Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Premium Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
Which of the following is not a consequence of alerting a suspected fraudster about an investigation?
Correct
If a suspect is inadvertently informed of an investigation, a number of different adverse events might occur. For instance, the fraudster might attempt to destroy or alter evidence, making it more difficult to conduct the investigation. Additionally, a forewarned suspect might attempt to flee, cut off contact with associates, or try to place the blame on somebody else.
Incorrect
If a suspect is inadvertently informed of an investigation, a number of different adverse events might occur. For instance, the fraudster might attempt to destroy or alter evidence, making it more difficult to conduct the investigation. Additionally, a forewarned suspect might attempt to flee, cut off contact with associates, or try to place the blame on somebody else.
-
Question 2 of 30
2. Question
The measures that a fraud examiner can take to avoid alerting a suspected culprit excludes
Correct
Here are some basic measures organizations and fraud examiners can take to avoid notifying suspected perpetrators who are under investigation:
1. Know who is being investigated and what they can access.
2. Limit the extent of any discussions.
3. Only inform those who need to know.
4. Inform employees of the consequences of a confidentiality breach.
5. Work discreetly without disrupting the office’s normal course of business so that employees do not know that an investigation is being performed.
6. Work fast.
7. Investigate during nonbusiness hours.Incorrect
Here are some basic measures organizations and fraud examiners can take to avoid notifying suspected perpetrators who are under investigation:
1. Know who is being investigated and what they can access.
2. Limit the extent of any discussions.
3. Only inform those who need to know.
4. Inform employees of the consequences of a confidentiality breach.
5. Work discreetly without disrupting the office’s normal course of business so that employees do not know that an investigation is being performed.
6. Work fast.
7. Investigate during nonbusiness hours. -
Question 3 of 30
3. Question
Regarding the request for confidentiality from participants, which of these is true?
Correct
To preserve the confidentiality of an investigation, management might (if legally permissible) remind participants to refrain from discussing investigation information with anyone or require participants to sign a confidentiality oath vowing not to divulge any information regarding the investigation. Generally, an employer can ask employees to keep an investigation confidential when there are legitimate business justifications for making such requests.
Incorrect
To preserve the confidentiality of an investigation, management might (if legally permissible) remind participants to refrain from discussing investigation information with anyone or require participants to sign a confidentiality oath vowing not to divulge any information regarding the investigation. Generally, an employer can ask employees to keep an investigation confidential when there are legitimate business justifications for making such requests.
-
Question 4 of 30
4. Question
According to the U.S National Labour Relations Board, which of the following is considered a legitimate business justification for confidentiality?
Correct
The NLRB provided the following suggestions for cases that would justify a legitimate business justification:
1. Witnesses needed protection.
2. Evidence was in danger of being destroyed.
3. Testimony was in danger of being fabricated.
4. There was a need to prevent a cover-up.Incorrect
The NLRB provided the following suggestions for cases that would justify a legitimate business justification:
1. Witnesses needed protection.
2. Evidence was in danger of being destroyed.
3. Testimony was in danger of being fabricated.
4. There was a need to prevent a cover-up. -
Question 5 of 30
5. Question
Which of the following is not a procedure for guarding case information?
Correct
To help preserve confidentiality, the investigation team members should guard case information. Here are some recommended procedures for protecting case information:
1. Store all confidential documents in locked file cabinets or rooms accessible only to those who have a need to know.
2. Protect all electronic information via firewalls, encryption, and passwords.
3. Clear desks of any case information before stepping away.
4. Lock computers when leaving workstations.
5. Mark all case information, whether tangible or electronic, as confidential.
6. Avoid talking about the investigation in public or in any place where other employees could hear the communications.
7. Avoid using email or other electronic means (e.g., text messages or instant messages) to transmit confidential case information.Incorrect
To help preserve confidentiality, the investigation team members should guard case information. Here are some recommended procedures for protecting case information:
1. Store all confidential documents in locked file cabinets or rooms accessible only to those who have a need to know.
2. Protect all electronic information via firewalls, encryption, and passwords.
3. Clear desks of any case information before stepping away.
4. Lock computers when leaving workstations.
5. Mark all case information, whether tangible or electronic, as confidential.
6. Avoid talking about the investigation in public or in any place where other employees could hear the communications.
7. Avoid using email or other electronic means (e.g., text messages or instant messages) to transmit confidential case information. -
Question 6 of 30
6. Question
Which of the following statements is true?
Correct
It is important to remember that witnesses (those who testify at trial) are more important to a fraud case than documents. While
documents are important in giving a witness and the case credibility, witnesses who spend too much time focusing on a document’s details often confuse and bore the fact finders.Incorrect
It is important to remember that witnesses (those who testify at trial) are more important to a fraud case than documents. While
documents are important in giving a witness and the case credibility, witnesses who spend too much time focusing on a document’s details often confuse and bore the fact finders. -
Question 7 of 30
7. Question
Regarding sources of information in a fraud investigation, which of the following is false?
Correct
Information can sourced for internally or externally.
Internal sources—those generated and kept within the subject organization—are often the only resource for certain types of documents, such as accounting and business tax records, copies of canceled checks, or employee personnel files, unless the fraud examiner has the subject’s consent or a legal order to obtain those documents from other parties.
External sources can be particularly crucial in helping investigators locate missing assets; locate witnesses and suspects; determine ownership in vendors, competitors, and other related parties; research the suspects’ assets and financial condition; and document the suspects’ lifestyle and background information.Incorrect
Information can sourced for internally or externally.
Internal sources—those generated and kept within the subject organization—are often the only resource for certain types of documents, such as accounting and business tax records, copies of canceled checks, or employee personnel files, unless the fraud examiner has the subject’s consent or a legal order to obtain those documents from other parties.
External sources can be particularly crucial in helping investigators locate missing assets; locate witnesses and suspects; determine ownership in vendors, competitors, and other related parties; research the suspects’ assets and financial condition; and document the suspects’ lifestyle and background information. -
Question 8 of 30
8. Question
Regarding public records, which of following is true?
Correct
Public records are documents that a governmental agency is required to keep by law or that are necessary to discharge the duties imposed by law. Of course, not all government records are open to the public, and the fact that a document is a public record does not mean it can be accessed without restriction.
Public records are different from publicly available information. Publicly available information is information that has lawfully been published or broadcast to the public for consumption.Incorrect
Public records are documents that a governmental agency is required to keep by law or that are necessary to discharge the duties imposed by law. Of course, not all government records are open to the public, and the fact that a document is a public record does not mean it can be accessed without restriction.
Public records are different from publicly available information. Publicly available information is information that has lawfully been published or broadcast to the public for consumption. -
Question 9 of 30
9. Question
Which of the following can serve as a source of basic information about an individual?
Correct
Much of the basic information about an individual can be found in audit documents, business records, personnel records, court records, the Internet, and conversations with people who know the subject.
Incorrect
Much of the basic information about an individual can be found in audit documents, business records, personnel records, court records, the Internet, and conversations with people who know the subject.
-
Question 10 of 30
10. Question
The following should be considered when conducting a public records search of a business, except
Correct
When conducting a public records search of a business, the fraud examiner should consider the following:
1. Is the business incorporated?
2. Where does the company do business?
3. What type of business is it?
4. Has the business sued or been sued?
5. Does the business have real property?
6. Does the company finance equipment?
7. Does the company charge sales tax (if applicable in the jurisdiction)?
8. Is the organization required to make filings that are available to the public?
9. How long has the company been in business?Incorrect
When conducting a public records search of a business, the fraud examiner should consider the following:
1. Is the business incorporated?
2. Where does the company do business?
3. What type of business is it?
4. Has the business sued or been sued?
5. Does the business have real property?
6. Does the company finance equipment?
7. Does the company charge sales tax (if applicable in the jurisdiction)?
8. Is the organization required to make filings that are available to the public?
9. How long has the company been in business? -
Question 11 of 30
11. Question
Which of these is not an example of a non public record?
Correct
Nonpublic records are information about a person or business that is considered to be private and confidential. Some of the most valuable types of nonpublic records include:
1. Banking records
2. Tax records
3. Credit records of individuals (but not business credit reports, as this information is generally not protected)
4. Phone records
5. Credit card account records
6. Personal health care recordsIncorrect
Nonpublic records are information about a person or business that is considered to be private and confidential. Some of the most valuable types of nonpublic records include:
1. Banking records
2. Tax records
3. Credit records of individuals (but not business credit reports, as this information is generally not protected)
4. Phone records
5. Credit card account records
6. Personal health care records -
Question 12 of 30
12. Question
The following are local sources of records except?
Correct
The following are local sources of records:
1. Building inspector records
2. Building permit records
3. Health and fire department records
4. Birth and death records
5. Public school records
6. Coroner’s register
7. Voter registration records
8. Utility records
9. Marriage recordsIncorrect
The following are local sources of records:
1. Building inspector records
2. Building permit records
3. Health and fire department records
4. Birth and death records
5. Public school records
6. Coroner’s register
7. Voter registration records
8. Utility records
9. Marriage records -
Question 13 of 30
13. Question
Which of the following is not a civil court record?
Correct
Courts keep records of civil cases, which are noncriminal legal proceedings involving two or more parties, and many civil records are publicly available to search. Civil courts often maintain various types of records relating to civil cases, such as liens, name changes, and divorces.
Incorrect
Courts keep records of civil cases, which are noncriminal legal proceedings involving two or more parties, and many civil records are publicly available to search. Civil courts often maintain various types of records relating to civil cases, such as liens, name changes, and divorces.
-
Question 14 of 30
14. Question
Regarding financial suit records, which of the following is false?
Correct
Financial lawsuits are those that involve financial law. The records of such suits might contain information on the defending litigant’s debtors and creditors, business history, or ability to perform its obligations under a contract.
Incorrect
Financial lawsuits are those that involve financial law. The records of such suits might contain information on the defending litigant’s debtors and creditors, business history, or ability to perform its obligations under a contract.
-
Question 15 of 30
15. Question
The following statements are false except:
Correct
Criminal records can be very valuable, but their availability varies considerably between jurisdictions. In many jurisdictions, most or all criminal records are not available to the general public.
Criminal courts will maintain records of criminal filings and criminal convictions, but these types of records should not be confused with each other. Criminal filings are the records of criminal actions the government files against individuals, and therefore, there might be criminal filing records for an individual even if the person was not found guilty of a crime. Criminal conviction records, however, only include records of a final judgment of guilt for a criminal offense.Incorrect
Criminal records can be very valuable, but their availability varies considerably between jurisdictions. In many jurisdictions, most or all criminal records are not available to the general public.
Criminal courts will maintain records of criminal filings and criminal convictions, but these types of records should not be confused with each other. Criminal filings are the records of criminal actions the government files against individuals, and therefore, there might be criminal filing records for an individual even if the person was not found guilty of a crime. Criminal conviction records, however, only include records of a final judgment of guilt for a criminal offense. -
Question 16 of 30
16. Question
What is the conscious, intentional effort to change or conceal one’s normal writings called?
Correct
Disguise is the conscious, intentional effort to change or conceal one’s normal writings. Distortions are unintentional changes to a person’s writings that are beyond the range of natural variation.
Incorrect
Disguise is the conscious, intentional effort to change or conceal one’s normal writings. Distortions are unintentional changes to a person’s writings that are beyond the range of natural variation.
-
Question 17 of 30
17. Question
An attempt to disguise writings might involve the following, except:
Correct
Most attempts at disguise involve one or more of the following: change in slant, change in size, change in shapes of capital (uppercase) letters, changes in the shapes and sizes of loops in letters that contain them, use of peculiar letter designs, or block (squared) hand printing.
Incorrect
Most attempts at disguise involve one or more of the following: change in slant, change in size, change in shapes of capital (uppercase) letters, changes in the shapes and sizes of loops in letters that contain them, use of peculiar letter designs, or block (squared) hand printing.
-
Question 18 of 30
18. Question
What is a true-name signature by an individual who intends to deny that signature at a later time called?
Correct
An autoforgery is a true-name signature by an individual who intends to deny that signature at a later time. Generally, autoforgeries are prepared in a distorted or disguised fashion. This attempt at fraud has occurred in falsely reported traveler’s check theft cases, in cases involving disputed home mortgage and other loan documents, credit card frauds, and others.
Incorrect
An autoforgery is a true-name signature by an individual who intends to deny that signature at a later time. Generally, autoforgeries are prepared in a distorted or disguised fashion. This attempt at fraud has occurred in falsely reported traveler’s check theft cases, in cases involving disputed home mortgage and other loan documents, credit card frauds, and others.
-
Question 19 of 30
19. Question
The following are outcomes of a forensic handwriting comparison except:
Correct
There are three basic outcomes of forensic handwriting comparisons:
1. Non-Identification: The suspected person did not write the signature or other writings on the questioned document.
2. Identification: The suspected person did write the signature or other writings on the questioned document.
3. Inconclusive: No definite determinations were possible as to whether the suspected person did or did not write the signature or other writings on the questioned document.
forensic document examiner cannot conduct a handwriting examination to determine with accuracy the writer’s age, sex, race, physical or mental condition, personality, character, or which hand the writer used.Incorrect
There are three basic outcomes of forensic handwriting comparisons:
1. Non-Identification: The suspected person did not write the signature or other writings on the questioned document.
2. Identification: The suspected person did write the signature or other writings on the questioned document.
3. Inconclusive: No definite determinations were possible as to whether the suspected person did or did not write the signature or other writings on the questioned document.
forensic document examiner cannot conduct a handwriting examination to determine with accuracy the writer’s age, sex, race, physical or mental condition, personality, character, or which hand the writer used. -
Question 20 of 30
20. Question
Which writing sample includes materials that are written by an individual during the everyday course of business?
Correct
Non-dictated writing samples include materials that are written by the individual during the everyday course of business. This type of writing tends to reveal the individual’s normal writing habits.
Incorrect
Non-dictated writing samples include materials that are written by the individual during the everyday course of business. This type of writing tends to reveal the individual’s normal writing habits.
-
Question 21 of 30
21. Question
What term refers to the writing samples that are written at the request, and usually in the presence, of the fraud examiner?
Correct
Dictated writing samples are those that are written at the request, and usually in the presence, of the fraud examiner.
Incorrect
Dictated writing samples are those that are written at the request, and usually in the presence, of the fraud examiner.
-
Question 22 of 30
22. Question
When conducting a dictated handwriting interview with a suspect, the following should be done except:
Correct
Because expert handwriting identifications can truly prove the case, adequate pre-interview preparation by the fraud examiner is essential. At the time of the interview session, the fraud examiner should have all of the proper writing materials and should have the original or copies of the evidence documents to serve as a guide for dictating the sample text.
Here are a few tips for conducting this type of interview:
1. Do not rush through the interview.
2. Take as much time as necessary.
3. Take short comfort breaks if the suspect tires.
4. Do not allow the suspect to see the evidence documents before or during the process of taking the samples.Incorrect
Because expert handwriting identifications can truly prove the case, adequate pre-interview preparation by the fraud examiner is essential. At the time of the interview session, the fraud examiner should have all of the proper writing materials and should have the original or copies of the evidence documents to serve as a guide for dictating the sample text.
Here are a few tips for conducting this type of interview:
1. Do not rush through the interview.
2. Take as much time as necessary.
3. Take short comfort breaks if the suspect tires.
4. Do not allow the suspect to see the evidence documents before or during the process of taking the samples. -
Question 23 of 30
23. Question
What is the term referring to the paper copy of a document or other visual image?
Correct
A photocopy is a paper copy of a document or other visual image.
Incorrect
A photocopy is a paper copy of a document or other visual image.
-
Question 24 of 30
24. Question
What are the uniquely identifiable markings on copies called?
Correct
It is also possible to identify the particular machine used by examining the pattern of unique and identifiable “trash marks.” Trash marks are uniquely identifiable markings on copies (e.g., specks, spots, streaks, or edge markings).
Incorrect
It is also possible to identify the particular machine used by examining the pattern of unique and identifiable “trash marks.” Trash marks are uniquely identifiable markings on copies (e.g., specks, spots, streaks, or edge markings).
-
Question 25 of 30
25. Question
An individual can post a date on a document at a time earlier than the document’s actual creation date for purposes of deception. What is this called?
Correct
Occasionally, documents are backdated to make them appear as though they were created at an earlier date. More specifically, backdating is the process whereby an individual posts a date on a document at a time earlier than the document’s actual creation date for purposes of deception.
Incorrect
Occasionally, documents are backdated to make them appear as though they were created at an earlier date. More specifically, backdating is the process whereby an individual posts a date on a document at a time earlier than the document’s actual creation date for purposes of deception.
-
Question 26 of 30
26. Question
Which of the following is not a characteristic feature of an alibi document?
Correct
Alibi documents suddenly appear “from out of nowhere,” and they often appear late in the course of an investigation, inquiry, or trial. They are always favorable to the suspect and refute previously developed information or evidence that is damaging to the suspect. Often, alibi documents are fabricated.
Incorrect
Alibi documents suddenly appear “from out of nowhere,” and they often appear late in the course of an investigation, inquiry, or trial. They are always favorable to the suspect and refute previously developed information or evidence that is damaging to the suspect. Often, alibi documents are fabricated.
-
Question 27 of 30
27. Question
How many steps are involved in obtaining a photocopier sample?
Correct
There are four steps that fraud examiners should follow when taking photocopier samples.
Incorrect
There are four steps that fraud examiners should follow when taking photocopier samples.
-
Question 28 of 30
28. Question
Which of the following steps is not involved in taking photocopier samples?
Correct
There are four steps that fraud examiners should follow when taking photocopier samples. First, make six “blank” copies by leaving the glass document surface empty and closing the lid. Second, place a ruler or other calibrated measuring device on the glass document surface of the photocopier, close the cover, and make six copies. Third, place a sample document containing both typewritten and handwritten text on the glass document surface in the standard position, close the document cover, and again print six copies, initialing and numbering as previously directed. Finally, place all of the sample copies and sample documents into a large sturdy paper or cardboard envelope or folder (do not use a plastic envelope).
Incorrect
There are four steps that fraud examiners should follow when taking photocopier samples. First, make six “blank” copies by leaving the glass document surface empty and closing the lid. Second, place a ruler or other calibrated measuring device on the glass document surface of the photocopier, close the cover, and make six copies. Third, place a sample document containing both typewritten and handwritten text on the glass document surface in the standard position, close the document cover, and again print six copies, initialing and numbering as previously directed. Finally, place all of the sample copies and sample documents into a large sturdy paper or cardboard envelope or folder (do not use a plastic envelope).
-
Question 29 of 30
29. Question
Which step in obtaining a photocopier sample allows an examiner to determine the amount of reduction or enlargement the machine makes when in the actual size?
Correct
The second step in taking a copier sample involves placing a ruler or other calibrated measuring device on the glass document surface of the photocopier, closing the cover, and making six copies. These copies allow an expert to determine the standard amount of reduction or enlargement the machine makes when in the actual size or one-to-one mode.
Incorrect
The second step in taking a copier sample involves placing a ruler or other calibrated measuring device on the glass document surface of the photocopier, closing the cover, and making six copies. These copies allow an expert to determine the standard amount of reduction or enlargement the machine makes when in the actual size or one-to-one mode.
-
Question 30 of 30
30. Question
What term refers to items that are located at a time when they could not have existed or occurred?
Correct
Anachronisms are items located at a time when they could not have existed or occurred.
Incorrect
Anachronisms are items located at a time when they could not have existed or occurred.