guide, such a program has ten key points of focus. Which of the following is NOT one of those ten keys?

Q. The organization and its leadership must demonstrate a commitment to compliance and an antifraud program.

R. Disclosures of conflict-of-interest situations result in automated action. A conflict of interest involves “a situation in which a person is in a position to derive personal benefit from actions or decision made in their official capacity.”

S. Organizational leaders and stakeholders are asked to acknowledge and affirm their commitment to compliance and effective antifraud efforts by reading, understanding, complying, and signing documentation.

T. Compliance and fraud risk management evaluation improvement activities are designed to ensure high-quality programs.

33. Dr. Steve Albrecht references six types of anomalies that should be investigated at the earliest point of recognition: accounting anomalies, weak internal controls, analytical anomalies, lifestyle symptoms, _______________, and tips from potential informants.

A. Behavior symptoms

B. Related parties transactions

C. Prior convictions

D. Non-shareable financial pressures

34. Fraud prevention involves deploying tools and techniques designed to ensure that cannot occur.

E. False-positive red flags

F. Collusion

G. Corruption

H. A particular fraud

35. The fundamental internal controls are designed and implemented based on the separation of duties among “employees.”

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 7 of 8

I. Accounting

J. All

K. Four

L. Independent

36. Process controls are consistent with the notion of deterrence, including the perception that fraud acts will be discovered. As noted in the fraud deterrence module, basic process controls include (1) accounting reconciliation, (2) independent reviews, approvals and sign -offs. (3) physical inspections/counts, (4) Analyses (expectations/relationships), and (5) __________.

M. Signed code of conduct agreements (or ethics)

N. Pre-employment screening

O. Antifraud training

P. Audits (periodic and surprise)

(989)
8 of 8
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE
205-4182 Brian@BrianLCarpenter.com

CHAPTER 15

1. The association of Certified Fraud Examiners (ACFE) offers the Fraud Examiners Manual, a virtual encyclopedia of information that addresses four major topics: Financial Transactions and Fraud Schemes, Law, Investigation, and ________________.

A. Report writing

B. Valuation and calculation

C. Ethics

D. Fraud Prevention and Deterrence

2. Although testifying professionals themselves, they are expected to be able to describe the nature, extent, and timing of all work performed.

A. Need not complete the work

B. Need to complete the work

C. Must not complete the work

D. May not testify about the work done by others, but only work done by

3. Given the of fraud examination, litigation support, and forensic accounting engagements, practicing professionals should expect their work product to be scrutinized closely, and they should be prepared to describe and defend all choices made.

E. Complexity

F. Adversarial nature

G. Scope

H. Importance

4. The fraud examiner can have no opinion about the _______________________.

I. The accounting choices made by the client if they are GAAP compliant

J. The accuracy of prior financial statements unless he/she was involved in the audit

K. Guilt or innocence of alleged fraudsters

L. The conditions or causes within an organization that created the opportunity for fraud

5. General standards require professional competence, due professional care, ____________________, and the collection and analysis of sufficient relevant data to support (provide a reasonable basis for) the conclusions and opinions offered.

M. Professional cynicism

N. Proper engagement planning and supervision

O. Proper disclosures to be made if he/she is not independent

P. An ongoing commitment to improve one’s professional mastery of essential skills

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 8

6. is a methodology for resolving fraud allegations from inception to disposition.

Q. Properly authorized surveillance

R. Interviewing/confession seeking interview

S. Valuation and calculation

T. Fraud examination

7. The ultimate decision to qualify a witness as an expert is _________________.

A. At the judge’s discretion

B. Based on whether or not they are certified and otherwise appropriately credentialed

C. A 2/3 majority jury vote

D. Determined by a Daubert challenge

8. Generally, of the designated expert _______________. Work product includes not only the expert’s report and main analyses but also all notes, work papers evidentiary materials collected as part of the case, supporting analyses, research, documents, and data reviewed or relied upon by the expert as part of their engagement. Drafts of reports, handwritten notes, and marginalia are all considered part of the expert witness’s work product.

E. Only publicly disclosed portions of the work product; are discoverable by the other party

F. Only small portions of the work product; may be discoverable by the other party

G. The entire work product; is discoverable by the other party

H. None of the work product; is discoverable by the other party

9. The term is generally defined as used in or suitable to courts of law or public debate

A. Forensic

B. Judicial discoverability

C. Daubert challenge

D. Expert witness

10. The typical fraud examination, forensic accounting, or litigation support engagement usually requires of the business models, operational procedures, and other aspects unique to the organization and industry under examination.

E. A thorough level of expertise

F. The examiner to question the assumptions

G. The examiner to accept the assumptions

H. The development of at least some knowledge

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 8

11. AICPA Practice Aid 07-1 describes seven forensic investigative techniques and compares and contrasts them with similar evidence gathering activities of auditors. These seven are: public document reviews and background investigations, interviews of knowledgeable persons, confidential sources of information and evidence, laboratory analysis of physical and electronic evidence, physical and electronic surveillance, undercover operations, and ______________.

I. A commitment to nothing less than persuasive evidence

J. Development and analysis of competing hypotheses (e.g., use of an H-E Matrix or similar tool)

K. Graphical display tools such as link charts, flow diagrams, and timelines

L. Analysis of financial transactions, financial performance, financial condition and relevant non-financial evidence

12. The act, concealment, and conversion provide for evaluating the participation, intention, and actions of a party to litigation.

M. A workable alternative to reliance upon Cressey’s fraud triangle

N. A powerful investigative basis

O. Largely unassailable predication

P. Compelling evidence grounded in a story

13. The purpose of an interview is to ______________________.

Q. Obtain an admission of guilt without the use of coercion or inducements

R. Demonstrate objectivity in full view of the trier-of-facts

S. Gather testimonial evidence

T. Ultimately express an opinion as to who is guilty/innocent

14. In litigation-type engagements, forensic accountants and fraud examiners acting as consultants and experts in order to obtain admission of guilt.

A. Generally do not conduct interrogations

B. Are expected to participate in interviews

C. May offer inducements but may not coerce targets

D. Sometimes directly cross-examine witnesses

15. Forensic professionals understand that skilled fraudsters by altering documents or limiting the amount and timing of data made available to the opposing side.

E. Often move their gains offshore

F. Often manipulate data

G. Use shell companies created

H. Try to appear innocent and will not generally interfere with investigations

16. Similar to fraud examinations, forensic accounting engagements are ____________.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 8

I. Regulated by the PCAOB

J. Highly specialized affairs

K. Expensive to conduct

L. An iterative process

17. Examinations, in essence, are where intersects with of the antifraud and forensic accounting profession.

M. Justice; the integrity

N. Convicting white-collar criminals; the professional standards

O. Evidence; the tools and techniques

P. The fraudster’s skill; the skill

18. The ability to is both an art and a science.

A. Estimate damages

B. Develop a compelling storyline even if not completely grounded in the evidence

C. Create demonstrative evidence such as link charts

D. Interrogate cybercriminals

19. The forensic accountant as an independent, objective professional must examine the and compare each side’s position to the evidence.

E. Relevant non-financial data

F. Differing storylines

G. Accounting anomalies in the case

H. Past and present performance of the organization

20. Generally, to successfully pursue a claim for legal damages, the allegedly injured party must prove two points: (1) liability, and (2) ________________.

I. Intent

J. Conversion

K. Damages

L. Tortious harm

21. is central to the issue of damages.

M. Intent

N. Substantiality

O. Causality

P. Harm

22. are those amounts designed to compensate the injured party for some specific loss.

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 8

A. Compensatory damages

B. Punitive awards

C. Special awards

D. Clawback provisions

23. Economic loss or restitution damages compensate for a specific loss and recognize that the damages _______________________.

A. May carry into future periods

B. Arose out of intentional or negligent causality

C. Awarded are intended to punish the defendant as a financial deterrent

D. Put the injured parties back where they would have been if the cause of action had not happened

24. One of the first steps in measuring commercial damages is determining _____________.

A. The loss period

B. How much of the evidence will be available through the discovery process

C. Whether opposing counsel’s “storyline” is more compelling than your side’s

D. Causality

25. The measurement period for commercial damages related to torts can be more difficult because, unlike breach of contract claims, _________________________.

E. A relationship between the parties can’t always be proved

F. A preliminary starting point is not available

G. The liability may include punitive damages

H. Causality is not always clear-cut

26. The accepted concept for measuring lost revenues, excess expenses, and/or lost profits is to project these incremental changes _________________.

I. Into the future

J. As having been directly caused by the adversarial party regardless of intent

K. Based on industrywide norms

L. Over a loss period

27. The method of quantifying lost revenues and increased expenses whereby some data exist that can be used to demonstrate how the revenues, expenses, and/or profits related to the liability claim for the loss period would have been performed “but for” the actions, or lack thereof, of the adversarial party, is referred to as the method.

M. Standard industrial classification (SIC)

N. Before and after

O. Benchmark

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 8

P. Calculating lost profits

28. Although the liability claim alleged by the plaintiff against the defendant is often centered on lost revenues and/or incremental expenses, the actual amount of damages is ___________________.

A. A function of lost profits

B. Determined by whatever a jury considers “reasonable”

C. Can include punitive multipliers

D. Virtually limitless

29. Regardless of the choices made and the underlying assumptions, the “tire hits the road” for antifraud professionals and forensic accountants when they ___________________.

E. Maintain their commitment to persuasive evidence

F. Communicate and defend their work

G. Abide by the ethical standards of their professional association(s)

H. Name the guilty party clearly and compellingly

30. engagements are created to value a business, business ownership interest, security, or intangible asset. Similar to the estimates associated with commercial damages, in the case of these engagements, the work of the forensic accountant requires professional ___________________.

A. Valuation; competence and judgment

B. Before and after; communication

C. Yardstick; certification

D. Loss period; skepticism

31. In assessing what is necessary to complete a valuation engagement with professional competence, one should consider the ability to identify, gather, and analyze the relevant data; apply the appropriate valuation methodologies; incorporate critical thinking, objectivity, and professional judgment in the decision-making process that will ultimately determine ___.

E. One’s credibility/reputation within the profession

F. The amount of value

G. One’s likely success in any given engagement

H. The causality underlying the claim

32. AICPA Statement on Standards for Valuation Services No. 1 describes two types of engagements:

I. Civil and criminal

J. Commercial and individual

K. Valuation and calculation

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 8

L. Contractual and tortious

33. Essentially, two considerations ultimately determine the market and fair market value of an asset: the future income stream that can be derived and the difference between that and ___________________________.

A. The income stream from alternative investment options

B. The present value of a lump sum

C. The future value of an annuity

D. The best-case scenario based on industry norms

34. Generally, at least four methodologies can be used to develop the risk-adjusted discount rate and its related cash flows (income): CAPM, the bond-equity additive method, the build-up method, and the _____________________.

E. Loss-period average

F. Risk and return weighted future value

G. “Pin the tail on the donkey” method

H. Weighted average cost of capital

35. One of the most challenging issues associated with the discounted income and cash flows model is income and cash flows ___________.

I. Establishing; for the loss period

J. Projecting; into the future

K. Auditing; during similar historical periods

L. Benchmarking; based on industry norms

36. The asset valuation model starts with the assumption that the organization’s does a reasonably good job of identifying the company’s assets and liabilities

M. Management audit disclosure notes

N. P&L

O. Earnings management strategy

P. Balance sheet

37. The three types of damages that ensue in personal injury cases are losses to the individual, losses to survivors, and losses to _______________.

Q. Future earnings

R. The estates of decedents

S. The income of antecedents

T. Alternative investments

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 7 of 8

38. One of the major challenges in calculating losses in personal injury cases arises from _______________.

U. Incomplete data

V. Foreseeable risks

W. Inflation

X. Establishing causality

39. The primary circumstance with court actions and related loss claims is that the injured person survived the incident and ________________________.

Y. Was not the cause of it

Z. Subsequently lost income

AA. Suffered as a result

BB. Has financial obligations to minor children

40. An injured person may suffer up to five types of losses, both past and future. Which of the following is NOT one of the five losses listed in the text?

A. Losses from pain and suffering

B. Losses associated with the ability to perform “non -market” services

C. Loss of employment benefits associated with earnings

D. Medical costs

41. The estimate of earning losses requires the evaluation of five examination areas. Which of the following is NOT one of the five areas listed in the text?

E. Analysis of employment history and related past earnings

F. Projection of probable career paths: before and after the loss

G. Benchmark of mobility freedom: before and after the loss

H. Consideration of other factors on earnings losses such as age and experience

42. The fundamental premise in a wrongful death examination is that _____________________.

A. The loss must be sustained by the survivors

B. The decedent was not at fault

C. The loss can be calculated or valued only if sufficient data exist

D. The plaintiff was either willful or reckless

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 8 of 8

CHAPTER 16

1. James (Jimmy) J. Vaughn is a Certified Public Accountant who worked as a forensic auditor with the U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) for 32 years. He retired as the Deputy Division Chief of the Financial Investigative Services Division, responsible for all ATF financial investigations on the east coast of the United States. In the text, Jimmy offered the following key points of advice for those testifying in a court of law. These included: Be alert as to how you answer questions about your qualifications posed by the opposition while qualifying as an expert witness, offer factbased testimony, be prepared, be objective, be truthful, avoid technical jargon, be aware of your body language, and ___________.

A. Be unequivocal in opining as to the guilt or innocence of the defendant

B. Give only yes or no answers during cross-examination by opposing counsel

C. Know the law (i.e., the provisions applicable to the case)

D. Maintain your composure

2. is characterized as the steps necessary to “clean up the mess” after a fraud, financial crime, or civil dispute has been discovered, examined, and the examination results have been prepared.

A. Remediation

B. Predication

C. Mitigation

D. Propitiation

3. Antifraud and forensic accounting professionals would like to be a resource that the client can use to obtain the largest recovery allowed by the evidence and the law.

E. Employee dishonesty insurance coverage

F. Their work product

G. The U.S. Justice System

H. The convicted party

4. Money stolen, other assets stolen, value lost interest, fines and penalties, and punitive damages are listed in the text as examples of:

I. Types of monetary values that can be converted to Bitcoin

J. Types of monetary losses attributable to white collar crimes

K. Types of monetary remuneration that may be available to victims and plaintiffs

L. Types of monetary losses that have to be investigated before a case goes to trial

5. Normally some of the issues to consider when attempting to recover assets include the following: (1) Amounts stolen and amounts that may be recovered, (2) the prospect of

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 1 of 10

winning the case, (3) the value of the assets held by the defendant and whether they are sufficient, and (4) ______________________________________________.

M. Specificity, whereby the investigator can track the exact assets in question from the plaintiff to the defendant

N. The difficulties associated with trying to recover assets under many foreign jurisdictions

O. The cost of converting assets back into cash (e.g., selling stolen real estate or auctioning stolen art)

P. The legal costs involved in pursuing the financial claim and subsequent collection

6. The first step to successfully recover money and other assets is to ______________.

A. Identify them during the examination process

B. Petition a federal court to issue a 45-day freeze on the account where the funds are residing immediately upon successfully locating it

C. Work with counsel to submit a Section 803 filing for the plaintiff

D. File for disgorgement under Sarbanes-Oxley § 304

7. To prove fraud, the investigator needs to provide evidence that in the act, the concealment, and the conversion.

A. The perpetrator was involved

B. Intent was clearly demonstrated

C. Predication exists

D. Specific laws were violated

8. Generally, in order to be in a position to recover money from a civil suit, the injured party must prove two points: (1) Liability: the defendant was responsible for all or part of the damages claimed, and (2) ________________________________________.

E. Misconduct: the actions leading to the loss by the claimant were the result of someone acting outside the scope of their agency

F. Intent: the defendant could reasonably foresee that his or her actions, or lack thereof, were likely to result in damages to the plaintiff

G. Losses or damages: the claimant suffered damages as a result of the actions or inactions of the offending party

H. Reasonable certainty: the amount of damages claimed are reasonable (to a jury)

9. The types of losses available for recovery in a civil suit include (a) compensatory damages and restitution of losses such as value, cash, and other assets; (b) economic losses (e.g., wages, incremental expenses, or profits); (c) reliance, intended to restore the claimants back to where they would have been but for the action of the defendant; and (d)

I. Legal costs, to pursue the financial claim and subsequen t collection

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by
and
Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 2 of 10
Mary-Jo Kranacher
Dick Riley
___________________________________.

J. Punitive damages, to punish the defendant

K. Intangible asset losses, for example, losses to an organization’s goodwill value

L. Pain and suffering losses, arising from the victimization of the claimant by the perpetrator’s actions (or inactions)

10. In a civil framework, the plaintiff must demonstrate three attributes: (1) That the defendant was the proximate cause of any damages, meaning that the plaintiff caused or contributed to the lost amounts as a direct result of the conduct at issue, (2) ____________________, and (3) that the defendant could reasonably foresee that his or her actions, or lack thereof, were likely to result in damages to the plaintiff.

M. Intent was clearly demonstrated by the concealment phase of the fraud

N. Conversion resulted in assets that can be located and returned or liquidated

O. Specificity, whereby the investigator can track the exact assets in question from the plaintiff to the defendant

P. Reasonable certainty as to the amounts (damages) claimed

11. the money assumes an ability to directly track funds from the victim to the alleged perpetrator and involves specificity, whereby the investigator can track the exact assets in question from the plaintiff to the defendant.

Q. Recovering

R. Following

S. Tracing

T. Locating

12. In contrast to the money, is a process of identifying both its present location and its current form of value relevant to the claim brought by the plaintiff.

A. Following; tracing

B. Tracing; following

C. Tracking; tracing

D. Following; tracking

13. In theory, complex financial crimes, fraud, organized crime, drug trafficking, money laundering, and terrorism financing can be by the money.

E. Investigated; tracing

F. Remediated; following

G. Prosecuted; following

H. Prevented; safeguarding

14. A that “money” is no longer cash and coin; it can be anything of value that can be traded, transferred, or sold, such as cash, coin, certificates of deposit, stocks, bonds, money orders, cashier’s checks, cyber currencies, airline tickets, gift

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 3 of 10

certificates, gift cards, prepaid credit and debit cards, diamonds, jewels, minerals, mineral rights, or deeds.

I. Fraud perpetrator understands better than most

J. Complicating factor is

K. Valuable commodity in the global economy is

L. Consumer benefit of 21st century technology is

15. Once illegal money has been combined with money from legitimate sources, one can no longer the money; the money must be __________.

M. Recover; returned legally through the judicial system

N. Investigate the source of; written off as a loss in most cases

O. Follow; traced

P. Hide; taxed

16. One of the issues related to tracing money involves assets that _____________. Generally, the courts have held that the perpetrator was acting to make an investment on behalf of the victims or plaintiff and any increases accrue to the victim or plaintiff; however, that may not always be the case in every jurisdiction.

Q. Have been converted in back into cash and moved offshore

R. Are concealed in shell companies where the beneficial owner cannot be determined

S. Have have depreciated or have little to no residual value

T. Have increased in worth

17. Freezing orders, restraining orders, and are used early in a legal action

to secure funds so that they do not disappear prior to obtaining a favorable verdict or negotiated settlement.

U. Ex parte orders

V. Lockout orders

W. Search warrants

X. Judicial injunctions

18. Preferably, freezing orders are obtained ex parte so that __.

A. They can surprise the defendant and prevent assets from disappearing before the resolution of the case

B. The claimant’s team can immediately confiscate cash, assets, or property

C. The judge has time to consider all the facts supporting the claim

D. The claimant is caught off-guard

19. A is a formal and final decision made by a court of law.

E. Judicial injunction

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 4 of 10

F. Petition

G. Freeze order

H. Judgment

20. When a defendant does not pay amounts owed to victims and plaintiffs as outlined in a ____________, the claimant may return to court to obtain various types of orders for the seizure and sale of specific property, usually at auction. In some jurisdictions, these court orders are referred to as confiscation orders, and in others they are called compensation orders or ______________.

I. Judicial injunction; freeze orders

J. Freeze order; judicial injunctions

K. Judgment; forfeiture orders

L. Petition; damage awards

21. is similar to a garnishment and requires that the defendant’s debtors pay the claiman t (the victim or plaintiff) instead of remitting the money to the defendant.

M. An ex parte order

N. A third -party debt order

O. A claimant judicial bypass order

P. A judicial assignment

22. Providing consultations, periodic communication of findings and investigative issues, wiring reports, attendance at opposing party depositions, being deposed, testifying in hearings, being present during settlement negotiations, and testifying in court are all examples in the text of:

A. Supporting the plaintiff or prosecuting attorney through the second major area of the remediation process

B. Common activities of fraud examiners and forensic accountants while building a case against a target

C. Costly support activities that the investigator should avoid when possible

D. Strategies used by opposing counsel with the intent of disqualifying the fraud examiner from becoming an expert witness in a case

23. No matter what the engagement, the professional should remember that he or she __________________________.

E. Must maintain their independence from counsel

F. Is not an advocate for any side

G. Will be expected to express an opinion of guilt or innocence grounded in the evidence

H. May only charge what the market will bear for their services

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
Test
CFE (989) 205-4182 Brian@BrianLCarpenter.com 5 of 10
by Mary-Jo Kranacher and Dick Riley
bank written by Brian L. Carpenter, PhD,

24. Generally, must testify to firsthand facts and knowledge. They are not permitted to offer opinions unless those views are based on specialized knowledge required as part of their normal responsibilities.

A. Fact witnesses

B. Expert witnesses

C. Fraud examiners and forensic accountants

D. Claimants/defendants

25. A/an witness may be permitted to offer “everyday” opinions under three conditions: (1) The opinion must be based on the witnesses personal perceptions (as opposed to hearsay), (2) The opinion must be helpful to the trier-of fact, and (3)

E. Expert; the opinion must not be confusing to the average person in everyday life

F. Expert; the opinion must be based on specialized knowledge of the witness, for example, a mine supervisor

G. Fact; the opinion must be the product of reasoning processes familiar to the average person in everyday life

H. Fact; the opinion must pertain to something not already known to the trier-of-fact

26. An expert witness is one who, by virtue of education, profession, publication, or experience, is believed to have special knowledge of his or her subject beyond that of the average person, ______________________________________________.

I. And is willing to use that knowledge in the pursuit of justice without thought of personal gain

J. In order to explain technical information to judges, juries, and opposing counsel

K. So that the truth in a case can be knowledgeably and objectively established

L. Sufficient that others may officially (and legally) rely upon the opinion

27. To educate counsel, reconstruct cash flows and performance from records, guide additional investigation and discovery, make connections, determine whether evidence supports theories of the case, provide objective evaluations of the information data and evidence, draft reports and exhibits, and offer deposition and trial testimony are all examples of _________________________________________:

M. The role of fact witnesses in a case

N. The role of the fraud examiner or forensic accountant when working with attorneys and other persons related to legal matters

O. Responsibilities that only qualified law enforcement personnel should engage in

P. Fraud examiner or forensic accountant independence

28. An expert’s opinion is subject to two types of challenges:

Q. Disqualification and overruled

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test bank written by
L.
PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 6 of 10
by Mary-Jo Kranacher
Dick Riley
Brian
Carpenter,
__________________________________.

R. Opinion v fact and hearsay v firsthand knowledge

S. During deposition and cross-examination

T. The Daubert Rule and The Frye Rule

29. Jim DiGabriele, CPA, PhD, CVA, shared an anecdote in the text where a forensic accountant offered a different answer during a deposition than the one he gave on direct examination. The lesson learned as shared by Jim urges professionals to:

U. Avoid contradicting yourself (and thereby impair or destroy your credibility).

V. Always tell the truth.

W. Read your deposition transcript before trial testimony and remember the details.

X. Avoid taking sides or agreeing to be an advocate.

30. The professional should ensure that all conclusions and opinions are grounded in the evidence, supportable, and _______________.

Y. Cost-effective

Z. Objective

AA. Defensible

BB. Relevant

31. The analyses and central issues in a case should be presented in a coherent storyline clear, accurate, precise, and relevant to the issues under consideration; presented in reasonable depth to establish credibility; and logical. The fraud examiner or forensic accountant could have vulnerability where the storyline is supported by______________________.

A. Weak evidence or the logical leap is rather large

B. Expert opinion v fact

C. Circumstantial evidence

D. Conclusions that are dependent on one’s “interpretation” of accounting procedures

32. are positions grounded in the evidence, whereas are based on the fraud examiner’s or forensic accountant’s interpretation of the facts.

E. Facts; conclusions

F. Conclusions; opinions

G. Depositions; answers to cross-examination questions

H. Fact-based options; storyline elements

33. For the fraud examiner or forensic accountant, is essential in substance and in appearance.

I. Preparation

J. Professionalism

K. Tone

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 7 of 10

L. Credibility

34. The essence of criminal and civil litigation is both sides get the opportunity to present the facts and circumstances from their opposing perspectives.

M. Fairness and balance

N. Predicated on a presumption of goodwill until proven otherwise

O. Managed mediation

P. Controlled confrontation

35. is a pretrial process during which the parties to a civil litigation are allowed to examine the other side’s fact and expert witnesses.

Q. The preliminary phase

R. A mediated arbitration

S. A deposition

T. An ex parte injunction

36. Essentially, based on discovery in civil litigation (including depositions), each side knows the other side’s theory of the case and what the witnesses are expected to say. As such, the civil trial becomes, to some extent, ___.

U. A cruel game in which the fraud examiner is the court jester

V. A fait accompli where the verdict is concerned

W. An act of presentation and choreography

X. An anachronistic ritual to establishing liability

37. Direct examination is the intersection of and ____________.

A. Credibility; preparation

B. The law; accounting

C. Facts; opinions

D. Attorneys (on both sides); witnesses (on both sides)

38. The first goal of the opposing attorney during cross-examination is to ____________________.

E. Discover what the expert knows and to assess their level of preparation

F. Prove that there is some other reasonable explanation for the missing money

G. Present an alternative narrative (i.e., a different interpretation) of the facts

H. Challenge the expert’s credibility, if possible

39. The Primrose Path, The Nodding Chicken, Ask Until You Admit, You’ve Got to Be

Kidding, This Means Nothing, and You Really Didn’t Mean to Say, are all examples of what?

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 8 of 10

A. Techniques used in cross-examinations

B. Scenarios in which the defendant is extremely vulnerable

C. Diversions directed at the jury which are employed by attorneys when the facts are not in their client’s favor

D. Chapters in a book titled, The Expert Testimony Game: How to Win Big While Maintaining Your Credibility

40. A good system of internal controls has four separate areas of responsibility: one person is responsible for safeguarding the assets; another person has authority over transactions associated with the asset; a third person is responsible for recording transactions for assets; and a fourth person should _____________________.

E. Prepare the financial statements

F. Orchestrate a system of audits, physical inventories, and reconciliations

G. Perform criminal background checks on people with access to the assets

H. Investigate allegations of fraud, waste, and abuse

41. At the inception of an examination, the fraud examiner or forensic accountant needs to develop an understanding of:

I. How most fraud occurs within that particular industry

J. The players involved

K. The control environment

L. Red flags in order to establish the scope

42. At a minimum, corporate governance should address three issues: (1) creating and maintaining a culture of honesty and high ethics, (2) evaluating fraud risks and implementing programs and controls to mitigate them, and (3) _____________________.

M. Keeping sound meeting minutes that reflect that the board reasonably performed its duty of care

N. Engaging in strategic planning as a means of ensuring appropriate company goals

O. Hiring a capable CEO and maintaining robust oversight of that individual

P. Developing an appropriate antifraud oversight process

43. The following is a five-step approach to fraud prevention, deterrence, and detectio n: (1) know the exposures, (2) translate exposure into likely symptoms, (3) always be on the lookout for these symptoms, (4) build supervisory, review and audit programs to look for symptoms, and (5) ________________________________________.

Q. Maintain defensible documentation on all investigations

R. Establish a proper tone at the top in both words and actions

S. Follow up on these issues to their logical, evidence-based conclusions

T. Train employees to be able to identify and report these issues

Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.)
and
Test bank written by
L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com 9 of 10
by Mary-Jo Kranacher
Dick Riley
Brian

44. According to the AICPA’s Statement on Auditing Standard (SAS) No. 99, “Risk Factors Relating to Misstatements Arising from Fraudulent Financial Reporting,” high turnover of senior management, counsel, or board members may be evidence of:

A. A complex or unstable organizational structure

B. Ineffective monitoring of management

C. Internal controls are deficient

D. Excessive pressure on management or operating personnel to meet financial targets set by the board of directors or management, including sales or profitability incentive goals.

10 of 10
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE (989) 205-4182 Brian@BrianLCarpenter.com

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.