Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

ACCT 4235: Fraud Examination Final Exam with Answers, Exams of Accounting

A final exam for acct 4235, focusing on fraud examination with correct answers. It covers topics such as interviewing techniques, honesty testing, reactions to crisis, and financial statement fraud. The exam includes multiple-choice questions designed to assess understanding of fraud detection methods, management fraud, and the manipulation of financial statements. It also touches on identity theft and various types of fraud schemes, providing a comprehensive review of key concepts in fraud examination. This material is useful for students studying accounting, auditing, and fraud examination, offering practical insights into identifying and preventing fraudulent activities. The questions cover a range of topics, including interviewing techniques, honesty testing methods, reactions to crisis, and financial statement fraud indicators. It also addresses specific fraud schemes and the importance of internal controls in preventing fraud.

Typology: Exams

2024/2025

Available from 05/24/2025

Achieverr
Achieverr ๐Ÿ‡บ๐Ÿ‡ธ

4.3

(7)

9.1K documents

1 / 23

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
ACCT 4235 Final exam with correct
answers
which of the following is a characteristic of a good interview?
a. make the interview as concise as possible
b. the interviewer should announce his or her bias at the outset, because
the interviewee will cooperate better when the interviewee knows the type
of info the interviewer is seeking
c. friendly interviewees appear helpful, but may have hidden motives and
may provide bad information
d. it is important to schedule the interviews ahead of time, especially if you
are planning to interview a potentially hostile interviewee - CORRECT
ANSWERS โœ”โœ”a
information questions are designed to:
I. Establish the interview theme
II. Establish rapport
III. Assess culpability
a. I, II, and III
b. I and II only
c. II and III only
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17

Partial preview of the text

Download ACCT 4235: Fraud Examination Final Exam with Answers and more Exams Accounting in PDF only on Docsity!

ACCT 4235 Final exam with correct

answers

which of the following is a characteristic of a good interview? a. make the interview as concise as possible b. the interviewer should announce his or her bias at the outset, because the interviewee will cooperate better when the interviewee knows the type of info the interviewer is seeking c. friendly interviewees appear helpful, but may have hidden motives and may provide bad information d. it is important to schedule the interviews ahead of time, especially if you are planning to interview a potentially hostile interviewee - CORRECT ANSWERS โœ”โœ”a information questions are designed to: I. Establish the interview theme II. Establish rapport III. Assess culpability a. I, II, and III b. I and II only c. II and III only

d. Neither I,II, and III - CORRECT ANSWERS โœ”โœ”d arrange in order the stages that people generally go through in reaction to a crisis I. Anger II. Denial III. Acceptance IV. Depression V. Rationalization a. I, II, III, IV, V b. I, II, V, III, IV c. II, V, IV, I, III d. II, I, V, IV, III - CORRECT ANSWERS โœ”โœ”d which of the following is not a method of honesty testing a. graphology b. voice stress analysis c. body language test d pencil and paper test - CORRECT ANSWERS โœ”โœ”c

interviewing as discussed in the textbook is: a. the systematic questioning of individuals who have knowledge of events, people, and evidence involved in a case under investigation b. the process of answering questions from an interviewer for the purpose of finding a job c. by far the least common technique used in investigation and resolving fraud d. similar to ordinary conversation - CORRECT ANSWERS โœ”โœ”a which of the following honesty testing techniques deals with the study of handwriting for the purpose of character analysis? a. polygraph b. graphology c. pencil and paper test d. voice stress - CORRECT ANSWERS โœ”โœ”b which of the following is not a good thing to do during an interview a. conduct the interview in private b. establish the purpose of the interview c. interview more than one person at once d. do not invade body space - CORRECT ANSWERS โœ”โœ”c the three aspects of management fraud that a fraud examiner needs to be aware of include all of the following except: a. their backgrounds

b. their religious convictions c. their motivations d. their influence in making decisions for the organization - CORRECT ANSWERS โœ”โœ”b during an audit, an auditor considers the conditions of the auditee and plans the audit accordingly. This is an example of which of the following? a. zero order reasoning b. high order reasoning c. first order reasoning d. fraudulent reasoning - CORRECT ANSWERS โœ”โœ”c management fraud is usually committed on behalf of the organization rather than against it. Which of the following would not be a motivation of fraud on behalf of the organization a. a CEO needs a new car b. a highly competitive industry c. pressure to meet expected earnings d. restructure debt covenants that cannot be met - CORRECT ANSWERS โœ”โœ”a when looking for financial statement fraud, auditors should look for indicators of fraud by:

a. backdrafting stock options b. backdating stock options c. stock option reversals d. stock option extensions - CORRECT ANSWERS โœ”โœ”b most financial statements fraud occurs in smaller organizations with simple management structures, rather than in large, historically profitable organizations. This is because: a. it is easier to implement good internal controls in a small organization b. smaller organizations do not have investors c. management fraud is more difficult to commit when there is a more formal organizational structure of management d. people in large organizations are more honest - CORRECT ANSWERS โœ”โœ”c without a confession, forged documents ,or repeated fraudulent acts that establish a pattern of dishonesty, convicting someone of fraud is often difficult true false - CORRECT ANSWERS โœ”โœ”true in the phar-more fraud case, several different methods were used to manipulate the financial statements. These included all of the following except

a. funneling losses into an unaudited subsidiaries b. overstating inventors c. recognizing revenue that should have been deferred d. manipulating accounts - CORRECT ANSWERS โœ”โœ”a overstating cash is usually difficult because: a. cash balances can be easily confirmed with banks and other financial institutions b. cash is hard to steal c. cash is normally not a fraudulent account d. cash is usually a small asset - CORRECT ANSWERS โœ”โœ”a which of the following is not a type of transaction that can create liabilities for a company a. purchasing inventory b. borrowing money c. selling purchased goods d. paying a loan - CORRECT ANSWERS โœ”โœ”d financial statement frauds most often occur in large, well-established companies true

which of the following is not a positive effect on the financial statements due to recognizing something as revenue instead of as a liability a. understates liabilities b. it overstates revenues c. it overstates net income d. it overstates assets - CORRECT ANSWERS โœ”โœ”d analytical symptoms of accounts payable fraud most often relate to reported "accounts payable" balances that appear: a. too low b. too high c. too perfect d. unchanged - CORRECT ANSWERS โœ”โœ”a each of the following assets is correctly linked with how it can be overstated except; a. inventory can be overstated by improperly capitalizing these assets b. marketable securities can be overstated because they aren't widely traded, and it's difficult to assign an accurate value to the securities c. fixed assets can be overstated by leaving expired assets on the books d. assets can be inflated in mergers, acquisitions, and restructurings by having the wrong entity act as the acquirer - CORRECT ANSWERS โœ”โœ”a in liability fraud, liabilities are most often a. understated

b. overstated c. recorded as assets d. recorded as expenses - CORRECT ANSWERS โœ”โœ”a consumers should provide credit card numbers or bank information over the phone only when: a. they initiated the call and are purchasing a legitimate product b. they are asked to give the information c. the entity receiving this information is a legitimate company d. they feel confident that the receiving entity will protect such information

  • CORRECT ANSWERS โœ”โœ”a which of the following institutions would not be very helpful to call in the event of identity theft? a. IRS b. social security administration c. local chamber of commerce d. a credit reporting agency - CORRECT ANSWERS โœ”โœ”c out of all the types of fraud discussed in this chapter, which type is perpetrated least often a. skimming

a. wait to see where the perpetrator is spending your money, then using this info, plan an investigation with the local FBI organization b. contact friends and neighbors to inquire if they have any useful information about the perpetrator c. contact the federal trade commission for assistance and advice d. do none of the suggestions provided - CORRECT ANSWERS โœ”โœ”c which of the following types of disbursement fraud occurs least frequently? a. expense tampering b. payroll schemes c. register disbursement schemes d. billing schemes - CORRECT ANSWERS โœ”โœ”c which of the following is not listed in the chapter as a common characteristic of Nigerian scam letters? a. the promise of money to lure victims b. urgency to invest quickly c. picture of perpetrator to assure victims d. strong ties to high ranking foreign officials to lure victims - CORRECT ANSWERS โœ”โœ”c which of the following results in the highest loss per case?

a. expense tampering b. payroll schemes c. register disbursement schemes d. billing schemes - CORRECT ANSWERS โœ”โœ”d what is the best defense against consumer fraud a. signing up with the national do not call registry b. purchasing credit card insurance c. educating yourself about credit card risks d. calling the federal trade commission - CORRECT ANSWERS โœ”โœ”c which of the following is not a way that individuals can commit tax fraud a. overstating the amount of deductions b. keeping two sets of books c. paying the least amount of taxes the individual owes d. making false entries in books and records - CORRECT ANSWERS โœ”โœ”c which of the following describes a chapter 13 bankruptcy a. all assets are liquidated and used to pay creditors b. reorganizations can be used by individuals with debts less than $ million

the retention of a fraud investigator in bankruptcy proceeding must be approved by the bankruptcy judge unless: a. the debtor's estate pays the investigator b. the trustee pays the investigator c. the creditors' committee pays the investigator d. an individual creditor or shareholder pays the investigator - CORRECT ANSWERS โœ”โœ”d which of the following is the major reason why there is so much divorce fraud a. assets are being taken away from one divorce partner and given to another b. divorce proceedings usually take a long time c. states make divorce very difficult d. children usually get most assets in divorce cases - CORRECT ANSWERS โœ”โœ”a to work as an entry level CI special agent a. you must be a US citizen b. you must be not older than 37 c. you must have completed a 4 year course of study or earned a bachelor's degree

d. you must meet all the conditions provided - CORRECT ANSWERS โœ”โœ”d which of the following is an indicator of possible hiding of assets in a divorce a. assets transferred to an off-site location b. changing the title to assets c. payments made to fictitious individuals d. all of the answers - CORRECT ANSWERS โœ”โœ”d the person appointed by a bankruptcy judge in a chapter 11 proceeding who investigates allegations of fraud or misconduct is a. creditor b. adjuster c. auditor d. examiner - CORRECT ANSWERS โœ”โœ”d most email users understand the importance of encrypted mail messages and use one of the easily accessible encryption protocols for their emails true false - CORRECT ANSWERS โœ”โœ”false

wartrapping is: a. using a key to lock a message and another key to unlock it b. a signature sent over the internet c. a free internet access point set up by hackers and used to steal passwords and other important information d. illegal or unauthorized viewing of information as it passes along a network communication channel - CORRECT ANSWERS โœ”โœ”c which of the following is not an element of a company's control environment a. audit committee particiaption b. management philosophy c. hiring policies d. independent checks - CORRECT ANSWERS โœ”โœ”d the value of data lies in its ability to be easily a. converted to money b. replicated c. transferred d. all the above - CORRECT ANSWERS โœ”โœ”d a trojan horse:

a. sends email or pop up messages to users asking for personal information in inventive ways b. is a program that claims to do something useful, but which also contains hidden behavior c. changes information in an email header or an IP address to hide identities d. all of the choices are correct - CORRECT ANSWERS โœ”โœ”b which of the following fraud risks involves changing IP addresses a. spoofing b. sniffing c. false web sites d. customer impersonation - CORRECT ANSWERS โœ”โœ”a secure web connections are based on a. DNS b. FTP c. HTTPS d. FTPS - CORRECT ANSWERS โœ”โœ”c which of the following is not one of the common stages of a criminal case a. filing a criminal charge b. filing a complaint c. discovery