07 - Chapter 7 Investigating Theft Acts MULTIPLE CHOICE 1....

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 7 Investigating Theft Acts MULTIPLE CHOICE 1. Which of the following is the last step in an investigation? a. Interview suspect b. Interview former employees c. Interview other buyers or co-workers d. Invigilation ANS: A A: Correct B: Incorrect - This step is done at the beginning of the investigation to collect information C: Incorrect - This step is done during the entire investigation D: Incorrect - This step, if necessary, would come in the middle of the investigation to gather more in- formation 2. When investigating fraud, detectives should usually interview suspects: a. At the beginning of the investigation to really put the heat on them b. In the middle of the investigation to make them feel like their not really a suspect c. At the end of the investigation to allow time to find the most evidence against them ANS: C A: You don't have enough evidence against a suspect to ask any intelligent questions B: You may not be able to detect if the suspect is lying because you don't have all the evidence C: Correct 3. The final step in a fraud investigation is a. Search public records b. Interview former employers and co-workers c. Surveillance and invigilation. d. Interview suspect ANS: D D: The other steps should be completed before the interview, so the interviewer has as much informa- tion possible about the interviewee. this gives the interviewer a significant advantage. 4. A vulnerability chart is used to a. Organize answers to investigative questions b. Identify who had the opportunity to commit the fraud c. Determine the possible motive for the fraud d. All of the above ANS: D A: This is one of the purposes of a vulnerability chart, but not the only one listed as an answer. B: This is one of the purposes of a vulnerability chart, but not the only one listed as an answer. C: This is one of the purposes of a vulnerability chart, but not the only one listed as an answer. D: All of the above are purposes of a vulnerability chart (p. 183) 5. Which of the following is not a method for theft investigation? a. covert operations (surveillance) b. computer searches c. Invigilation
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
d. Physical Evidence ANS: B A: A is incorrect because it is a method of theft investigation B: B is correct because it is a method for concealment investigation C: C is incorrect because it is a method of theft investigation D: D is incorrect because physical evidence is used in theft investigation 6. Methods for theft act investigations include all of the following EXCEPT: a. Surveillance and covert operations b. Interviews and interrogation c. Invigilation d. Physical evidence ANS: B A: This is a theft act investigation method C: This is a theft act investigation method D: This is a theft act investigation method 7. Characteristics of invigilation include which of the following?
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 9

07 - Chapter 7 Investigating Theft Acts MULTIPLE CHOICE 1....

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online