08 - Chapter 8 Investigating Concealment MULTIPLE CHOICE 1....

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 8 Investigating Concealment MULTIPLE CHOICE 1. __________ are commonly used by attorneys involved in litigation to track documents a. RFID tags b. Bates numbers c. Bar codes d. All of the above ANS: B B: Correct 2. Secondary evidence may be used in all of the following instances except: a. The original document has been lost or destroyed without the intent or fault of the party seeking to introduce the secondary evidence. b. The original document is in the possession of an adverse party who fails to produce it after a written notice to do so. c. The original documents are too voluminous to permit careful examination. d. The original documents are too fragile to be handled. ANS: D D: Correct; the original evidence would need to be produced in this case 3. The risk that an auditor examines a fraudulent check and does not recognize it as being fraudulent is called: a. Sampling Risk b. Non-Sampling Risk c. Discovery Sampling Risk d. Population Sampling Risk ANS: B A: Sampling risk is the risk that the sample is not representative of the population C: There is no such term D: There is no such term 4. All of the following information can be obtained from a cancelled check except: a. Account number of the maker b. Account number of the person who presented the check c. A trail of all people who transferred the check (assignees and assignors) d. Nature of transaction (cashed, deposited, presented for payment) ANS: C A: Incorrect; this can be determined from a cancelled check B: Incorrect; this can be determined from a cancelled check C: Correct D: Incorrect; this can be determined from a cancelled check 5. Computer searches and physical asset counts usually focus on which element of a fraud? a. Theft act b. Concealment c. Conversion d. Inquiry investigation
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
ANS: B B: Correct; they usually focus on concealment 6. Methods for concealment investigation include all but which of the following? a. Document examination b. Honesty testing c. Audits d. Computer searches ANS: B A: This is a concealment investigation technique C: This is a concealment investigation technique D: This is a concealment investigation technique 7. Three most common ways to obtain documentary evidence are _____________. a.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/04/2012 for the course AC 572 AC 572 taught by Professor Online during the Spring '11 term at Keller Graduate School of Management.

Page1 / 6

08 - Chapter 8 Investigating Concealment MULTIPLE CHOICE 1....

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online