Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
Premium Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
What statement best describes paralinguistic communication?
Correct
Paralinguistic communication involves the use of volume, pitch, and voice quality to convey meaning. Listening and observation of changes in the nonverbal accompaniment should be done carefully by an interviewer as this is the key to understanding if the respondent is trying to deceive the interviewer.
Incorrect
Paralinguistic communication involves the use of volume, pitch, and voice quality to convey meaning. Listening and observation of changes in the nonverbal accompaniment should be done carefully by an interviewer as this is the key to understanding if the respondent is trying to deceive the interviewer.
-
Question 2 of 30
2. Question
What is the term used to refer to the investigation technique designed to obtain evidence by the use of agents whose true intentions are not communicated to the target?
Correct
An investigation technique designed to obtain evidence by the use of agents whose true intentions are not communicated to the target is known as a covert operation. With proper planning and precautions, a covert operation can prove very beneficial to an investigation.
Incorrect
An investigation technique designed to obtain evidence by the use of agents whose true intentions are not communicated to the target is known as a covert operation. With proper planning and precautions, a covert operation can prove very beneficial to an investigation.
-
Question 3 of 30
3. Question
A covert operation being an investigation technique designed to obtain evidence by use of agents whose true intentions are not communicated to the target, has two main forms. What are the two forms of covert operations?
Correct
The two main forms of covert operations, which are investigation techniques designed to obtain evidence by use of agents whose true intentions are not communicated to the target, are undercover operations and surveillance operations.
Incorrect
The two main forms of covert operations, which are investigation techniques designed to obtain evidence by use of agents whose true intentions are not communicated to the target, are undercover operations and surveillance operations.
-
Question 4 of 30
4. Question
In which form of covert operation does the agent engage in the use of deception and disguise to obtain evidence directly from those involved in illegal activities?
Correct
Undercover operations often use deception and disguise to obtain evidence directly from those involved in illegal activity. Agents engaged in undercover operations actively attempt to extract the desired information.
Incorrect
Undercover operations often use deception and disguise to obtain evidence directly from those involved in illegal activity. Agents engaged in undercover operations actively attempt to extract the desired information.
-
Question 5 of 30
5. Question
In which form of covert operation does the agent engage in the use of observation to gather information about individuals suspected of misconduct?
Correct
Surveillance operation is the form of covert operations that makes use of observation to gather information about individuals suspected of misconduct.
Incorrect
Surveillance operation is the form of covert operations that makes use of observation to gather information about individuals suspected of misconduct.
-
Question 6 of 30
6. Question
Bill who is an agent has been employed to observe and monitor a suspect from afar while he meets with a potential co-conspirator. What type of covert operation is Bill carrying out?
Correct
In surveillance operations, the agent makes use of observation to gather information about individuals suspected of misconduct. Bill would be carrying out a surveillance operation when he observes a suspect from afar while he meets with a potential co-conspirator.
Incorrect
In surveillance operations, the agent makes use of observation to gather information about individuals suspected of misconduct. Bill would be carrying out a surveillance operation when he observes a suspect from afar while he meets with a potential co-conspirator.
-
Question 7 of 30
7. Question
David is an investigator on a potential fraud case. David poses as the co-conspirator’s agent and engages the suspect in conversation in an attempt to gather information. Which of the types of covert operations would David’s tehnique be an example of?
Correct
Undercover operations make use of deception and disguise to obtain evidence directly from those involved in the illicit activity. If David poses as the co-conspirator’s agent and engages the suspect in conversation in an attempt to gather information, David’s investigation technique would be an example of an undercover operation.
Incorrect
Undercover operations make use of deception and disguise to obtain evidence directly from those involved in the illicit activity. If David poses as the co-conspirator’s agent and engages the suspect in conversation in an attempt to gather information, David’s investigation technique would be an example of an undercover operation.
-
Question 8 of 30
8. Question
Before conducting a covert operation, it is important that the basis for the operation be written. Which of the following is least likely to be included in the memorandum of a covert operation?
Correct
The memorandum of a covert operation should clearly state the following:
– The information upon which the covert operation will be based.
– The information that is expected to be gained from the operation.
– The identities of suspects, if known.
– Operatives under the fraud examiner’s care, custody, or control (confidential sources’ identities should not be disclosed, but such sources should be referred to with a symbol).Incorrect
The memorandum of a covert operation should clearly state the following:
– The information upon which the covert operation will be based.
– The information that is expected to be gained from the operation.
– The identities of suspects, if known.
– Operatives under the fraud examiner’s care, custody, or control (confidential sources’ identities should not be disclosed, but such sources should be referred to with a symbol). -
Question 9 of 30
9. Question
Which of the following is least likely to be the aim of a fraud examiner who engages in undercover operations by abandoning his true identity as a fraud examiner and adopting another identity?
Correct
A fraud examiner is undercover when he officially abandons his identity as a fraud examiner and adopts one designed to obtain information from people who do not realize his true identity. The aim of abandoning his true identity is normally to avoid being compromised, to minimize danger to the fraud examiner, and to ensure the operation’s success.
Incorrect
A fraud examiner is undercover when he officially abandons his identity as a fraud examiner and adopts one designed to obtain information from people who do not realize his true identity. The aim of abandoning his true identity is normally to avoid being compromised, to minimize danger to the fraud examiner, and to ensure the operation’s success.
-
Question 10 of 30
10. Question
What is the general rule concerning the number of people to be told about an undercover operation?
Correct
Only those people who need to know about an undercover operation should be informed of the undercover investigation. Information should be developed with care to avoid alerting the targets or their associates.
Incorrect
Only those people who need to know about an undercover operation should be informed of the undercover investigation. Information should be developed with care to avoid alerting the targets or their associates.
-
Question 11 of 30
11. Question
The specific objectives of a covert operation depend on the type of investigation being conducted. Which of the following is least likely to be a general objective of covert operations?
Correct
The specific objectives of a covert operation depend on the type of investigation being conducted. For example, the objectives in the surveillance of a warehouse would not be the same as those in surveillance designed to determine if someone is receiving a kickback. However, all covert operations have similar general objectives and they include:
– To obtain evidence of a past, current, or future crime.
– To identify those engaged in possible illegal activity.
– To recover illegal gains.
– To identify co-conspirators.
– To identify the modus operandi.Incorrect
The specific objectives of a covert operation depend on the type of investigation being conducted. For example, the objectives in the surveillance of a warehouse would not be the same as those in surveillance designed to determine if someone is receiving a kickback. However, all covert operations have similar general objectives and they include:
– To obtain evidence of a past, current, or future crime.
– To identify those engaged in possible illegal activity.
– To recover illegal gains.
– To identify co-conspirators.
– To identify the modus operandi. -
Question 12 of 30
12. Question
What statement best describes the term “entrapment?”
Correct
The process of law enforcement officers or government agents inducing a person to commit a crime that he is not previously disposed to commit is known as entrapment. Entrapment poses a legal problem in covert operations, particularly in undercover operations, because the defendant might not be found liable if it appears that he was improperly induced to commit the crime.
Incorrect
The process of law enforcement officers or government agents inducing a person to commit a crime that he is not previously disposed to commit is known as entrapment. Entrapment poses a legal problem in covert operations, particularly in undercover operations, because the defendant might not be found liable if it appears that he was improperly induced to commit the crime.
-
Question 13 of 30
13. Question
Surveillance is the planned observation of people, places, or objects. Which of the following are the two general types of surveillance?
Correct
There are two general types of surveillance. The two general types of surveillance are mobile surveillance (also known as tailing or shadowing) and fixed surveillance (also referred to as stakeout or plant).
Incorrect
There are two general types of surveillance. The two general types of surveillance are mobile surveillance (also known as tailing or shadowing) and fixed surveillance (also referred to as stakeout or plant).
-
Question 14 of 30
14. Question
There are two basic methods of surveillance. Which of the following are the two basic methods of surveillance?
Correct
There are two basic methods of surveillance. These basic methods of surveillance are loose surveillance and close surveillance.
Incorrect
There are two basic methods of surveillance. These basic methods of surveillance are loose surveillance and close surveillance.
-
Question 15 of 30
15. Question
Which of the basic methods of surveillance is used when targets do not need to be kept under constant observation?
Correct
When targets do not need to be kept under constant observation, the common method of surveillance used is loose surveillance. Loose surveillance should be discontinued if the subject becomes suspicious.
Incorrect
When targets do not need to be kept under constant observation, the common method of surveillance used is loose surveillance. Loose surveillance should be discontinued if the subject becomes suspicious.
-
Question 16 of 30
16. Question
Which of the basic methods of surveillance is used when subjects need to be kept under continuous observation?
Correct
When subjects need to be kept under continuous observation, the common method of surveillance used is close surveillance. Close surveillance should still be used even if it appears that the subjects have become suspicious.
Incorrect
When subjects need to be kept under continuous observation, the common method of surveillance used is close surveillance. Close surveillance should still be used even if it appears that the subjects have become suspicious.
-
Question 17 of 30
17. Question
When performing a foot surveillance technique, it is important that the subject does not identify the observer. What method of lessening the chance of an observer being identified by the subject, involves the observers changing places with each other by either pre-arrangement or signal?
Correct
During foot surveillance, observers tend to make sure that they are not identified by the subject. One method of achieving this is by using the leap-frog method which involves the observers changing places with each other by either pre-arrangement or signal.
Incorrect
During foot surveillance, observers tend to make sure that they are not identified by the subject. One method of achieving this is by using the leap-frog method which involves the observers changing places with each other by either pre-arrangement or signal.
-
Question 18 of 30
18. Question
What method of lessening the chance of an observer being identified by the subject, involves one observer following the subject a certain distance, discontinuing the surveillance and noting the time, then the next day, another observer picks up the subject at the time and place where the surveillance was previously discontinued, and again follows the subject for a short distance?
Correct
One method that lessens the chance of an observer being identified by the subject is the progressive surveillance method. This method is used when extreme caution is necessary. With this technique, the subject is followed a certain distance, then the surveillance is discontinued and the time noted. The next day, another observer picks up the subject at the time and place where the surveillance was previously discontinued, and again follows the subject for a short distance. This continues for days until the surveillance is completed.
Incorrect
One method that lessens the chance of an observer being identified by the subject is the progressive surveillance method. This method is used when extreme caution is necessary. With this technique, the subject is followed a certain distance, then the surveillance is discontinued and the time noted. The next day, another observer picks up the subject at the time and place where the surveillance was previously discontinued, and again follows the subject for a short distance. This continues for days until the surveillance is completed.
-
Question 19 of 30
19. Question
What statement best describes aerial surveillance?
Correct
Aerial surveillance is the observation of a place, person, group, or ongoing activity from an aerial vehicle. Aerial surveillance includes satellite surveillance and surveillance with unmanned aerial vehicles (also known as drones).
Incorrect
Aerial surveillance is the observation of a place, person, group, or ongoing activity from an aerial vehicle. Aerial surveillance includes satellite surveillance and surveillance with unmanned aerial vehicles (also known as drones).
-
Question 20 of 30
20. Question
In which form of engagement letter does the fraud examiner describe in detail, the procedures he would make use of and limit the scope of an examination to the procedures defined?
Correct
In the body of the long-form engagement letter, the fraud examiner describes the procedures in detail and limits the scope of an examination to the procedures defined. The long-form engagement letter is not recommended for engagements that require the investigation of fraud allegations and a concluding opinion on the existence of fraud.
Incorrect
In the body of the long-form engagement letter, the fraud examiner describes the procedures in detail and limits the scope of an examination to the procedures defined. The long-form engagement letter is not recommended for engagements that require the investigation of fraud allegations and a concluding opinion on the existence of fraud.
-
Question 21 of 30
21. Question
Every data analysis process is generally made up of phases that should be considered and implemented, to the appropriate extent. Which of the following is least likely to be a common phase involved in a data analysis process?
Correct
To ensure the most accurate and meaningful results in a fraud examination, a formal data analysis process should be applied. While the specific data analysis process will vary based on the realities and needs of the organization, the following steps should be considered and implemented, to the appropriate extent, in each data analysis engagement:
– Planning phase
– Preparation phase
– Testing and interpretation phase
– Post-analysis phaseIncorrect
To ensure the most accurate and meaningful results in a fraud examination, a formal data analysis process should be applied. While the specific data analysis process will vary based on the realities and needs of the organization, the following steps should be considered and implemented, to the appropriate extent, in each data analysis engagement:
– Planning phase
– Preparation phase
– Testing and interpretation phase
– Post-analysis phase -
Question 22 of 30
22. Question
As with most tasks, proper planning is very essential in a data analysis engagement. Which of the following is least likely to be a consequence that a fraud examiner risks by avoiding proper planning before undertaking a data analysis process?
Correct
Proper planning is essential in a data analysis engagement. Without sufficient time and attention devoted to planning early on, the fraud examiner risks analyzing the data inefficiently, lacking focus or direction for the engagement, running into avoidable technical difficulties, and possibly overlooking key areas for exploration.
Incorrect
Proper planning is essential in a data analysis engagement. Without sufficient time and attention devoted to planning early on, the fraud examiner risks analyzing the data inefficiently, lacking focus or direction for the engagement, running into avoidable technical difficulties, and possibly overlooking key areas for exploration.
-
Question 23 of 30
23. Question
Proper planning is essential in a data analysis engagement. The planning phase of data analysis is made up of steps that are essential. Which of the following is least likely to be a step involved in the planning phase of data analysis?
Correct
Sufficient time and attention should be devoted to planning a data analysis process early. The planning phase of data analysis is made up of the following steps:
– Understand the data.
– Define examination objectives.
– Build a profile of potential frauds.
– Determine whether predication exists.Incorrect
Sufficient time and attention should be devoted to planning a data analysis process early. The planning phase of data analysis is made up of the following steps:
– Understand the data.
– Define examination objectives.
– Build a profile of potential frauds.
– Determine whether predication exists. -
Question 24 of 30
24. Question
What term is used to refer to the totality of circumstances that would lead a reasonable, professionally trained, and prudent individual to believe that a fraud has occurred, is occurring, and/or will occur?
Correct
The term used to refer to the totality of circumstances that would lead a reasonable, professionally trained, and prudent individual to believe that a fraud has occurred, is occurring, and/or will occur is predication. Data analytics is instrumental in helping a fraud examiner determine predication. Predication is the basis upon which a fraud investigation begins. Internal fraud investigations should not be conducted without proper predication.
Incorrect
The term used to refer to the totality of circumstances that would lead a reasonable, professionally trained, and prudent individual to believe that a fraud has occurred, is occurring, and/or will occur is predication. Data analytics is instrumental in helping a fraud examiner determine predication. Predication is the basis upon which a fraud investigation begins. Internal fraud investigations should not be conducted without proper predication.
-
Question 25 of 30
25. Question
In which of the following phases that make up a proper data analysis process, does the phrase “garbage in, garbage out” apply?
Correct
The phrase “garbage in, garbage out” is applicable in the preparation phase. Before running tests on the data, the fraud examiner must make certain the data being analyzed are relevant and reliable for the objective of the engagement. This is done during the preparation phase.
Incorrect
The phrase “garbage in, garbage out” is applicable in the preparation phase. Before running tests on the data, the fraud examiner must make certain the data being analyzed are relevant and reliable for the objective of the engagement. This is done during the preparation phase.
-
Question 26 of 30
26. Question
Proper planning is essential in a data analysis process as the results of a data analysis test will only be as good as the data used for the analysis. The preparation phase of data analysis is made up of steps that are essential. Which of the following is least likely to be a step involved in the preparation phase of data analysis?
Correct
In the preparation phase, the fraud examiner must make certain that the data being analyzed are relevant and reliable for the objective of the engagement. The preparation phase of data analysis is made up of the following steps:
– Identify the relevant data.
– Obtain the data.
– Verify the data.
– Cleanse and normalize the data.Incorrect
In the preparation phase, the fraud examiner must make certain that the data being analyzed are relevant and reliable for the objective of the engagement. The preparation phase of data analysis is made up of the following steps:
– Identify the relevant data.
– Obtain the data.
– Verify the data.
– Cleanse and normalize the data. -
Question 27 of 30
27. Question
When using data analysis to detect fraud, the fraud examiner should organize and analyze the data in a way designed to uncover patterns that are consistent with the specific fraud scenarios identified during the planning stage. Which of the following categorizations is least likely to be used in grouping data being analyzed?
Correct
The specific groupings should be based on the target fraud scenario and data being analyzed, but such categorization might include grouping data by:
– Geographical location
– Business division or unit
– Time period
– Dollar value
– SalespersonIncorrect
The specific groupings should be based on the target fraud scenario and data being analyzed, but such categorization might include grouping data by:
– Geographical location
– Business division or unit
– Time period
– Dollar value
– Salesperson -
Question 28 of 30
28. Question
What is the term used to refer to a transaction identified by a data analysis test as an anomaly within the data set even though it is not actually a fraudulent transaction?
Correct
A transaction identified by a data analysis test as an anomaly within the data set even though it is not actually a fraudulent transaction is known as a false positive. Such results can occur for various reasons.
Incorrect
A transaction identified by a data analysis test as an anomaly within the data set even though it is not actually a fraudulent transaction is known as a false positive. Such results can occur for various reasons.
-
Question 29 of 30
29. Question
False positives can occur for a number of reasons. Which of the following is not a reason why analysis of data sets would produce an anomaly within a dataset known as a false positive?
Correct
False positives can occur for a number of reasons. These reasons include data validity/integrity issues, data merging difficulties, and Legitimate data that fall outside the field norm (e.g., letters in a numbers-only field, such as a phone number).
Incorrect
False positives can occur for a number of reasons. These reasons include data validity/integrity issues, data merging difficulties, and Legitimate data that fall outside the field norm (e.g., letters in a numbers-only field, such as a phone number).
-
Question 30 of 30
30. Question
The terms and objectives of the data analysis engagement will dictate whether a formal report should be issued and if so, the form and audience of the resulting report. Which is least likely to be characteristic of a formal report of data analysis?
Correct
A formal report of data analysis might be issued depending on the terms and objectives of the engagement. Such a report should typically be easy to understand, summarize the analysis findings, and provide insightful and applicable information for the relevant readers.
Incorrect
A formal report of data analysis might be issued depending on the terms and objectives of the engagement. Such a report should typically be easy to understand, summarize the analysis findings, and provide insightful and applicable information for the relevant readers.