Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Premium Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
Which of the following provides summaries of all the transactions and financial activities on a financial account for a specific period, usually a month?
Correct
Account statements, which are provided for all types of financial accounts, provide summaries of all the transactions and financial activities (e.g., cashed checks, withdrawals, and deposits) on their corresponding accounts for a specific period, usually a month. Account statements also contain information about the account holder and the financial institution in which the account is held.
Incorrect
Account statements, which are provided for all types of financial accounts, provide summaries of all the transactions and financial activities (e.g., cashed checks, withdrawals, and deposits) on their corresponding accounts for a specific period, usually a month. Account statements also contain information about the account holder and the financial institution in which the account is held.
-
Question 2 of 30
2. Question
What term is used to refer to electronic transfers of money from one bank to another?
Correct
Wire transfer is a method of electronic funds transfer from one person or entity to another. A wire transfer can be made from one bank account to another bank account.
Incorrect
Wire transfer is a method of electronic funds transfer from one person or entity to another. A wire transfer can be made from one bank account to another bank account.
-
Question 3 of 30
3. Question
Wire transfer records can contain valuable information. Which of the following is least likely to be a piece of information contained in wire transfer records?
Correct
Records of wire transfers can contain valuable information. Typically, wire transfer records contain information such as who sent the wire, when and where it was sent, and its amount.
Incorrect
Records of wire transfers can contain valuable information. Typically, wire transfer records contain information such as who sent the wire, when and where it was sent, and its amount.
-
Question 4 of 30
4. Question
Which of the following are centers that collect information on suspicious or unusual financial activities from banks and other financial institutions?
Correct
Financial Intelligence Units (FIUs) are centers that collect information on suspicious or unusual financial activities from banks and other financial institutions. Typically, reports filed with FIUs contain the identity of the persons making the transactions and the amount of the transactions, among other things.
Incorrect
Financial Intelligence Units (FIUs) are centers that collect information on suspicious or unusual financial activities from banks and other financial institutions. Typically, reports filed with FIUs contain the identity of the persons making the transactions and the amount of the transactions, among other things.
-
Question 5 of 30
5. Question
Valuable information contained in reports filed with financial intelligence units can be used for various purposes. Which of the following would information provided in reports filed with FIUs be used for?
Correct
Reports filed with FIUs contain the identity of the persons making the transactions and the amount of the transactions, among other things. In addition, they can provide valuable information that can be used to identify illegal activity, detect the flow of illicit funds, and identify leads to assets purchased with ill-gotten gains.
Incorrect
Reports filed with FIUs contain the identity of the persons making the transactions and the amount of the transactions, among other things. In addition, they can provide valuable information that can be used to identify illegal activity, detect the flow of illicit funds, and identify leads to assets purchased with ill-gotten gains.
-
Question 6 of 30
6. Question
Which of the following indirect methods of tracing financial transactions is used to prove illicit income circumstantially by showing that a person’s assets or expenditures for a given period exceed that which can be accounted for from known or admitted legitimate sources of income?
Correct
The net-worth method (or comparative net-worth analysis) is used to prove illicit income circumstantially by showing that a person’s assets or expenditures for a given period exceed that which can be accounted for from known or admitted legitimate sources of income. The net-worth method is a reliable method for estimating a person’s ill-gotten gains.
Incorrect
The net-worth method (or comparative net-worth analysis) is used to prove illicit income circumstantially by showing that a person’s assets or expenditures for a given period exceed that which can be accounted for from known or admitted legitimate sources of income. The net-worth method is a reliable method for estimating a person’s ill-gotten gains.
-
Question 7 of 30
7. Question
Under which of the following circumstances would an indirect method of tracing financial transactions be required to corroborate evidence of illicit transactions?
Correct
If illicit transactions cannot be traced directly to the subject, then an indirect method of proof might be required to corroborate evidence of illicit transactions. Indirect approaches rely on circumstantial proof in contrast to direct approaches that rely on specific transactions.
Incorrect
If illicit transactions cannot be traced directly to the subject, then an indirect method of proof might be required to corroborate evidence of illicit transactions. Indirect approaches rely on circumstantial proof in contrast to direct approaches that rely on specific transactions.
-
Question 8 of 30
8. Question
What statement best describes circumstantial evidence?
Correct
Evidence that tends to prove or disprove facts in issue indirectly, by inference is referred to as circumstantial evidence. It relies on an inference to connect it to a conclusion of fact. An example of circumstantial evidence is a fingerprint at the scene of a crime.
Incorrect
Evidence that tends to prove or disprove facts in issue indirectly, by inference is referred to as circumstantial evidence. It relies on an inference to connect it to a conclusion of fact. An example of circumstantial evidence is a fingerprint at the scene of a crime.
-
Question 9 of 30
9. Question
Direct and indirect methods are used in tracing illicit financial transactions. Which of the following is a valid difference between the direct method and the indirect method of tracing illicit financial transactions?
Correct
The direct approach method relies on specific transactions while the indirect approach relies on a circumstantial proof. Circumstantial evidence is evidence that relies on an inference to connect it to a conclusion of fact such as a fingerprint at the scene of a crime. If illicit transactions cannot be traced directly to the subject, then an indirect method of proof might be required to corroborate evidence of illicit transactions.
Incorrect
The direct approach method relies on specific transactions while the indirect approach relies on a circumstantial proof. Circumstantial evidence is evidence that relies on an inference to connect it to a conclusion of fact such as a fingerprint at the scene of a crime. If illicit transactions cannot be traced directly to the subject, then an indirect method of proof might be required to corroborate evidence of illicit transactions.
-
Question 10 of 30
10. Question
Which of the following is least likely to be a basic approach that makes use of circumstantial evidence to prove a subject’s source of funds?
Correct
There are two basic approaches that use circumstantial proof to prove a subject’s sources of funds. They are the net-worth method, also known as the comparative net-worth analysis and the bank deposit analysis method.
Incorrect
There are two basic approaches that use circumstantial proof to prove a subject’s sources of funds. They are the net-worth method, also known as the comparative net-worth analysis and the bank deposit analysis method.
-
Question 11 of 30
11. Question
What term is usually used to refer to the difference between assets and liabilities at a particular point in time?
Correct
The difference between assets and liabilities at a particular point in time is referred to as net worth. Net worth is the measure of wealth.
Incorrect
The difference between assets and liabilities at a particular point in time is referred to as net worth. Net worth is the measure of wealth.
-
Question 12 of 30
12. Question
There are two basic methods of performing a net-worth analysis. Which of the following are the two basic methods of performing a net-worth analysis?
Correct
There are two basic methods for performing a net-worth analysis to examine a subject’s sources of income. They are the asset method and the expenditures or sources and applications of funds method.
Incorrect
There are two basic methods for performing a net-worth analysis to examine a subject’s sources of income. They are the asset method and the expenditures or sources and applications of funds method.
-
Question 13 of 30
13. Question
When a subject has invested illegal funds to accumulate wealth and acquire assets, causing his net worth (value of assets over liabilities) to increase from year to year, which of the following methods of net-worth analysis should the fraud examiner make use of?
Correct
When a subject has invested illegal funds to accumulate wealth and acquire assets, causing his net worth (value of assets over liabilities) to increase from year to year, the fraud examiner would make use of the asset method. Unaccounted funds might be inferred to come from illicit or hidden sources.
Incorrect
When a subject has invested illegal funds to accumulate wealth and acquire assets, causing his net worth (value of assets over liabilities) to increase from year to year, the fraud examiner would make use of the asset method. Unaccounted funds might be inferred to come from illicit or hidden sources.
-
Question 14 of 30
14. Question
When the subject spends illicit income on consumables (e.g., travel and entertainment), which of the following methods of net-worth analysis should a fraud examiner make use of?
Correct
The expenditures method should be used by a fraud examiner when the subject spends illicit income on consumables (e.g., travel and entertainment) as this method works best because when the subject spends the illicit income, it will not cause an increase in net worth.
Incorrect
The expenditures method should be used by a fraud examiner when the subject spends illicit income on consumables (e.g., travel and entertainment) as this method works best because when the subject spends the illicit income, it will not cause an increase in net worth.
-
Question 15 of 30
15. Question
Which of the following shows what a subject earns, owns, owes, and spends at any given point, or over a period as it reflects the subject’s income, expenses, assets, and liabilities?
Correct
The financial profile of a subject shows what the subject earns, owns, owes, and spends at any given point, or over a period; it reflects the subject’s income, expenses, assets, and liabilities. A financial profile is essentially a financial statement about an individual.
Incorrect
The financial profile of a subject shows what the subject earns, owns, owes, and spends at any given point, or over a period; it reflects the subject’s income, expenses, assets, and liabilities. A financial profile is essentially a financial statement about an individual.
-
Question 16 of 30
16. Question
The financial profile of a subject serves several purposes in a fraud investigation. Which of the following is least likely to be the purpose of a subject’s financial profile in a fraud examination?
Correct
The financial profile of a subject can contain direct evidence of illegal income or hidden assets, or circumstantial proof, by showing that the suspect’s expenditures exceeded known sources of income. It can be used to establish the level of criminality, to build evidence for litigation, to support a request for an enforcement order, to identify fund transfers between entities, and so on.
Incorrect
The financial profile of a subject can contain direct evidence of illegal income or hidden assets, or circumstantial proof, by showing that the suspect’s expenditures exceeded known sources of income. It can be used to establish the level of criminality, to build evidence for litigation, to support a request for an enforcement order, to identify fund transfers between entities, and so on.
-
Question 17 of 30
17. Question
Fraud examiners can develop a subject’s financial profile through various means. Which of the following is likely to be a way through which a fraud examiner can create or develop a subject’s financial profile?
Correct
Fraud examiners can typically develop a subject’s financial profile through the following means:
– Conducting interviews with the subject and his associates.
– Observing the subject’s lifestyle, habits, and assets (e.g., observing the subject’s residence, hobbies, and vehicles).
– Using public records (e.g. criminal court records, civil court records, business filings, or real property records).
– Using online resources.
– Viewing the subject’s charitable contributions.
– Obtaining anecdotal information.Incorrect
Fraud examiners can typically develop a subject’s financial profile through the following means:
– Conducting interviews with the subject and his associates.
– Observing the subject’s lifestyle, habits, and assets (e.g., observing the subject’s residence, hobbies, and vehicles).
– Using public records (e.g. criminal court records, civil court records, business filings, or real property records).
– Using online resources.
– Viewing the subject’s charitable contributions.
– Obtaining anecdotal information. -
Question 18 of 30
18. Question
What term is usually used to refer to cash (on hand) or anything else of value that can be converted into cash?
Correct
Cash (on hand) or anything else of value that can be converted into cash is referred to as an asset. An asset is anything tangible or intangible that can be owned or controlled to produce value.
Incorrect
Cash (on hand) or anything else of value that can be converted into cash is referred to as an asset. An asset is anything tangible or intangible that can be owned or controlled to produce value.
-
Question 19 of 30
19. Question
An asset is cash (on hand) or anything else of value that can be converted into cash. Which of the following would not be considered as cash on hand when analyzing a subject’s assets?
Correct
Cash on hand comprises coins and currency in the subject’s possession (i.e., on the subject’s person, in the subject’s residence or other places, in a nominee’s hands, or in a safe deposit box). Cash on hand does not include money in any account with a financial institution.
Incorrect
Cash on hand comprises coins and currency in the subject’s possession (i.e., on the subject’s person, in the subject’s residence or other places, in a nominee’s hands, or in a safe deposit box). Cash on hand does not include money in any account with a financial institution.
-
Question 20 of 30
20. Question
What term refers to a debt arising from an oral or written promise to pay, and includes mortgages, loans, credit card debt, installment loan payments, and other debts?
Correct
A debt arising from an oral or written promise to pay, and includes mortgages, loans, credit card debt, installment loan payments, and other debts, is referred to as a liability.
Incorrect
A debt arising from an oral or written promise to pay, and includes mortgages, loans, credit card debt, installment loan payments, and other debts, is referred to as a liability.
-
Question 21 of 30
21. Question
When goods are sold or services rendered, money is usually given in exchange. What term is used to refer to money or other things of value, received in exchange for services or goods?
Correct
Money, or other things of value, received in exchange for services or goods is referred to as income. Income is not included as an asset in fraud investigations.
Incorrect
Money, or other things of value, received in exchange for services or goods is referred to as income. Income is not included as an asset in fraud investigations.
-
Question 22 of 30
22. Question
Which of the following contains information about a suspect’s personal characteristics (e.g., carries large amounts of cash, wears expensive clothes, or has club memberships), home and furnishings, automobiles, and leisure activities?
Correct
The behavioral profile contains information about the suspect’s personal characteristics (e.g., carries large amounts of cash, wears expensive clothes, or has club memberships), home and furnishings, automobiles, and leisure activities. The behavioral profile complements the financial profile.
Incorrect
The behavioral profile contains information about the suspect’s personal characteristics (e.g., carries large amounts of cash, wears expensive clothes, or has club memberships), home and furnishings, automobiles, and leisure activities. The behavioral profile complements the financial profile.
-
Question 23 of 30
23. Question
To perform the asset method or the expenditures method, the fraud examiner would assemble the financial and behavioral profiles of the subject. Which of the following is a difference between a subject’s behavioral profile and financial profile?
Correct
A financial profile might have information gaps, but such factors and gaps can be filled in by preparing the behavioral profile. The behavioral profile complements the financial profile. The following are differences between the financial and behavioral profiles:
– The financial profile works best for large transactions while the behavioral profile is best at identifying smaller activities and smaller currency transactions.
– The behavioral profile contains information about the suspect’s personal characteristics while the financial profile contains the financial statement about the subject.Incorrect
A financial profile might have information gaps, but such factors and gaps can be filled in by preparing the behavioral profile. The behavioral profile complements the financial profile. The following are differences between the financial and behavioral profiles:
– The financial profile works best for large transactions while the behavioral profile is best at identifying smaller activities and smaller currency transactions.
– The behavioral profile contains information about the suspect’s personal characteristics while the financial profile contains the financial statement about the subject. -
Question 24 of 30
24. Question
Which of the following terms refers to the type of assets that can be purchased and sold quickly?
Correct
Liquid assets are assets that can be purchased and sold quickly. Fraudsters tend to hide liquid assets more frequently.
Incorrect
Liquid assets are assets that can be purchased and sold quickly. Fraudsters tend to hide liquid assets more frequently.
-
Question 25 of 30
25. Question
Which of the following terms refers to the type of assets that cannot be sold quickly or are not easily converted into cash?
Correct
Illiquid assets are assets that are not easily converted into cash. Fraudsters tend to hide liquid assets more frequently than illiquid assets.
Incorrect
Illiquid assets are assets that are not easily converted into cash. Fraudsters tend to hide liquid assets more frequently than illiquid assets.
-
Question 26 of 30
26. Question
Illiquid assets are assets that are not easily converted into cash. Which of the following is least likely to be an example of illiquid assets?
Correct
Illiquid assets are assets that are not easily converted into cash. Examples of illiquid assets include real property, vehicles, boats, and planes.
Incorrect
Illiquid assets are assets that are not easily converted into cash. Examples of illiquid assets include real property, vehicles, boats, and planes.
-
Question 27 of 30
27. Question
Asset hiders look to conceal their assets with financial vehicles that have certain characteristics. Which of the following is least likely to be a type of product that asset hiders would invest in?
Correct
Asset hiders want products that are difficult to trace or untraceable. With such instruments, asset hiders can break or obscure links between the initial receipt of the assets and their final disposition. Asset hiders want products that are secure and accessible. Assets hiders also want products that are liquid.
Incorrect
Asset hiders want products that are difficult to trace or untraceable. With such instruments, asset hiders can break or obscure links between the initial receipt of the assets and their final disposition. Asset hiders want products that are secure and accessible. Assets hiders also want products that are liquid.
-
Question 28 of 30
28. Question
Different people hide some or all of their assets for a variety of reasons. Which of the following is a reason why people would want to hide some or all of their assets?
Correct
The reasons why people would tend to hide some or all of their assets include the following:
– To fraudulently reduce the holdings of a marital estate in divorce proceedings.
– To keep them away from creditors or remove them from bankruptcy.
– To misrepresent the assets of their company.
– To avoid having to pay a civil judgment.
– To evade taxes.
– To conceal their connection to a criminal act and to disguise illicit assets as legitimate.Incorrect
The reasons why people would tend to hide some or all of their assets include the following:
– To fraudulently reduce the holdings of a marital estate in divorce proceedings.
– To keep them away from creditors or remove them from bankruptcy.
– To misrepresent the assets of their company.
– To avoid having to pay a civil judgment.
– To evade taxes.
– To conceal their connection to a criminal act and to disguise illicit assets as legitimate. -
Question 29 of 30
29. Question
Which of the following terms refers to a transfer that a debtor makes to try to defeat a creditor’s efforts to collect against the asset?
Correct
A transfer that a debtor makes to try to defeat a creditor’s efforts to collect against the asset is referred to as a fraudulent transfer. When an individual transfers his assets to evade a creditor’s efforts to collect against the asset, the transfer is fraudulent and voidable.
Incorrect
A transfer that a debtor makes to try to defeat a creditor’s efforts to collect against the asset is referred to as a fraudulent transfer. When an individual transfers his assets to evade a creditor’s efforts to collect against the asset, the transfer is fraudulent and voidable.
-
Question 30 of 30
30. Question
There are various techniques that fraudsters use to hide ill-gotten assets. Which of the following is likely to be a way through which an individual would hide his or her assets?
Correct
Fraudsters can use many techniques to hide ill-gotten gains. Some common ways through which individuals hide assets include:
– Hiding assets in someone else’s name.
– Depositing funds into financial institutions.
– Purchasing real estate.
– Using assets to pay down debt (e.g., mortgages, credit card balances).
– Purchasing assets and collectibles, such as art and antiques.
– Transferring assets into tax havens.
– Transferring assets into trusts.
– Using assets to purchase insurance products.
– Investing assets.
– Hiding assets in businesses.Incorrect
Fraudsters can use many techniques to hide ill-gotten gains. Some common ways through which individuals hide assets include:
– Hiding assets in someone else’s name.
– Depositing funds into financial institutions.
– Purchasing real estate.
– Using assets to pay down debt (e.g., mortgages, credit card balances).
– Purchasing assets and collectibles, such as art and antiques.
– Transferring assets into tax havens.
– Transferring assets into trusts.
– Using assets to purchase insurance products.
– Investing assets.
– Hiding assets in businesses.