Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Premium Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
When should Loose surveillance be used?
Correct
Loose surveillance is used when subject does not needs to be constantly monitored. If the subject becomes suspicious, it is necessary to stop Loose surveillance.
Incorrect
Loose surveillance is used when subject does not needs to be constantly monitored. If the subject becomes suspicious, it is necessary to stop Loose surveillance.
-
Question 2 of 30
2. Question
What kind of dress should the observer wear?
Correct
The clothing of the observer should be in accordance with the area or group being surveyed. Dress should be conventional, unless the area is not suitable for a conventional dress.The attire should not be prominent, so that if the subject notices the observer, it is less likely to make any enduring impression.
Incorrect
The clothing of the observer should be in accordance with the area or group being surveyed. Dress should be conventional, unless the area is not suitable for a conventional dress.The attire should not be prominent, so that if the subject notices the observer, it is less likely to make any enduring impression.
-
Question 3 of 30
3. Question
Which statement is correct regarding business filings searches?
Correct
Fraud examiners can search for individuals by conducting business filings. In many jurisdictions, individuals and corporations are required to file a doing business as (or an assumed or fictitious business name) statement with the jurisdiction where they conduct their business. The fraud examiner may collect information from fictitious business name files, including owner name business name, file date, and file number, by searching for such documents for a person or business name.
Incorrect
Fraud examiners can search for individuals by conducting business filings. In many jurisdictions, individuals and corporations are required to file a doing business as (or an assumed or fictitious business name) statement with the jurisdiction where they conduct their business. The fraud examiner may collect information from fictitious business name files, including owner name business name, file date, and file number, by searching for such documents for a person or business name.
-
Question 4 of 30
4. Question
Which of the following is not a precaution the observer should use?
Correct
Observer should avoid quick and abnormal movements. He should avoid fake beards or wigs, as they are easily detectable. Observer should avoid unnecessary eye contact. Surveillance area and surroundings should be carefully studied before hand. Observer should know any alleys or dead-end streets around the area to avoid confrontation with the subject.
Incorrect
Observer should avoid quick and abnormal movements. He should avoid fake beards or wigs, as they are easily detectable. Observer should avoid unnecessary eye contact. Surveillance area and surroundings should be carefully studied before hand. Observer should know any alleys or dead-end streets around the area to avoid confrontation with the subject.
-
Question 5 of 30
5. Question
Under One-Person Surveillance, if the subject turns a corner, which of the following strategies should not be followed by the observer?
Correct
The observer should proceed to cross the intersecting road when the subject turns a corner in an uncrowded area. By looking up the road in the direction of the subject, the observer can see the place and actions of the subject.
In a crowded region, it is possible to continue surveillance from the same side of the road unless the subject is just around the corner. Do not instantly turn a corner behind the subject.The observer should be abreast of the target, when the subject turns a corner, to observe any contact with a person or entry into a building.Incorrect
The observer should proceed to cross the intersecting road when the subject turns a corner in an uncrowded area. By looking up the road in the direction of the subject, the observer can see the place and actions of the subject.
In a crowded region, it is possible to continue surveillance from the same side of the road unless the subject is just around the corner. Do not instantly turn a corner behind the subject.The observer should be abreast of the target, when the subject turns a corner, to observe any contact with a person or entry into a building. -
Question 6 of 30
6. Question
Which of the following statement is correct about Two-Person Surveillance?
Correct
“A” observer, is stationed directly behind the target. The “A” observer follows the subject.
And “B” observer, follows “A” either on the same side of the street or from across the street.Incorrect
“A” observer, is stationed directly behind the target. The “A” observer follows the subject.
And “B” observer, follows “A” either on the same side of the street or from across the street. -
Question 7 of 30
7. Question
Which of the following statement is true about Progressive Surveillance method?
Correct
When extreme caution is required, this method is used. The subject is followed for a certain distance with this technique and then the surveillance is stopped and the time noted. The next day, another surveyor picks up the subject at the time and location where the surveillance had earlier stopped and follows the subject again for a short distance.
Incorrect
When extreme caution is required, this method is used. The subject is followed for a certain distance with this technique and then the surveillance is stopped and the time noted. The next day, another surveyor picks up the subject at the time and location where the surveillance had earlier stopped and follows the subject again for a short distance.
-
Question 8 of 30
8. Question
Which type of action is required for vehicle surveillance?
Correct
Observers should usually remain in the same lane as the subject in order to prevent turning from the incorrect lane. Observers should alter direction, perhaps going around a block to avoid suspicion. In order to prevent unwanted attention, observers should restrict the quantity of light emanating from their cars at night.
Incorrect
Observers should usually remain in the same lane as the subject in order to prevent turning from the incorrect lane. Observers should alter direction, perhaps going around a block to avoid suspicion. In order to prevent unwanted attention, observers should restrict the quantity of light emanating from their cars at night.
-
Question 9 of 30
9. Question
When should last name searches be used?
Correct
Last name searches can be used if the previous address of the subject is unknown. The search results best if the name of the subject is not common; however, if the name of the subject is common, the search should include differentiating data.
Incorrect
Last name searches can be used if the previous address of the subject is unknown. The search results best if the name of the subject is not common; however, if the name of the subject is common, the search should include differentiating data.
-
Question 10 of 30
10. Question
Which of the following is not a use of Satellite Surveillance?
Correct
Multi-spectral imaging can detect muddy ground, human and vehicle trails and other data. Useful for surveillance, particularly in big estates or industrial sites where aerial photography is forbidden. In a covert operation, satellite imagery can assist define methods to penetrate a site, create a site map and identify significant regions. Areas that are too distant, costly or harmful to send operatives, satellite images can be used to investigate them.
Incorrect
Multi-spectral imaging can detect muddy ground, human and vehicle trails and other data. Useful for surveillance, particularly in big estates or industrial sites where aerial photography is forbidden. In a covert operation, satellite imagery can assist define methods to penetrate a site, create a site map and identify significant regions. Areas that are too distant, costly or harmful to send operatives, satellite images can be used to investigate them.
-
Question 11 of 30
11. Question
Which of the following is not a limitation of online public database searches?
Correct
For one thing, the researcher will be told by a public record database whether there is a specific record or some of the information contained in that record, but usually, these databases will not provide a copy of the actual public record.
Therefore, there is now a wealth of information accessible by public record websites, but accessing online information is never a complete replacement for checking the public record itself.
If the information in the government’s records was incorrect, it will be incorrect in the public record vendor’s database as well.
Where a fraud examiner accesses those types of personal information via an online service, the laws governing the collection, distribution and use of consumer credit information that apply.Incorrect
For one thing, the researcher will be told by a public record database whether there is a specific record or some of the information contained in that record, but usually, these databases will not provide a copy of the actual public record.
Therefore, there is now a wealth of information accessible by public record websites, but accessing online information is never a complete replacement for checking the public record itself.
If the information in the government’s records was incorrect, it will be incorrect in the public record vendor’s database as well.
Where a fraud examiner accesses those types of personal information via an online service, the laws governing the collection, distribution and use of consumer credit information that apply. -
Question 12 of 30
12. Question
Which of the following is not a right method to memorialize the collection process from social media sites?
Correct
There are various methods that fraud examiners can use to capture information on social media sites and memorize the collection process, including the following:
-Take screen captures of relevant information.
-Print your content.
-Using screen recording software to create a monitor output digital recording.
-Convert web pages to a different format (for example, PDF).
-Use a website capture tool to navigate to each link on a web page and capture all of the content contained in those links, including embedded files and source code.Incorrect
There are various methods that fraud examiners can use to capture information on social media sites and memorize the collection process, including the following:
-Take screen captures of relevant information.
-Print your content.
-Using screen recording software to create a monitor output digital recording.
-Convert web pages to a different format (for example, PDF).
-Use a website capture tool to navigate to each link on a web page and capture all of the content contained in those links, including embedded files and source code. -
Question 13 of 30
13. Question
What does data mining mean?
Correct
Fraud examiners perform two primary functions: data mining and data analysis to discover and interpret large amounts of data. Data mining is the science of looking for patterns with vast volumes of data. Data analysis refers to any analytical method used for data analysis and conclusions drawn from the results.
Incorrect
Fraud examiners perform two primary functions: data mining and data analysis to discover and interpret large amounts of data. Data mining is the science of looking for patterns with vast volumes of data. Data analysis refers to any analytical method used for data analysis and conclusions drawn from the results.
-
Question 14 of 30
14. Question
What is a tax lien?
Correct
A tax lien is a legal hold or claims that a government entity places property (both real estate and personal property) on a taxpayer’s property to secure tax payment. Governments file tax liens with unpaid taxes on an individual’s assets.
Incorrect
A tax lien is a legal hold or claims that a government entity places property (both real estate and personal property) on a taxpayer’s property to secure tax payment. Governments file tax liens with unpaid taxes on an individual’s assets.
-
Question 15 of 30
15. Question
What are passive devices?
Correct
Passive devices amplify the current light in the environment electronically. Sometimes these are referred to as starlight scopes.
Incorrect
Passive devices amplify the current light in the environment electronically. Sometimes these are referred to as starlight scopes.
-
Question 16 of 30
16. Question
Which of the following information is correct about TransUnion?
Correct
TransUnion is another of the big three credit reporting agencies in the U.S., providing credit information and services to both consumers and businesses. In general, TransUnion is a global provider of business intelligence services and technology-based intelligence products, including innovative tools for credit decision-making and fraud prevention, advanced target marketing products, risk and productivity models, and portfolio management.
Incorrect
TransUnion is another of the big three credit reporting agencies in the U.S., providing credit information and services to both consumers and businesses. In general, TransUnion is a global provider of business intelligence services and technology-based intelligence products, including innovative tools for credit decision-making and fraud prevention, advanced target marketing products, risk and productivity models, and portfolio management.
-
Question 17 of 30
17. Question
Which type of the following evidence, provided by informant, is most compelling?
Correct
Conversations of the subject secretly photographed or recorded is usually recognized as something that a criminal prosecutor is sure to be effective, because little can be disputed by a criminal white collar when caught in the act of fraud.
Incorrect
Conversations of the subject secretly photographed or recorded is usually recognized as something that a criminal prosecutor is sure to be effective, because little can be disputed by a criminal white collar when caught in the act of fraud.
-
Question 18 of 30
18. Question
Which of the following statement is incorrect?
Correct
Participant informants are not known are “moles”, Covert informants are.
Incorrect
Participant informants are not known are “moles”, Covert informants are.
-
Question 19 of 30
19. Question
Which of the following is not an essential procedure to be followed when using sources and informants?
Correct
First, keep as confidential as possible the identity of the informant. Second, check the source or informant’s data separately. Third, from independently verified data, create witness and documentary proof. And even after the suspect had been detained and convicted, the informant’s identity shouldn’t be disclosed to the public for his safety.
Incorrect
First, keep as confidential as possible the identity of the informant. Second, check the source or informant’s data separately. Third, from independently verified data, create witness and documentary proof. And even after the suspect had been detained and convicted, the informant’s identity shouldn’t be disclosed to the public for his safety.
-
Question 20 of 30
20. Question
While recruiting sources and informants, fraud examiner should keep in mind which of the following points?
Correct
Contacts in the community should be made well before evidence in needed. Informant should be taken in confidence that his identity wont be revealed. Fraud examiner should mainly focus on the culpability of the informant because if he is more guilty than the suspect, the court might pass a ruling that the evidence provided by the informant is invalid and cannot be presented in front of the court.
Incorrect
Contacts in the community should be made well before evidence in needed. Informant should be taken in confidence that his identity wont be revealed. Fraud examiner should mainly focus on the culpability of the informant because if he is more guilty than the suspect, the court might pass a ruling that the evidence provided by the informant is invalid and cannot be presented in front of the court.
-
Question 21 of 30
21. Question
Which of the following is not a motive which might be in source’s mind when he provides evidence to fraud examiner?
Correct
Some sources want money for their evidence. Some provide information voluntarily, just because they feel obligated to do so and because they have trust in the fraud examiner. Some sources might provide evidence against the suspect because they have a disliking or grudge against him.
Incorrect
Some sources want money for their evidence. Some provide information voluntarily, just because they feel obligated to do so and because they have trust in the fraud examiner. Some sources might provide evidence against the suspect because they have a disliking or grudge against him.
-
Question 22 of 30
22. Question
Which of the following statements is true about sources and informants?
Correct
Both sources and informants are motivated by different things. Informant might provide evidence because he is closely involved with the suspect or because he is his competition and wants the suspect out of the way. Or because informant thinks that the fraud activities are now getting extremely out of hand and wants to stop it. Informant might also be motivated to provide information in exchange of reduced sentence.
Incorrect
Both sources and informants are motivated by different things. Informant might provide evidence because he is closely involved with the suspect or because he is his competition and wants the suspect out of the way. Or because informant thinks that the fraud activities are now getting extremely out of hand and wants to stop it. Informant might also be motivated to provide information in exchange of reduced sentence.
-
Question 23 of 30
23. Question
As mentioned, there are legal pitfalls in dealing with sources and informants, fraud examiner should keep in mind several legal considerations. Which of the following is not one of them?
Correct
Fraud inspectors should record all their interactions with the sources and informants to avoid any problems from arising. He cannot testify about anything the witness said, only the witness can testify about what he knows. And because of this, investigator should inform the informant before hand that his identity will be revealed if he is called to testify. Any money exchange between the informant/source and the investigator should be completely recorded and only on cash-on-delivery-of-information basis.
Incorrect
Fraud inspectors should record all their interactions with the sources and informants to avoid any problems from arising. He cannot testify about anything the witness said, only the witness can testify about what he knows. And because of this, investigator should inform the informant before hand that his identity will be revealed if he is called to testify. Any money exchange between the informant/source and the investigator should be completely recorded and only on cash-on-delivery-of-information basis.
-
Question 24 of 30
24. Question
Which of the following precautions should fraud investigators follow when obtaining information from source/informant?
Correct
Information received from informants should be verified thoroughly before transferring the payment. Investigator should not make the informant commit any crime to gather evidence, he was not prepared to commit, to avoid a claim from the informant related to entrapment. This can be controlled by limiting the role of the informant. Informant might want to harm the investigator, so all meetings should be conducted in a place of investigator’s choosing and there should be at least two investigators in the meeting.
Incorrect
Information received from informants should be verified thoroughly before transferring the payment. Investigator should not make the informant commit any crime to gather evidence, he was not prepared to commit, to avoid a claim from the informant related to entrapment. This can be controlled by limiting the role of the informant. Informant might want to harm the investigator, so all meetings should be conducted in a place of investigator’s choosing and there should be at least two investigators in the meeting.
-
Question 25 of 30
25. Question
Which of the following is not a correct way to report contact with a confidential source/informant in a memorandum?
Correct
All contacts with sources/informants should be recorded in a memorandum by using symbols to denote them in order to keep their identities confidential. Sources should also be preceded by a “S,” followed by a unique number.The identity of the person should be kept in a safe file with restricted access.
Incorrect
All contacts with sources/informants should be recorded in a memorandum by using symbols to denote them in order to keep their identities confidential. Sources should also be preceded by a “S,” followed by a unique number.The identity of the person should be kept in a safe file with restricted access.
-
Question 26 of 30
26. Question
Which of the following is true about private fraud examiners?
Correct
Private fraud examiners cannot testify in place of their witness. Only the witness himself can testify about the information he has. Private fraud examiners cannot promise leniency to individuals, only prosecutor or the court can do that. He can inform the informant that the authorities will be informed of any corporation, which could benefit him in turn. Private fraud examiners can obtain evidence from sources/informants.
Incorrect
Private fraud examiners cannot testify in place of their witness. Only the witness himself can testify about the information he has. Private fraud examiners cannot promise leniency to individuals, only prosecutor or the court can do that. He can inform the informant that the authorities will be informed of any corporation, which could benefit him in turn. Private fraud examiners can obtain evidence from sources/informants.
-
Question 27 of 30
27. Question
What is not true about providing assurance of confidentiality to informants by fraud examiners?
Correct
Absolute assurance of confidentiality can never be provided by examiner, whether he is appointed by government agency or privately. Fraud examiner is obligated not to provide absolute assurance to anyone if he is appointed by any government agency. Examiner should tell the truth to the informant that his identity will be held confidential until possible.
Incorrect
Absolute assurance of confidentiality can never be provided by examiner, whether he is appointed by government agency or privately. Fraud examiner is obligated not to provide absolute assurance to anyone if he is appointed by any government agency. Examiner should tell the truth to the informant that his identity will be held confidential until possible.
-
Question 28 of 30
28. Question
Which of the following is not an example of conditional promise?
Correct
The fraud examiner won’t tell Mr. Kent, Jenny’s brother or any one at Mike’s office directly, but that doesn’t mean anyone else won’t. Whereas, it was promised to Mr. Eddy that no one will know about their deal.
Incorrect
The fraud examiner won’t tell Mr. Kent, Jenny’s brother or any one at Mike’s office directly, but that doesn’t mean anyone else won’t. Whereas, it was promised to Mr. Eddy that no one will know about their deal.
-
Question 29 of 30
29. Question
What of the following is not an ethical consideration to be kept in mind by the fraud examiner while working with informants?
Correct
There are inherent risks in the operation, so it can be hard to distinguish a rational complaint of an informant from a mere effort to escape the requirement of corporation. Harmed informants may refuse or can not continue to cooperate, and ill-treatment may decrease the agency’s credibility for future collaboration. It is best not to use sources and informants as “double agents” in continuing crimes. Such action is inherently dangerous and puts the investigator in a situation to protect the source or informant’s actions.
Incorrect
There are inherent risks in the operation, so it can be hard to distinguish a rational complaint of an informant from a mere effort to escape the requirement of corporation. Harmed informants may refuse or can not continue to cooperate, and ill-treatment may decrease the agency’s credibility for future collaboration. It is best not to use sources and informants as “double agents” in continuing crimes. Such action is inherently dangerous and puts the investigator in a situation to protect the source or informant’s actions.
-
Question 30 of 30
30. Question
Which of the following statement is not true about Operatives?
Correct
Operative is an informant who performs investigative procedures to obtain evidence on examiners directions. Operative should only perform these procedures after getting directions from the examiner, so the examiner does not faces problems due to any actions of the informant. Operatives usually lack training and experience, so constant supervision is required.
Incorrect
Operative is an informant who performs investigative procedures to obtain evidence on examiners directions. Operative should only perform these procedures after getting directions from the examiner, so the examiner does not faces problems due to any actions of the informant. Operatives usually lack training and experience, so constant supervision is required.