Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Premium Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
Which of the following statements is incorrect about Textual Analytics?
Correct
Textual analytics is a method of extracting useful information from unstructured text data using software. Linguistic technologies and statistical techniques are used. Text analytics tools can identify data to expose fraud-related trends and relationships.
Incorrect
Textual analytics is a method of extracting useful information from unstructured text data using software. Linguistic technologies and statistical techniques are used. Text analytics tools can identify data to expose fraud-related trends and relationships.
-
Question 2 of 30
2. Question
Which of the following statement is incorrect about Fraud Keywords?
Correct
Investigator is going to want a list of keywords for fraud that are likely to point to suspicious activity. The list would rely on the industry, the fraud schemes and the data available to the fraud examiner. When constructing a fraud keyword list, the factors listed in the Fraud Triangle are helpful. Remember that someone in the company being investigated may be able to commit fraud, be under pressure to commit fraud, or be able to rationalize fraud committing.
Incorrect
Investigator is going to want a list of keywords for fraud that are likely to point to suspicious activity. The list would rely on the industry, the fraud schemes and the data available to the fraud examiner. When constructing a fraud keyword list, the factors listed in the Fraud Triangle are helpful. Remember that someone in the company being investigated may be able to commit fraud, be under pressure to commit fraud, or be able to rationalize fraud committing.
-
Question 3 of 30
3. Question
Out of the following statements, which is correct about Pressure?
Correct
Most people commit fraud because they are driven to take something that has happened in their lives. Maybe they have to hit a certain target to qualify for a reward based on performance or may be they are in debt. Pressure-related keywords include deadline, goal, difficulty, low, question, and concern.
Incorrect
Most people commit fraud because they are driven to take something that has happened in their lives. Maybe they have to hit a certain target to qualify for a reward based on performance or may be they are in debt. Pressure-related keywords include deadline, goal, difficulty, low, question, and concern.
-
Question 4 of 30
4. Question
Emotional Tone Analysis is a type of Data Analysis, which of the following statement is false about it?
Correct
Emotional Tone Analysis is a way to discover fraud clues concealed in text by taking into account the emotional tone of correspondence between employees. A fraud investigator must recognize messages that are negative, shocked, confidential or worried. This needs the use of sophisticated software and a thorough understanding of legal environment of employee rights and workplace searches and until pursuing these methods, they must consult with technical and legal experts.
Incorrect
Emotional Tone Analysis is a way to discover fraud clues concealed in text by taking into account the emotional tone of correspondence between employees. A fraud investigator must recognize messages that are negative, shocked, confidential or worried. This needs the use of sophisticated software and a thorough understanding of legal environment of employee rights and workplace searches and until pursuing these methods, they must consult with technical and legal experts.
-
Question 5 of 30
5. Question
Visual Analysis is a type of data analysis technique. Which of the following is incorrect about it?
Correct
Visual Analysis represents data through graphs, maps of heat, diagrams of links, charts of time series. The utility of visual representations is improved as the size and sophistication of information increases. Visual analytics draw on the innate ability of humans to consume more data in visual rather than numerical form and more readily interpret certain patterns, shapes and shades. Effective visuals can translate multidimensional data like frequency, time, and relationships into an intuitive picture by using mathematical techniques to evaluate patterns and outliers.
Incorrect
Visual Analysis represents data through graphs, maps of heat, diagrams of links, charts of time series. The utility of visual representations is improved as the size and sophistication of information increases. Visual analytics draw on the innate ability of humans to consume more data in visual rather than numerical form and more readily interpret certain patterns, shapes and shades. Effective visuals can translate multidimensional data like frequency, time, and relationships into an intuitive picture by using mathematical techniques to evaluate patterns and outliers.
-
Question 6 of 30
6. Question
Which of the following statement is not true about Heat Map?
Correct
The heat map is a graphical representation of the data in which the individual values contained in the matrix are represented as plots or colors. They are not commonly used in fraud detection, heat maps are an important visual method in performing a fraud risk assessment for internal auditors and risk management teams. An organization’s susceptibility to various fraud schemes is measured by plotting their probability and context on a heat map.
Incorrect
The heat map is a graphical representation of the data in which the individual values contained in the matrix are represented as plots or colors. They are not commonly used in fraud detection, heat maps are an important visual method in performing a fraud risk assessment for internal auditors and risk management teams. An organization’s susceptibility to various fraud schemes is measured by plotting their probability and context on a heat map.
-
Question 7 of 30
7. Question
Except which of the following, the statements are correct about Tree Map?
Correct
A tree map is a type of heat map that divides rectangular space into regions and then divides each region again for each hierarchical tier. The size and coloring of the rectangles help the user to identify patterns in complex data. Tree maps ‘ hierarchical structure will expose multi-faceted information faster than spreadsheets, bar charts, or line graphs.
Incorrect
A tree map is a type of heat map that divides rectangular space into regions and then divides each region again for each hierarchical tier. The size and coloring of the rectangles help the user to identify patterns in complex data. Tree maps ‘ hierarchical structure will expose multi-faceted information faster than spreadsheets, bar charts, or line graphs.
-
Question 8 of 30
8. Question
From the following statements, which of the following is incorrect about Link Analysis?
Correct
Fraud examiners use the link analysis software to create visual representations of data from multiple data sources using charts with line connections. Indirect relationships and multi-degree separation relationships can be defined with the help of Link Analysis.
Incorrect
Fraud examiners use the link analysis software to create visual representations of data from multiple data sources using charts with line connections. Indirect relationships and multi-degree separation relationships can be defined with the help of Link Analysis.
-
Question 9 of 30
9. Question
Which of the following statement is incorrect about the uses of Link Analysis?
Correct
Link analysis is especially useful in conducting a money laundering investigation because it can monitor money positioning, layering and integration as it passes between unknown sources. A fictitious vendor (shell company) scheme could also be detected. The investigator could map visual links between a variety of entities that share an address and bank account number to reveal a fictitious vendor created from a company to embezzle funds. Associate communication with events and individuals to expose links, such as email, instant messages, and internal phone records. It can also demonstrate complex networks (including social networks).
Incorrect
Link analysis is especially useful in conducting a money laundering investigation because it can monitor money positioning, layering and integration as it passes between unknown sources. A fictitious vendor (shell company) scheme could also be detected. The investigator could map visual links between a variety of entities that share an address and bank account number to reveal a fictitious vendor created from a company to embezzle funds. Associate communication with events and individuals to expose links, such as email, instant messages, and internal phone records. It can also demonstrate complex networks (including social networks).
-
Question 10 of 30
10. Question
From the following, which statement is incorrect?
Correct
Visual analytics depict correlations between different data types and their corresponding geographical location in a Geospatial analysis. It helps to uncover a hidden relationship or unknown trend, such as those in a corruption scheme or bribery. Timeline analysis software helps fraud investigators turn their data into graphical timelines. Timeline analysis allow the examiners of fraud to:
ï‚· Highlight key times, dates, and facts.
ï‚· More readily determine a sequence of events.
ï‚· Analyze multiple or concurrent sequences of events.
ï‚· Track unaccounted for time.
ï‚· Identify inconsistencies or impossibilities in data.Incorrect
Visual analytics depict correlations between different data types and their corresponding geographical location in a Geospatial analysis. It helps to uncover a hidden relationship or unknown trend, such as those in a corruption scheme or bribery. Timeline analysis software helps fraud investigators turn their data into graphical timelines. Timeline analysis allow the examiners of fraud to:
ï‚· Highlight key times, dates, and facts.
ï‚· More readily determine a sequence of events.
ï‚· Analyze multiple or concurrent sequences of events.
ï‚· Track unaccounted for time.
ï‚· Identify inconsistencies or impossibilities in data. -
Question 11 of 30
11. Question
Which of the following is not one of the minimum requirements of attributes a data analysis software should have?
Correct
The software for data analysis should have the following minimum requirements:
· Import / export capabilities of software: how easily is data imported / exported given the data format and structure.
· Visualization of data: how easy is it to transfer the data from a table to a chart for analysis and interpretation?
. Search for suite of tools: He should select the most suitable set of tools based on his available data and then select the software best suited to his current and future needs.Incorrect
The software for data analysis should have the following minimum requirements:
· Import / export capabilities of software: how easily is data imported / exported given the data format and structure.
· Visualization of data: how easy is it to transfer the data from a table to a chart for analysis and interpretation?
. Search for suite of tools: He should select the most suitable set of tools based on his available data and then select the software best suited to his current and future needs. -
Question 12 of 30
12. Question
Ken Collier set up a framework for the analysis of software for data mining. Which of the following statement is incorrect about criteria of the framework?
Correct
Ken Collier and his colleagues set up a framework for data mining software evaluation. The framework has divided the criteria into four areas:
· Performance: The ability to manage a number of data sources refers to performance.
· Functionality: Functionality applies to the program’s range of features, technological approaches and data mining techniques.
· Usability: Usability refers to the conformation of different user levels and types without compromising usability or usefulness.
· Support for additional activities: support for additional tasks allows the user to perform various tasks supporting data mining.Incorrect
Ken Collier and his colleagues set up a framework for data mining software evaluation. The framework has divided the criteria into four areas:
· Performance: The ability to manage a number of data sources refers to performance.
· Functionality: Functionality applies to the program’s range of features, technological approaches and data mining techniques.
· Usability: Usability refers to the conformation of different user levels and types without compromising usability or usefulness.
· Support for additional activities: support for additional tasks allows the user to perform various tasks supporting data mining. -
Question 13 of 30
13. Question
Which of the following statements is incorrect about the problems related to ‘in-house’ and commercial data analysis programs?
Correct
Regulators may want to review the controls of the company at some stage and may find it difficult to navigate an in-house system compared to standard commercial options. Depending on how difficult the program is to understand, labor turnover can cause significant disruption. Apart from unnecessary costs, an organization-free platform will either fail to detect the transactions it needs or return too many false positives.
Incorrect
Regulators may want to review the controls of the company at some stage and may find it difficult to navigate an in-house system compared to standard commercial options. Depending on how difficult the program is to understand, labor turnover can cause significant disruption. Apart from unnecessary costs, an organization-free platform will either fail to detect the transactions it needs or return too many false positives.
-
Question 14 of 30
14. Question
Which of the following is not a quality which should be assessed while evaluating a Data Mining consultant?
Correct
If an entity intends to use a consultant in data mining, it should evaluate the following qualities:
. Innovation: Check how the individual keeps himself up-to-date. In your field of inquiry, search for professional associations, journals, and training.
• Creativity: Can individuals work in a creative setting, such as fraud intelligence? Can the individual work unattended and be expected to yield results? He should also think about why and how a fraud might have occurred.
• Experience: Does the individual have experience in the type of investigation that will be conducted? Does the individual have experience with the kind of software / tools that will be used in the course of the investigation?Incorrect
If an entity intends to use a consultant in data mining, it should evaluate the following qualities:
. Innovation: Check how the individual keeps himself up-to-date. In your field of inquiry, search for professional associations, journals, and training.
• Creativity: Can individuals work in a creative setting, such as fraud intelligence? Can the individual work unattended and be expected to yield results? He should also think about why and how a fraud might have occurred.
• Experience: Does the individual have experience in the type of investigation that will be conducted? Does the individual have experience with the kind of software / tools that will be used in the course of the investigation? -
Question 15 of 30
15. Question
Which statement is not true regarding digital investigations?
Correct
Digital investigation is work involving applicable digital data processed or stored by digital devices — devices that process data in the form of numbers (digits). It is possible to use digital devices to connect with others, build documents, access online data, enter online data, and store information. The investigator conducting an investigation into a crime involving a digital device is not necessary, and should not be, the forensic investigator in most cases.
Incorrect
Digital investigation is work involving applicable digital data processed or stored by digital devices — devices that process data in the form of numbers (digits). It is possible to use digital devices to connect with others, build documents, access online data, enter online data, and store information. The investigator conducting an investigation into a crime involving a digital device is not necessary, and should not be, the forensic investigator in most cases.
-
Question 16 of 30
16. Question
Digital forensic experts are those who specialize, collect and process digital data for use in investigations and litigation. Which of the following statement is true about them?
Correct
Digital forensic experts are capable of analyzing digital media at the hexadecimal level, which ensures that all sectors and bytes in those sectors can be displayed on a device. Digital forensic experts can, therefore, retrieve information from deleted files, both those that have been deleted deliberately and those that have been inadvertently deleted. Digital forensic experts can also recover temporary auto-saving files, print-spool files, deleted emails, and deleted link (shortcut) files, and work with hexadecimal level data.
Incorrect
Digital forensic experts are capable of analyzing digital media at the hexadecimal level, which ensures that all sectors and bytes in those sectors can be displayed on a device. Digital forensic experts can, therefore, retrieve information from deleted files, both those that have been deleted deliberately and those that have been inadvertently deleted. Digital forensic experts can also recover temporary auto-saving files, print-spool files, deleted emails, and deleted link (shortcut) files, and work with hexadecimal level data.
-
Question 17 of 30
17. Question
Which of the following is correct explanation about the types of computer forensics field?
Correct
Operating and file system experts: these experts are knowledgeable of certain operating systems (e.g., Windows Vista, Windows 7, Windows 10, Ubuntu, and OS X) and the different file systems they use (e.g., Joliet, NTFS, FAT, VFS, Ext2) and are capable of conveying operating characteristics and analyzing artifacts.
Experts in documentation and retrieval of archives: these are experts in extracting information from recordings, digital media or other backup systems. Backup technologies usually store data in proprietary formats, making recovery very difficult.
Experts in intrusion and malicious code: These experts are trained in the analysis of intrusion into the computer network. Specialists may evaluate the dimensions of the attack, the methods used, what happened during the entry, and what was taken, if anything.
Experts in data recovery: These experts operate clean rooms designed to extract information magnetically from a source of damaged content. Such experts can disassemble a hard disk using special tools and equipment, remove the platters, and retrieve and reassemble the data for further analysis.Incorrect
Operating and file system experts: these experts are knowledgeable of certain operating systems (e.g., Windows Vista, Windows 7, Windows 10, Ubuntu, and OS X) and the different file systems they use (e.g., Joliet, NTFS, FAT, VFS, Ext2) and are capable of conveying operating characteristics and analyzing artifacts.
Experts in documentation and retrieval of archives: these are experts in extracting information from recordings, digital media or other backup systems. Backup technologies usually store data in proprietary formats, making recovery very difficult.
Experts in intrusion and malicious code: These experts are trained in the analysis of intrusion into the computer network. Specialists may evaluate the dimensions of the attack, the methods used, what happened during the entry, and what was taken, if anything.
Experts in data recovery: These experts operate clean rooms designed to extract information magnetically from a source of damaged content. Such experts can disassemble a hard disk using special tools and equipment, remove the platters, and retrieve and reassemble the data for further analysis. -
Question 18 of 30
18. Question
Which of the following is incorrect about digital evidence?
Correct
Digital evidence is data that can be used to prove something, stored or distributed in binary form (i.e., those and zeroes). The proliferation of digital technologies has created new technical possibilities for almost all types of fraud. Consequently, in almost all fraud tests, fraud examiners must gather some form of digital evidence. Computers themselves can be the targets of crime. It is also possible to use computers to facilitate criminal behavior. When this occurs, the computer is referred to as the criminal tool or instrument.
Incorrect
Digital evidence is data that can be used to prove something, stored or distributed in binary form (i.e., those and zeroes). The proliferation of digital technologies has created new technical possibilities for almost all types of fraud. Consequently, in almost all fraud tests, fraud examiners must gather some form of digital evidence. Computers themselves can be the targets of crime. It is also possible to use computers to facilitate criminal behavior. When this occurs, the computer is referred to as the criminal tool or instrument.
-
Question 19 of 30
19. Question
which statement is not true about the volatilization of digital evidence?
Correct
Digital data is more fragile than tangible information because more quickly than tangible records can be changed or lost. Digital data is, by design, fragile and short-lived in nature. It can be easily deleted or manipulated.
Incorrect
Digital data is more fragile than tangible information because more quickly than tangible records can be changed or lost. Digital data is, by design, fragile and short-lived in nature. It can be easily deleted or manipulated.
-
Question 20 of 30
20. Question
Which statement best define spoliation?
Correct
Spoliation is broadly defined as an act of deliberate or careless destruction of litigation-related documents. Failure to preserve the integrity of digital evidence may result in evidence being considered inadmissible in a legal proceeding or may not be given much weight, even if accepted, since evidence of doubtful authenticity does not provide reliable evidence.
Incorrect
Spoliation is broadly defined as an act of deliberate or careless destruction of litigation-related documents. Failure to preserve the integrity of digital evidence may result in evidence being considered inadmissible in a legal proceeding or may not be given much weight, even if accepted, since evidence of doubtful authenticity does not provide reliable evidence.
-
Question 21 of 30
21. Question
Which of the statement is true regarding locating digital evidence?
Correct
When looking for digital evidence, searching becomes a task as data is stored in large volumes and in a number of different locations. The fraud examiner must know the location in computer system, phones or any other devices where he can locate information or any related data might be useful for the case.
Incorrect
When looking for digital evidence, searching becomes a task as data is stored in large volumes and in a number of different locations. The fraud examiner must know the location in computer system, phones or any other devices where he can locate information or any related data might be useful for the case.
-
Question 22 of 30
22. Question
Which of the following is not the right method of detecting the use of steganography?
Correct
The correct methods of detecting the use of steganography are:
-Visual identification by searching for jpeg, bmp, gif and other image files.
-Check for audible anomalies in wav, mp3, mpeg and other media files.
-Statistical detection by deciding if the statistical properties of the files are different from the expected standard.
-Structural detection by looking for structural oddities that do not suggest manipulation.Incorrect
The correct methods of detecting the use of steganography are:
-Visual identification by searching for jpeg, bmp, gif and other image files.
-Check for audible anomalies in wav, mp3, mpeg and other media files.
-Statistical detection by deciding if the statistical properties of the files are different from the expected standard.
-Structural detection by looking for structural oddities that do not suggest manipulation. -
Question 23 of 30
23. Question
Which of the following is true about event logs?
Correct
Every operating system produces logs of events, files that record activities, or transactions on a computer. In addition, for each event or transaction occurring on any computer, a log entry is made, and therefore there are numerous types of event logs. Some common types of logs include system logs, application logs, and security logs.
Incorrect
Every operating system produces logs of events, files that record activities, or transactions on a computer. In addition, for each event or transaction occurring on any computer, a log entry is made, and therefore there are numerous types of event logs. Some common types of logs include system logs, application logs, and security logs.
-
Question 24 of 30
24. Question
Which statement best defines a peripheral device?
Correct
Any suspected workstations, including any peripherals or other portable media devices that may be used for data transmission or processing, should be examined. A peripheral device is an external device attached to a host computer, but not part of it.
Incorrect
Any suspected workstations, including any peripherals or other portable media devices that may be used for data transmission or processing, should be examined. A peripheral device is an external device attached to a host computer, but not part of it.
-
Question 25 of 30
25. Question
Which of the following statement is not true about cloud environments?
Correct
Cloud storage refers to information that is stored by an online available third-party host. The cloud can save on hardware, software or licensing fees, and cloud services provide a cost-effective alternative to IT infrastructure development. The cloud also improves accessibility because users can access the cloud whenever and wherever they want. With cloud computing, organizations can easily scale information technology resources up or down to suit their business needs.
Incorrect
Cloud storage refers to information that is stored by an online available third-party host. The cloud can save on hardware, software or licensing fees, and cloud services provide a cost-effective alternative to IT infrastructure development. The cloud also improves accessibility because users can access the cloud whenever and wherever they want. With cloud computing, organizations can easily scale information technology resources up or down to suit their business needs.
-
Question 26 of 30
26. Question
Out of the following, which statement is true about phases of computer forensics?
Correct
The planning phase ensures that all equipment used in a forensic capacity is legitimate and reliable.
In the privacy issues phase, the fraud examiner must be knowledgeable of the law pertaining to workplace seizures. If it becomes necessary to seize a computer or other device capable of storing digital evidence, the investigator should consult with legal counsel.
In the seizing, acquisition of digital evidence must be secured in a forensically sound manner so that the evidence is not
tainted or destroyed.Incorrect
The planning phase ensures that all equipment used in a forensic capacity is legitimate and reliable.
In the privacy issues phase, the fraud examiner must be knowledgeable of the law pertaining to workplace seizures. If it becomes necessary to seize a computer or other device capable of storing digital evidence, the investigator should consult with legal counsel.
In the seizing, acquisition of digital evidence must be secured in a forensically sound manner so that the evidence is not
tainted or destroyed. -
Question 27 of 30
27. Question
Which of the following is true about volatile data?
Correct
Volatile data refers to forensic objects in a flux state that may be lost when power (or network connections, in some cases) are withdrawn from a computer system. Therefore, when volatile data is not obtained live from a suspect computer when the system is shut down or disconnected from its network, it may be altered or lost.
Incorrect
Volatile data refers to forensic objects in a flux state that may be lost when power (or network connections, in some cases) are withdrawn from a computer system. Therefore, when volatile data is not obtained live from a suspect computer when the system is shut down or disconnected from its network, it may be altered or lost.
-
Question 28 of 30
28. Question
Which of the following is not an example of common sources of volatile data?
Correct
Common sources of volatile data include:
. Random Access Memory (RAM): Recently accessed data, such as data files, recent commands and password hashes, and slack space and free space residual data, are included in volatile RAM data.
. Operating System: It includes incoming and outgoing network connections, login sessions and currently running programs.
. Network device logs: Volatile data includes the logs generated by network gear such as routers and switches in network device logs.Incorrect
Common sources of volatile data include:
. Random Access Memory (RAM): Recently accessed data, such as data files, recent commands and password hashes, and slack space and free space residual data, are included in volatile RAM data.
. Operating System: It includes incoming and outgoing network connections, login sessions and currently running programs.
. Network device logs: Volatile data includes the logs generated by network gear such as routers and switches in network device logs. -
Question 29 of 30
29. Question
When does a graceful shutdown occur?
Correct
There is a hard shutdown due to power failure. Therefore, a hard shutdown is achieved by unplugging all the computer power and power cables. When the consumer relies on the collection of built-in processes that prepare a computer for shutdown, a graceful shutdown occurs.
Incorrect
There is a hard shutdown due to power failure. Therefore, a hard shutdown is achieved by unplugging all the computer power and power cables. When the consumer relies on the collection of built-in processes that prepare a computer for shutdown, a graceful shutdown occurs.
-
Question 30 of 30
30. Question
Which of the following statement is true about live data collection?
Correct
Given the benefits of live data collection, it has its drawbacks, including:
· Untrained individuals can compromise the data using live data collection methods.
. A range of tools for gathering live data are not checked.
. There is a lack of established live data collection processes and procedures.The collection of live data should be taken seriously when:
. At the time of seizure, the suspect uses the machine.
· At the time of seizure, an attack is ongoing.
· Shutting down the computer could result in data being unusable through drive encryption, processes running.Incorrect
Given the benefits of live data collection, it has its drawbacks, including:
· Untrained individuals can compromise the data using live data collection methods.
. A range of tools for gathering live data are not checked.
. There is a lack of established live data collection processes and procedures.The collection of live data should be taken seriously when:
. At the time of seizure, the suspect uses the machine.
· At the time of seizure, an attack is ongoing.
· Shutting down the computer could result in data being unusable through drive encryption, processes running.