Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Premium Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
Once data has been extracted, it must be analyzed. There are some advantages to using data analysis software. Which of the following is least likely to be a significant advantage of using data analysis software?
Correct
There are significant advantages to using data analysis software. These advantages include:
– Data analysis software allows the fraud examiner to centralize an investigation, relying less on others to gather data.
– Data analysis software allows the fraud examiner to ensure that an investigation is accurate and complete.
– Data analysis allows the fraud examiner to base predictions about the probability of a fraudulent situation on reliable statistical information.
– Data analysis allows the fraud examiner to search entire data files for red flags of possible fraud.
– Data analysis assists the fraud examiner in developing reference files for ongoing fraud detection and investigation work.Incorrect
There are significant advantages to using data analysis software. These advantages include:
– Data analysis software allows the fraud examiner to centralize an investigation, relying less on others to gather data.
– Data analysis software allows the fraud examiner to ensure that an investigation is accurate and complete.
– Data analysis allows the fraud examiner to base predictions about the probability of a fraudulent situation on reliable statistical information.
– Data analysis allows the fraud examiner to search entire data files for red flags of possible fraud.
– Data analysis assists the fraud examiner in developing reference files for ongoing fraud detection and investigation work. -
Question 2 of 30
2. Question
Computers can scan database information for several specific types of information, creating a red-flag system. Which of the following is least likely to be one of those functions that most software packages use to perform this?
Correct
Computers can scan database information for several specific types of information, creating a red-flag system. To perform this, most software packages use a combination of different functions. These functions include:
– Sorting
– Record selection
– Joining files
– Multi-file processing
– Correlation analysis
– Verifying multiples of a number
– Compliance verification
– Duplicate searches
– Expressions and equations
– Filter and display criteria
– Fuzzy logic matching
– Gap tests
– Pivot tables
– Regression analysis
– Sort and index
– Statistical analysis
– Stratification
– Date functions
– Benford’s Law analysis
– GraphingIncorrect
Computers can scan database information for several specific types of information, creating a red-flag system. To perform this, most software packages use a combination of different functions. These functions include:
– Sorting
– Record selection
– Joining files
– Multi-file processing
– Correlation analysis
– Verifying multiples of a number
– Compliance verification
– Duplicate searches
– Expressions and equations
– Filter and display criteria
– Fuzzy logic matching
– Gap tests
– Pivot tables
– Regression analysis
– Sort and index
– Statistical analysis
– Stratification
– Date functions
– Benford’s Law analysis
– Graphing -
Question 3 of 30
3. Question
Which of the following functions used in data analysis involves arranging data in a meaningful order to aid fraud examiners quickly pick out what is important or identify blank fields where information should be entered?
Correct
Sorting is the arrangement of data in a meaningful order. Sorted data aids fraud examiners to quickly pick out what is important or identify blank fields where information should be entered.
Incorrect
Sorting is the arrangement of data in a meaningful order. Sorted data aids fraud examiners to quickly pick out what is important or identify blank fields where information should be entered.
-
Question 4 of 30
4. Question
Which of the following functions is an interactive data summarization tool found in Excel that is used to sort, count, total, or give the average of specified data in a spreadsheet?
Correct
A pivot table is an interactive data summarization tool found in Excel. It is used to sort, count, total, or give the average of specified data in a spreadsheet. Suppose you have a spreadsheet with sales data, a pivot table will allow you to determine how many sales occurred by month, by country, by product, by salesperson, and so on.
Incorrect
A pivot table is an interactive data summarization tool found in Excel. It is used to sort, count, total, or give the average of specified data in a spreadsheet. Suppose you have a spreadsheet with sales data, a pivot table will allow you to determine how many sales occurred by month, by country, by product, by salesperson, and so on.
-
Question 5 of 30
5. Question
Which of the following data analysis software functions is most likely to be used in identifying missing items in a sequence or series?
Correct
Gap tests are used to identify missing items in a sequence or series, such as missing checks or invoice numbers. It can also be used to find sequences where none are expected to exist (e.g., employee government identification numbers).
Incorrect
Gap tests are used to identify missing items in a sequence or series, such as missing checks or invoice numbers. It can also be used to find sequences where none are expected to exist (e.g., employee government identification numbers).
-
Question 6 of 30
6. Question
Which of the following data analysis software functions is a technique that uses a series of records to create a model relationship between a dependent variable and one or more independent variables?
Correct
Regression analysis is a sophisticated statistical technique that uses a series of records to create a model relationship between a dependent variable and one or more independent variables. An example of the use of regression analysis is in the modeling and predicting of the number of widgets manufactured based on amounts of materials and labor used.
Incorrect
Regression analysis is a sophisticated statistical technique that uses a series of records to create a model relationship between a dependent variable and one or more independent variables. An example of the use of regression analysis is in the modeling and predicting of the number of widgets manufactured based on amounts of materials and labor used.
-
Question 7 of 30
7. Question
Which of the following is least likely to be an example of a data analysis query that can be performed to detect fraud through the examination of the general ledger?
Correct
The following are examples of data analysis queries that can be performed to detect fraud through the examination of the general ledger:
– Select specific journal entries for analysis.
– Create actual-to-budget comparison reports.
– Analyze and confirm specific ledger accounts for legitimate transaction activity.
– Speed account reconciliation through specialized account queries.
– Calculate financial ratios.
– Calculate percentage comparison ratios between accounts.
– Prepare custom reports, cash flow, profit/loss, and asset and liability total reports.
– Compare summaries by major account in any order (low-high, high-low).
– Create reports in any format by account, division, department, etc.Incorrect
The following are examples of data analysis queries that can be performed to detect fraud through the examination of the general ledger:
– Select specific journal entries for analysis.
– Create actual-to-budget comparison reports.
– Analyze and confirm specific ledger accounts for legitimate transaction activity.
– Speed account reconciliation through specialized account queries.
– Calculate financial ratios.
– Calculate percentage comparison ratios between accounts.
– Prepare custom reports, cash flow, profit/loss, and asset and liability total reports.
– Compare summaries by major account in any order (low-high, high-low).
– Create reports in any format by account, division, department, etc. -
Question 8 of 30
8. Question
Which of the following is least likely to be an example of a data analysis query that can be performed to detect fraud through the examination of accounts receivable records?
Correct
The following are examples of data analysis queries that can be performed to detect fraud through the examination of accounts receivable records:
– Create a list of customer limit increases and decreases.
– Age accounts receivable in various formats.
– Identify gaps in sequential forms such as invoices.
– Identify duplicate invoices or customer account numbers.
– Show specified reports on credits taken by customers.
– Report customer summaries by invoice, product, etc.
– Identify customer activity by age, product, etc.
– Compare customer credit limits and current or past balances.Incorrect
The following are examples of data analysis queries that can be performed to detect fraud through the examination of accounts receivable records:
– Create a list of customer limit increases and decreases.
– Age accounts receivable in various formats.
– Identify gaps in sequential forms such as invoices.
– Identify duplicate invoices or customer account numbers.
– Show specified reports on credits taken by customers.
– Report customer summaries by invoice, product, etc.
– Identify customer activity by age, product, etc.
– Compare customer credit limits and current or past balances. -
Question 9 of 30
9. Question
Which of the following is least likely to be an example of a data analysis query that can be performed to detect fraud through the examination of cash disbursement records?
Correct
The following are examples of data analysis queries that can be performed to detect fraud through the examination of cash disbursement records:
– Summarize cash disbursements by account, bank, department, vendor, etc.
– Verify audit trail for all disbursements by purchase order, vendor, department, etc.
– Generate vendor cash activity summary for analysis.
– Identify disbursements by department, supervisor approval, or amount limits.Incorrect
The following are examples of data analysis queries that can be performed to detect fraud through the examination of cash disbursement records:
– Summarize cash disbursements by account, bank, department, vendor, etc.
– Verify audit trail for all disbursements by purchase order, vendor, department, etc.
– Generate vendor cash activity summary for analysis.
– Identify disbursements by department, supervisor approval, or amount limits. -
Question 10 of 30
10. Question
Which of the following is least likely to be an example of a data analysis query that can be performed on purchasing records to help detect fraud?
Correct
The following are examples of data analysis queries that can be performed to detect fraud through the examination of accounts receivable records:
– Track scheduled receipt dates versus actual receipt dates, in summary, and in detail.
– Compare vendor performance by summarizing item delivery times and amounts.
– Isolate purchase order types for analysis.Incorrect
The following are examples of data analysis queries that can be performed to detect fraud through the examination of accounts receivable records:
– Track scheduled receipt dates versus actual receipt dates, in summary, and in detail.
– Compare vendor performance by summarizing item delivery times and amounts.
– Isolate purchase order types for analysis. -
Question 11 of 30
11. Question
Which of the following is least likely to be an example of a data analysis query that can be performed to detect fraud through the examination of payroll records?
Correct
The following are examples of data analysis queries that can be performed to detect fraud through the examination of payroll records:
– Summarize payroll activity by specific criteria for review.
– Identify changes to payroll or employee files.
– Compare timecard and payroll rates for possible discrepancies.
– Prepare check amount reports for amounts over a certain limit.
– Check proper supervisory authorization on payroll disbursements.Incorrect
The following are examples of data analysis queries that can be performed to detect fraud through the examination of payroll records:
– Summarize payroll activity by specific criteria for review.
– Identify changes to payroll or employee files.
– Compare timecard and payroll rates for possible discrepancies.
– Prepare check amount reports for amounts over a certain limit.
– Check proper supervisory authorization on payroll disbursements. -
Question 12 of 30
12. Question
Which of the following is least likely to be an example of a data analysis query that can be performed on asset accounts to detect fraud?
Correct
The following are examples of data analysis queries that can be performed to detect fraud through the examination of asset accounts:
– Generate depreciation to cost reports.
– Compare book and tax depreciation and indicate variances.
– Sort asset values by asset type or monetary amount.
– Select samples for asset existence verification.
– Recalculate expense and reserve/provision amounts using replacement costs.Incorrect
The following are examples of data analysis queries that can be performed to detect fraud through the examination of asset accounts:
– Generate depreciation to cost reports.
– Compare book and tax depreciation and indicate variances.
– Sort asset values by asset type or monetary amount.
– Select samples for asset existence verification.
– Recalculate expense and reserve/provision amounts using replacement costs. -
Question 13 of 30
13. Question
Which of the following is least likely to be an example of a data analysis query that can be performed to detect fraud through the examination of sales information?
Correct
The following are examples of data analysis queries that can be performed to detect fraud through the examination of sales information:
– Create a report of all system overrides and sales exceptions.
– Analyze returns and allowances by store, department, or other areas.
– Summarize trends by customer type, products, salesperson, etc.
– Compare ratios of current sales to outstanding receivables or other variables.
– Generate reports on a correlation between product demand or supply and sales prices.Incorrect
The following are examples of data analysis queries that can be performed to detect fraud through the examination of sales information:
– Create a report of all system overrides and sales exceptions.
– Analyze returns and allowances by store, department, or other areas.
– Summarize trends by customer type, products, salesperson, etc.
– Compare ratios of current sales to outstanding receivables or other variables.
– Generate reports on a correlation between product demand or supply and sales prices. -
Question 14 of 30
14. Question
Which of the following is least likely to be an example of a data analysis query that can be performed to detect fraud through the examination of accounts payable?
Correct
The following are examples of data analysis queries that can be performed to detect fraud through the examination of accounts payable:
– Audit paid invoices for manual comparison with actual invoices.
– Summarize large invoices by amount, vendor, etc.
– Identify debits to expense accounts outside of set default accounts.
– Reconcile check registers to disbursements by vendor invoice.
– Verify vendor tax forms (e.g., U.S. Form 1099 or Value Added Tax (VAT) forms).
– Create vendor detail and summary analysis reports.
– Review recurring monthly expenses and compare them to posted/paid invoices.
– Generate a report on specified vouchers for manual audit or investigation.Incorrect
The following are examples of data analysis queries that can be performed to detect fraud through the examination of accounts payable:
– Audit paid invoices for manual comparison with actual invoices.
– Summarize large invoices by amount, vendor, etc.
– Identify debits to expense accounts outside of set default accounts.
– Reconcile check registers to disbursements by vendor invoice.
– Verify vendor tax forms (e.g., U.S. Form 1099 or Value Added Tax (VAT) forms).
– Create vendor detail and summary analysis reports.
– Review recurring monthly expenses and compare them to posted/paid invoices.
– Generate a report on specified vouchers for manual audit or investigation. -
Question 15 of 30
15. Question
Which of the following is least likely to be a key issue to address as one conducts data analysis?
Correct
The data analysis checklist includes some key issues to address as one conducts data analysis. The following are some key issues to address as one conducts data analysis:
– Ensure data validity and data integrity.
– Consider the data format and structure.
– Compare the cost and benefit of potential analysis.
– Consider the spectrum of distinct levels of aggregation at which fraud monitoring is required.
– Begin with the end in mind.Incorrect
The data analysis checklist includes some key issues to address as one conducts data analysis. The following are some key issues to address as one conducts data analysis:
– Ensure data validity and data integrity.
– Consider the data format and structure.
– Compare the cost and benefit of potential analysis.
– Consider the spectrum of distinct levels of aggregation at which fraud monitoring is required.
– Begin with the end in mind. -
Question 16 of 30
16. Question
What term is used to refer to someone who is on the payroll register but who does not actually work for the company?
Correct
A ghost employee is someone who is on the payroll register but who does not actually work for the company. A ghost employee scheme is one common asset misappropriation scheme. Finding ghost employees often coincides with an internal fraud scheme.
Incorrect
A ghost employee is someone who is on the payroll register but who does not actually work for the company. A ghost employee scheme is one common asset misappropriation scheme. Finding ghost employees often coincides with an internal fraud scheme.
-
Question 17 of 30
17. Question
Which of the following is likely to be one of the tests that can help a fraud examiner to uncover ghost employee schemes?
Correct
If a fraud examiner suspects a ghost employee scheme after gathering data, he would first need to determine what kind of tests to run. The following are some tests that can help to uncover ghost employee schemes:
– Multiple employees using the same bank account for direct deposit.
– Invalid or blank tax/government identification numbers.
– Multiple employees with the same tax/government identification number.
– Employees on the payroll register prior to their start date or after their termination date.
– Non-salaried employees on the payroll register but not in the timekeeping system.
– Employees on the payroll register but not in the employee master file.
– Employees with no deductions for taxes or benefits (where applicable).
– Employees with no pay increases, or more than two pay increases, in the past year.Incorrect
If a fraud examiner suspects a ghost employee scheme after gathering data, he would first need to determine what kind of tests to run. The following are some tests that can help to uncover ghost employee schemes:
– Multiple employees using the same bank account for direct deposit.
– Invalid or blank tax/government identification numbers.
– Multiple employees with the same tax/government identification number.
– Employees on the payroll register prior to their start date or after their termination date.
– Non-salaried employees on the payroll register but not in the timekeeping system.
– Employees on the payroll register but not in the employee master file.
– Employees with no deductions for taxes or benefits (where applicable).
– Employees with no pay increases, or more than two pay increases, in the past year. -
Question 18 of 30
18. Question
Data comes in different types. Which of the following types of data is found in a database, consisting of recognizable and predictable structures?
Correct
Structured data is the type of data found in a database, consisting of recognizable and predictable structures. Data analysis in the traditional sense involves running rule-based queries on structured data.
Incorrect
Structured data is the type of data found in a database, consisting of recognizable and predictable structures. Data analysis in the traditional sense involves running rule-based queries on structured data.
-
Question 19 of 30
19. Question
Data comes in various types. Which of the following types of data would not be found in a traditional spreadsheet or database?
Correct
Unstructured data is data that would not be found in a traditional spreadsheet or database. This is in contrast to structured data. Unstructured data is typically text-based.
Incorrect
Unstructured data is data that would not be found in a traditional spreadsheet or database. This is in contrast to structured data. Unstructured data is typically text-based.
-
Question 20 of 30
20. Question
Structured data is the type of data found in a database, consisting of recognizable and predictable structures. Which of the following is least likely to be an example of structured data?
Correct
Structured data is the type of data found in a database, consisting of recognizable and predictable structures. Examples of structured data include sales records, payment or expense details, and financial reports.
Incorrect
Structured data is the type of data found in a database, consisting of recognizable and predictable structures. Examples of structured data include sales records, payment or expense details, and financial reports.
-
Question 21 of 30
21. Question
Unstructured data is the type of data that would not be found in a traditional spreadsheet or database. Which of the following is least likely to be a source of unstructured data?
Correct
Unstructured data is the type of data that would not be found in a traditional spreadsheet or database. Unstructured data comes from numerous sources. Sources of unstructured data include social media posts, instant messages, videos, voice files, user documents, mobile phone software applications, news feeds, and sales and marketing materials.
Incorrect
Unstructured data is the type of data that would not be found in a traditional spreadsheet or database. Unstructured data comes from numerous sources. Sources of unstructured data include social media posts, instant messages, videos, voice files, user documents, mobile phone software applications, news feeds, and sales and marketing materials.
-
Question 22 of 30
22. Question
Which of the following types of analysis is a method of using software to extract usable information from unstructured text data?
Correct
Textual analytics is a method of using software to extract usable information from unstructured text data. Textual analytics software can categorize data to reveal patterns, sentiments, and relationships indicative of fraud. Textual analytics provides the ability to uncover additional warning signs of potentially fraudulent employee behavior.
Incorrect
Textual analytics is a method of using software to extract usable information from unstructured text data. Textual analytics software can categorize data to reveal patterns, sentiments, and relationships indicative of fraud. Textual analytics provides the ability to uncover additional warning signs of potentially fraudulent employee behavior.
-
Question 23 of 30
23. Question
Which of the following forms of fraud examination reports summarizes the issues presented, the steps taken, and the information found?
Correct
The short-form of fraud examination reports summarizes the issues presented, the steps taken, and the information found during the course of the fraud examination.
Incorrect
The short-form of fraud examination reports summarizes the issues presented, the steps taken, and the information found during the course of the fraud examination.
-
Question 24 of 30
24. Question
Which of the following forms of fraud examination reports contains the substantive work produced during the fraud examination, including copies of relevant documents and memoranda of witness interviews?
Correct
The long-form of fraud examination reports contains the substantive work produced during the fraud examination, including copies of relevant documents and memoranda of witness interviews.
Incorrect
The long-form of fraud examination reports contains the substantive work produced during the fraud examination, including copies of relevant documents and memoranda of witness interviews.
-
Question 25 of 30
25. Question
Which of the following statements is true for financial records and information?
Correct
As a general rule, financial information is private and can be obtained only by legal process or consent.
Incorrect
As a general rule, financial information is private and can be obtained only by legal process or consent.
-
Question 26 of 30
26. Question
Some people commit fraud because of something that has happened in their life that motivates them to steal. Which of the following is least likely to be a keyword that might indicate pressure?
Correct
Depending on the type of fraud risk present in an investigation, a fraud examiner will want to come up with a list of fraud keywords that are likely to point to suspicious activity. Keywords that might indicate pressure include deadline, quota, trouble, short, problem, and concern.
Incorrect
Depending on the type of fraud risk present in an investigation, a fraud examiner will want to come up with a list of fraud keywords that are likely to point to suspicious activity. Keywords that might indicate pressure include deadline, quota, trouble, short, problem, and concern.
-
Question 27 of 30
27. Question
Some people commit fraud because of something that has happened that provided an opportunity or ability to commit fraud. Which of the following is least likely to be a keyword that might indicate opportunity?
Correct
Depending on the type of fraud risk present in an investigation, a fraud examiner will want to come up with a list of fraud keywords that are likely to point to suspicious activity. Keywords that might indicate that someone has the opportunity or ability to commit fraud include override, write off, recognize revenue, adjust, discount, and reserve/provision.
Incorrect
Depending on the type of fraud risk present in an investigation, a fraud examiner will want to come up with a list of fraud keywords that are likely to point to suspicious activity. Keywords that might indicate that someone has the opportunity or ability to commit fraud include override, write off, recognize revenue, adjust, discount, and reserve/provision.
-
Question 28 of 30
28. Question
Some people that commit fraud do not have a criminal background, therefore justifying their actions is a key part of committing fraud. Which of the following is least likely to be a keyword that indicates that a fraudster is rationalizing his actions?
Correct
Depending on the type of fraud risk present in an investigation, a fraud examiner will want to come up with a list of fraud keywords that are likely to point to suspicious activity. Keywords that might indicate a fraudster is rationalizing his actions include reasonable, deserve, and temporary.
Incorrect
Depending on the type of fraud risk present in an investigation, a fraud examiner will want to come up with a list of fraud keywords that are likely to point to suspicious activity. Keywords that might indicate a fraudster is rationalizing his actions include reasonable, deserve, and temporary.
-
Question 29 of 30
29. Question
Which of the following is least likely to be an example of account holder records to be provided when requested from the bank by a subpoena or other legal processes?
Correct
The relationship between banks and their customers is confidential, therefore information from banks can be obtained only by a subpoena or other legal processes. Requested records and the information they provide could include the master file of customers, the safe deposit box records and the account opening records.
Incorrect
The relationship between banks and their customers is confidential, therefore information from banks can be obtained only by a subpoena or other legal processes. Requested records and the information they provide could include the master file of customers, the safe deposit box records and the account opening records.
-
Question 30 of 30
30. Question
To open a financial account, an individual or business must provide certain information, and the records of such information can also be valuable. Which of the following is least likely to be a piece of information contained in the account opening records of a personal account?
Correct
The account opening records for a personal account might contain handwriting samples and personal information about account holders, varying from one bank to another. Typically, the account opening records for a personal account contain the account holder’s name, address, telephone number, tax identification number, amount of the account’s opening deposit, and security data.
Incorrect
The account opening records for a personal account might contain handwriting samples and personal information about account holders, varying from one bank to another. Typically, the account opening records for a personal account contain the account holder’s name, address, telephone number, tax identification number, amount of the account’s opening deposit, and security data.