Fraud Evidence and Investigation Flashcards
(41 cards)
Which of the following methods is acceptable to handle computer equipment seized in a computer crime investigation?
Subjecting the magnetic media to forensic testing.
Laying the magnetic media on top of electronic equipment.
Exposing the magnetic media to radio waves.
Leaving the magnetic media in the trunk of a vehicle containing a radio unit.
Subjecting the magnetic media to forensic testing.
Which of the following investigative tools ismosteffective when large volumes of evidence need to be analyzed? Computer. Questionnaires. Forensic analysis. Interviews.
Computer.
The concept of admissibility of evidence does not include which of the following? Relevance. Competence. Materiality. Sufficiency.
Sufficiency.
Data diddling can be prevented by all of the following except: Access controls. Integrity checking. Program change controls. Rapid correction of data.
Rapid correction of data.
In a computer-related crime investigation, computer evidence is: Difficult and erasable. Volatile and invisible. Electronic and inadmissible. Apparent and magnetic.
Volatile and invisible.
The final stage of reporting results of computer evidence life cycle is: Receive. Examine. Report. Return.
Return.
Identify the computer-related crime and fraud method that involves obtaining information that may be left in or around a computer system after the execution of a job. Piggybacking. Data diddling. Scavenging. Salami technique.
Scavenging.
Once evidence is seized, a law enforcement officer should follow which of the following? Chain of control. Chain of command. Chain of custody. Chain of communications.
Chain of custody.
If a computer or peripheral equipment involved in a computer crime isnotcovered by a search warrant, what should the investigator do?
Analyze the equipment or its contents, and record it.
Leave it alone until a warrant can be obtained.
Seize it before someone takes it away.
Store it in a locked cabinet in a secure warehouse.
Leave it alone until a warrant can be obtained.
Are an investigator?s handwritten notes considered valid evidence in court of law? No. Yes. Maybe. Depends.
Yes.
The most objective and relevant evidence in a computer environment involving fraud is. Physical examination. Computer logs. Physical observation. Inquiries of people.
Computer logs.
What determines if a computer crime has been committed?
When the crime is reported.
When the investigation is completed.
When a computer expert has completed his or her work.
When the allegation has been substantiated.
When the allegation has been substantiated.
Most of the evidence submitted in a computer crime case is: Secondary evidence. Documentary evidence. Admissible evidence. Legal evidence.
Documentary evidence.
What is a data diddling technique?
I.Changing data before input to a computer system.
II.Changing data during input to a computer system.
III.Changing data during output from a computer system.
IV.All options.
IV.
An internal auditor suspects fraud. Which of the following sample plans should be used if the purpose is to select a sample with a given probability of containing at least one example of the irregularity? Probability proportional to size. Attributes. Stop and go. Discovery.
Discovery.
Because of control weaknesses, it is possible that the individual managers of 122 restaurants could have placed fictitious employees on the payroll. Each restaurant employs between 25 and 30 people. To efficiently determine whether this fraud exists at less than a 1% level, the auditor should use: Discovery sampling. Judgment sampling. Directed sampling. Attributes sampling.
Discovery sampling.
Which of the following is needed to produce technical evidence in computer-related crimes? Audit methodology. Criminal methodology. Forensic methodology. System methodology.
Forensic methodology.
A reliable way to detect superzapping work is by:
Noting discrepancies by those who receive reports.
Comparing current data files with previous data files.
Examining computer usage logs.
Reviewing undocumented transactions.
Comparing current data files with previous data files.
An auditor applying a discovery sampling plan with a 5% risk of overreliance may conclude that there is:
A 95% probability that the actual rate of occurrence in the population is less than the critical rate if only one exception is found.
Greater than a 95% probability that the actual rate of occurrence in the population is less than the critical rate if no exceptions are found.
A 95% probability that the actual rate of occurrence in the population is less than the critical rate if no exceptions are found.
A 95% probability that the actual rate of occurrence in the population is less than the critical rate if the occurrence rate in the sample is less than the critical rate.
A 95% probability that the actual rate of occurrence in the population is less than the critical rate if no exceptions are found.
Evidence is needed to do which of the following? Charge a case. Classify a case. Prove a case. Make a case.
Prove a case.
What is a salami technique? Stealing small amounts of money from bank accounts. Using the rounding-down concept. Taking small amounts of assets. All options.
All options.
After partially completing an internal control review of the accounts payable department, the auditor suspects that some type of fraud has occurred. To ascertain whether the fraud is present, thebestsampling approach would be to use:
Judgmental sampling to select a sample of vouchers processed by clerks identified by the department manager as acting suspiciously.
Simple random sampling to select a sample of vouchers processed by the department during the past year.
Probability-proportional-to-size sampling to select a sample of vouchers processed by the department during the past year.
Discovery sampling to select a sample of vouchers processed by the department during the past year.
Discovery sampling to select a sample of vouchers processed by the department during the past year.
When large volumes of writing are presented in court, which type of evidence is inapplicable? Flowchart evidence. Demonstrative evidence. Magnetic tapes evidence. Best evidence.
Best evidence.
In a computer-related crime investigation, maintenance of evidence is important for which of the following reasons? To protect the evidence. To collect the evidence. To record the crime. To avoid problems of proof.
To avoid problems of proof.