{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

08 - Chapter 8 Investigating Concealment MULTIPLE CHOICE 1...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 8 Investigating Concealment MULTIPLE CHOICE 1. __________ are commonly used by attorneys involved in litigation to track documents a. RFID tags b. Bates numbers c. Bar codes d. All of the above ANS: B B: Correct 2. Secondary evidence may be used in all of the following instances except: a. The original document has been lost or destroyed without the intent or fault of the party seeking to introduce the secondary evidence. b. The original document is in the possession of an adverse party who fails to produce it after a written notice to do so. c. The original documents are too voluminous to permit careful examination. d. The original documents are too fragile to be handled. ANS: D D: Correct; the original evidence would need to be produced in this case 3. The risk that an auditor examines a fraudulent check and does not recognize it as being fraudulent is called: 4. All of the following information can be obtained from a cancelled check except: 5. Computer searches and physical asset counts usually focus on which element of a fraud?
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}