No products in the cart.

Fraud Examination 5e W Steve Albrecht Chad O Albrecht Conan C Albrecht Mark F Zimbelman - Test Bank

Fraud Examination 5e W Steve Albrecht Chad O Albrecht Conan C Albrecht Mark F Zimbelman - Test Bank   Instant Download - Complete Test Bank With Answers     Sample Questions Are Posted Below   1. Who in an organization is NOT in a good position to recognize fraud during the theft act?   a. Other …

$19.99

Fraud Examination 5e W Steve Albrecht Chad O Albrecht Conan C Albrecht Mark F Zimbelman – Test Bank

 

Instant Download – Complete Test Bank With Answers

 

 

Sample Questions Are Posted Below

 

1. Who in an organization is NOT in a good position to recognize fraud during the theft act?

  a. Other employees
  b. Managers
  c. Auditors
  d. Coworkers

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect. Coworkers, managers, and other employees are usually in the best position to detect fraud in the theft act stage.
  b. Incorrect. Coworkers, managers, and other employees are usually in the best position to detect fraud in the theft act stage.
  c. Correct.
  d. Incorrect. Coworkers, managers, and other employees are usually in the best position to detect fraud in the theft act stage.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-1 – Communication
Ch05.1 – LO: 1
DIFF-01 – Easy

 

2. In which stage do auditors have a good chance of detecting fraud, if the audit samples include altered documents and miscounts?

  a. Theft act
  b. Concealment
  c. Conversion
  d. Layering

 

ANSWER:   b
FEEDBACK:  
  a. Incorrect. Coworkers, managers, and other employees are usually in the best position to detect fraud in the theft act stage.
  b. Correct.
  c. Incorrect. At the conversion stage, auditors are definitely not in the best position to detect fraud.
  d. Incorrect. This is not a stage.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.1 – LO: 1
DIFF-01 – Easy

 

3. Implementing a system of independent checks is one of the most effective ways to deter fraud. Which one of the following is NOT a way of providing independent checks on employees?

  a. Employee transfers
  b. Audits
  c. Mandatory vacations
  d. Authorization required for purchases of over $2,000 or more

 

ANSWER:   d
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Incorrect.
  d. Correct. This would allow fraud regarding purchases under the required amount.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-6 – Reflective Thinking
Ch05.2 – LO: 2
DIFF-03 – Challenging

 

4. Increased scrap, excessive purchases, physical abnormalities, etc. are all examples of:

  a. accounting anomalies.
  b. external control weaknesses.
  c. analytical anomalies.
  d. unusual behavior.

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect. Accounting anomaly involve problems with source documents, faulty journal entries, and inaccurate ledgers.
  b. Incorrect.
  c. Correct.
  d. Incorrect. Behavior changes involves fear of getting caught, inability to look people in the eyes, unusual belligerence in stating opinions, etc.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-02 – Moderate

 

5. There are three simple procedures that small business owners should do on a timely basis to prevent fraud when they can’t afford sufficient employees to guarantee effective segregation of duties.. Which of the following is NOT one among them?

  a. Pay everything by check so that there is a record.
  b. Always open the bank statement and reconcile it themselves.
  c. Allow one key employee to operate the bank account personally.
  d. Sign every check themselves and not delegate the signing to anyone else.

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Correct.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.3 – LO: 3
DIFF-01 – Easy

 

6. Recording an expense to conceal fraud involves making a fictitious journal entry. A faulty journal entry is an example of which fraud symptom?

  a. Accounting anomaly
  b. Internal control weakness
  c. Unusual behavior
  d. Analytical anomaly

 

ANSWER:   a
FEEDBACK:  
  a. Correct.
  b. Incorrect. Internal control weaknesses include problems with segregation of duties and physical safeguards.
  c. Incorrect. Unusual behaviors include increased nervousness, stress, drinking/drug use, insomnia, defensiveness, etc.
  d. Incorrect. Analytical anomalies include abnormal overages/shortages and strange financial statement relationships.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-01 – Easy

 

7. Fraud examiners must be able to recognize signals that a journal entry may have been manufactured to conceal a fraud. Which of the following is a common journal entry fraud symptom?

  a. Journal entries with documentary support.
  b. Journal entries that balance.
  c. Adjustments to receivables or payables that are made monthly.
  d. Journal entries made near the end of an accounting period

 

ANSWER:   d
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Incorrect.
  d. Correct.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-01 – Easy

 

8. In most organizations, coworkers and others have knowledge or suspicions that fraud is occurring but do not come forward with their information. There are several major reasons for this hesitancy. Which of the following is NOT one among them?

  a. It is usually impossible to know for sure that a fraud is taking place.
  b. The suspicious action is not affecting their work.
  c. They fear reprisal for being a whistle-blower.
  d. They often think that squealing on someone is wrong.

 

ANSWER:   b
FEEDBACK:  
  a. Incorrect.
  b. Correct.
  c. Incorrect.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.7 – LO: 7
DIFF-01 – Easy

 

9. Common accounting anomaly fraud symptoms involve problems with various data and books of accounts. Which of the following is NOT one among them?

  a. Faulty journal entries
  b. Inaccuracies in source documents
  c. Rounding adjustments
  d. Inaccuracies in ledgers

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Correct.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-01 – Easy

 

10. How does a smart embezzler manipulate accounting records to conceal fraud?

  a. By increasing assets.
  b. By manipulating stock accounts.
  c. By manipulating dividends.
  d. By increasing expenses.

 

ANSWER:   d
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Incorrect.
  d. Correct.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-01 – Easy

 

11. Inaccuracies in ledgers represent which type of fraud symptom?

  a. Internal control weaknesses
  b. Analytical anomalies
  c. Accounting anomalies
  d. Financial statement weaknesses

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Correct.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-01 – Easy

 

12. Which of the following is an example of accounting anomaly fraud symptom?

  a. Missing documents
  b. Excess purchases
  c. Too many debit or credit memos
  d. Inadequate accounting system

 

ANSWER:   a
FEEDBACK:  
  a. Correct.
  b. Incorrect. This is an analytical anomaly.
  c. Incorrect. This is an analytical anomaly.
  d. Incorrect. This is an internal control weakness
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-01 – Easy

 

13. Research in psychology indicates that when people commit a crime (especially for the first time), they are initially overwhelmed by ____ and ____.

  a. guilt, fear
  b. anxiety, insomnia
  c. confidence, rationalization
  d. defensiveness, anger

 

ANSWER:   a
FEEDBACK:  
  a. Correct. These feelings result in stress and lead to behavioral change as a coping mechanism.
  b. Incorrect. Anxiety is a generalized mood condition whereas insomnia is difficulty initiating or maintaining sleep, or both – but these are not the classic emotions first felt by fraudster.
  c. Incorrect. A perpetrator may be confident, but it is not a common overwhelming emotion; rationalization is a motivator for fraud (part of the fraud triangle) and not an emotion.
  d. Incorrect. A perpetrator may feel defensive and angry–either at the company or himself /herself, but they are not overwhelming emotions.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-6 – Reflective Thinking
Ch05.6 – LO: 6
DIFF-01 – Easy

 

14. ______ fraud symptoms are procedures or relationships that are unusual or that do not make sense.

  a. Analytical
  b. Accounting
  c. Internal control
  d. Environmental

 

ANSWER:   a
FEEDBACK:  
  a. Correct.
  b. Incorrect.
  c. Incorrect.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.4 – LO: 4
DIFF-01 – Easy

 

15. Which of the following is NOT an analytical fraud symptom?

  a. Consistent cash shortages
  b. Overriding of existing controls
  c. Excess purchases
  d. Unreasonably high expenses

 

ANSWER:   b
FEEDBACK:  
  a. Incorrect.
  b. Correct. This is an internal control fraud symptom.
  c. Incorrect.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.2, .4 – LO: 2, 4
DIFF-01 – Easy

 

16. Which of the following is an analytical fraud symptom?

  a. Increase in past due accounts receivable
  b. Significant increase or decrease in account balances
  c. Lack of independent checks
  d. Excessive voids or credits

 

ANSWER:   b
FEEDBACK:  
  a. Incorrect. This is an accounting anomaly.
  b. Correct.
  c. Incorrect. This is an internal control weakness.
  d. Incorrect. This is an accounting anomaly.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-1 – Communication
Ch05.2, .4 – LO: 2, 4
DIFF-02 – Moderate

 

17. Which of the following is a control problem related to segregation of duties?

  a. Julie writes expense checks and Mark collects cash from customers.
  b. Bob order office supplies and deposits the company’s checks.
  c. Steve records receivables and writes off bad debts.
  d. Rebecca records journal entries and orders lunch.

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Correct.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-3 – Analytic
Ch05.3 – LO: 3
DIFF-02 – Moderate

 

18. An auditor noticed that company B had an exorbitant increase in sales and drastic decreases in its inventory and accounts receivables. The above statement symbolizes which fraud symptom?

  a. Accounting anomaly
  b. Internal control weakness
  c. Analytical anomaly
  d. Unusual behavior

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Correct.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-1 – Communication
Ch05.2, .4 – LO: 2, 4
DIFF-01 – Easy

 

19. Transactions happening at odd times or places; being performed by people who would not normally participate; or including odd procedures are typically associated with which type of fraud symptom?

  a. Accounting anomaly
  b. Internal control weakness
  c. Analytical anomaly
  d. Unusual behavior

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect. Accounting anomalies include bad source documents, faulty journal entries, and inaccuracies in ledgers.
  b. Incorrect. Internal control weakness deals with the company’s control procedure.
  c. Correct.
  d. Incorrect. Unusual behavior refers to changes in one’s personal behavior.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.4 – LO: 4
DIFF-01 – Easy

 

20. Document symptoms to some extent can signal out that embezzlement is taking place. Which among the following usually does NOT point to some problem with the source documents?

  a. Photocopied documents
  b. Different names or addresses of payees or customers
  c. Excessive voids or credits
  d. Increased past-due accounts

 

ANSWER:   b
FEEDBACK:  
  a. Incorrect.
  b. Correct.
  c. Incorrect.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.4 – LO: 4
DIFF-01 – Easy

 

21. A major difference between financial statement auditors and fraud examiners is that most financial statement auditors:

  a. match documents to verify whether support exists for recorded information.
  b. determine whether the documents are originals.
  c. determine whether the expenditures make sense.
  d. check whether all aspects of the documentation are in order.

 

ANSWER:   a
FEEDBACK:  
  a. Correct.
  b. Incorrect.
  c. Incorrect.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.2, .4 – LO: 2, 4
DIFF-01 – Easy

 

22. Which of the following is a highly suspicious financial statement relationship?

  a. Increased revenues with decreased inventory.
  b. Decreased production with decreased scrap.
  c. Increased revenues with increased receivables
  d. Decreased cost per unit with increased level of output

 

ANSWER:   a
FEEDBACK:  
  a. Correct.
  b. Incorrect.
  c. Incorrect.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-3 – Analytic
Ch05.2 – LO: 2
DIFF-02 – Moderate

 

23. Which of the following is a highly suspicious financial statement relationship?

  a. Increased revenues with increased cash flows
  b. Increased volume with decreased cost per unit
  c. Increased inventory with decreased payables
  d. Increased inventory with increased warehousing costs

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Correct.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-01 – Easy

 

24. Which of the following usually motivates embezzlers to indulge in a fraudulent activity?

  a. Pursuit of immediate gratification.
  b. Safeguard their future.
  c. Cover expenses required to live.
  d. Protection against uncertainties.

 

ANSWER:   a
FEEDBACK:  
  a. Correct. Embezzlers are usually very short-term oriented.
  b. Incorrect. Embezzlers generally spend the money and do not save.
  c. Incorrect. While some embezzlers may need money to cover expenses required to live, this is far from the norm.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.5 – LO: 5
DIFF-02 – Moderate

 

25. Which of the following fraud symptoms is often the easiest to detect?

  a. Analytical anomalies
  b. Internal control weaknesses
  c. Accounting anomalies
  d. Lifestyle changes

 

ANSWER:   d
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Incorrect.
  d. Correct.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.1 – LO: 1
DIFF-01 – Easy

 

26. Which of the following scenarios is least conducive to fraud?

  a. Outstanding bills at home
  b. Mandatory vacation time
  c. Economic downturns
  d. Moral decay in upper management

 

ANSWER:   b
FEEDBACK:  
  a. Incorrect. This will increase the likelihood of fraud.
  b. Correct. Frauds are often discovered when a fraudster is obliged to take a vacation.
  c. Incorrect. This will increase the likelihood of fraud.
  d. Incorrect. This will increase the likelihood of fraud.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.1, .3 – LO: 1, 3
DIFF-01 – Easy

 

27. An employee decides to steal cash from his/her employer. What would be the best way to conceal such a fraud?

  a. Record the stolen cash as an expense.
  b. Writing down accounts payable for a supplier.
  c. Increasing accounts receivable from a customer.
  d. Writing down as dividend paid to shareholders.

 

ANSWER:   a
FEEDBACK:  
  a. Correct. Fraudsters usually try to conceal their fraud in the income statement, as these accounts “reset” each year.
  b. Incorrect. This involves accounts that are less conducive to concealment.
  c. Incorrect. This involves accounts that are less conducive to concealment.
  d. Incorrect. This involves accounts that are less conducive to concealment.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-01 – Easy

 

28. Which of the following is NOT a “strange” financial statement relationship?

  a. Increased revenues with decreased inventory
  b. Increased revenues with decreased receivables
  c. Decreased inventory with decreased payables
  d. Decreased volume with decreased cost per unit

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect.
  b. Incorrect
  c. Correct. It is typical to see decreased inventory with decreased payables.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-01 – Easy

 

29. _____ are relationships in financial or nonfinancial data that do not make sense, such as an unreasonable change in a volume, mix, or price.

  a. Analytical anomalies
  b. Accounting anomalies
  c. Auditing anomalies
  d. Control weaknesses

 

ANSWER:   a
FEEDBACK:  
  a. Correct.
  b. Incorrect.
  c. Incorrect.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.4 – LO: 4
DIFF-01 – Easy

 

30. After committing fraud, an individual often exhibits unusual and recognizable behavior patterns to cope with the stress. Perpetrators experience these behavioral signals in a particular sequence. Identify it.

  a. Guilt – Stress – Fear – Behavior changes
  b. Fear – Guilt – Stress – Behavior changes
  c. Fear – Guilt – Behavior changes – Stress
  d. Guilt – Fear – Stress – Behavior changes

 

ANSWER:   d
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Incorrect.
  d. Correct.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.5, .6 – LO: 5, 6
DIFF-01 – Easy

 

31. What does the following journal entry indicate?

Legal Expense………………2,900

Cash………………………….2,900

  a. $2,900 cash is due to an attorney.
  b. A sum of $2,900 was received from attorney in advance.
  c. $2,900 cash is due from an attorney.
  d. An attorney was paid $2,900 in cash.

 

ANSWER:   d
FEEDBACK:  
  a. Incorrect
  b. Incorrect.
  c. Incorrect.
  d. Correct.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-01 – Easy

 

32. All transactions related to specific accounts, such as cash or inventory, are listed and totaled in a:

  a. Journal
  b. Ledger
  c. Trial balance
  d. Balance sheet

 

ANSWER:   b
FEEDBACK:  
  a. Incorrect.
  b. Correct.
  c. Incorrect.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-01 – Easy

 

33. Which of the following is NOT a fraud symptom related to internal control weaknesses?

  a. Lack of segregation of duties
  b. Lack of physical safeguards
  c. Inadequate accounting system
  d. Lack of proper authorization
  e. Excessive turnover of executives

 

ANSWER:   e
FEEDBACK:  
  a. Incorrect
  b. Incorrect.
  c. Incorrect.
  d. Incorrect.
  e. Correct.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.2 – LO: 2
DIFF-01 – Easy

 

34. Which term refers to people who commit a fraud or other crime and do not feel guilt or stress?

  a. Altruists
  b. Utilitarians
  c. Psychopaths
  d. Agnostics

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Correct.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.6 – LO: 6
DIFF-01 – Easy

 

35. _______ involves the actual taking of cash, inventory, information, or other assets whereas _______ involves selling stolen assets or transferring them into cash and then spending the cash.

  a. Conversion, coercion
  b. Theft, conversion
  c. Coercion, theft
  d. Theft, coercion

 

ANSWER:   b
FEEDBACK:  
  a. Incorrect.
  b. Correct.
  c. Incorrect.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.1, .6 – LO: 1, 6
DIFF-01 – Easy

 

36. Which category of individuals are least likely to detect fraud at the conversion stage?

  a. co-workers
  b. friends
  c. auditors
  d. managers

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Correct.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.7 – LO: 7
DIFF-01 – Easy

 

37. Lifestyle changes of fraud perpetrators are related to which of the following fraud elements?

  a. Theft act
  b. Concealment
  c. Conversion
  d. Confession

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Correct.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.1, .5, .6 – LO: 1, 5, 6
DIFF-01 – Easy

 

38. Which of the following appears to be common to most embezzlers who are caught?

  a. Long-term focus
  b. Investments made in low-risk instruments
  c. Saving what they steal
  d. Spending on lifestyle improvements

 

ANSWER:   d
FEEDBACK:  
  a. Incorrect.
  b. Incorrect.
  c. Incorrect.
  d. Correct.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.5 – LO: 5
DIFF-01 – Easy

 

39. Which of the following actions would most likely create an opportunity for fraud?​

  a. ​requiring all documents over seven years old be shredded
  b. ​requiring that the department manager authorize purchase orders only for purchase amounts for more than $100
  c. ​requiring one password code for each entire department to enter the storeroom
  d. ​using a manual accounting system

 

ANSWER:   c
FEEDBACK:  
  a. Incorrect. This action would not create an opportunity for fraud.
  b. Incorrect. The opportunity to make fake purchases would be present, but only for very small amounts.
  c. Correct. This would allow anyone in the department to enter the storeroom to steal assets without being identified.
  d. Incorrect. It isn’t whether the system is manual or computerized, but the quality of the system that may or may not deter fraud.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-1 – Communication
Ch05.3 – LO: 3
DIFF-02 – Moderate

 

40. Allowing the clerk who checked out customer A handle a return by that same individual ​without presenting the receipt would NOT be an example of which of the following internal controls?

  a. ​lack of segregation of duties
  b. ​lack of requiring proper documents and records
  c. ​lack of independent checks
  d. ​lack of an adequate accounting system

 

ANSWER:   d
FEEDBACK:  
  a. Incorrect, someone else should handle the return.
  b. Incorrect, the receipt should be presented
  c. Incorrect, independent checks to verify should be made.
  d. Correct, the quality of the accounting system is not the issue in this example.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.3 – LO: 3
DIFF-02 – Moderate

 

41. ​Which of the following is a true statement?

  a. ​Lifestyle changes are often the easiest fraud symptoms to detect.
  b. ​Lifestyle changes are helpful in detecting fraud on behalf of a corporation.
  c. ​Fraud is indicated when an employee sells a large number of shares of stock he/she owns.
  d. ​Evidence of an employee paying off large debt can be verified, but it is costly to do so.

 

ANSWER:   a
FEEDBACK:  
  a. Correct.
  b. Incorrect, lifestyle changes do not usually occur when the fraud is on behalf of the corporation.
  c. Incorrect, the person who commits fraud usually spends the money and does not invest it.
  d. Incorrect, this action is not costly to verify.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-3 – Understanding
Business Program-1 – Communication
Ch05.3 – LO: 3
DIFF-02 – Moderate

 

42. ​Which of the following is a true statement?

  a. ​A fraud perpetrator who normally smokes often quits after committing a fraud.
  b. ​The perpetrator may start entertaining coworkers more often and more lavishly.
  c. ​The perpetrator may start looking coworkers directly in the eye when talking to them.
  d. ​The perpetrator who committed the fraud act to pay off gambling debts may suddenly stop gambling.

 

ANSWER:   b
FEEDBACK:  
  a. Incorrect, he or she may smoke more heavily to relieve stress.
  b. Correct.
  c. Incorrect, he or she may avoid eye contact.
  d. Incorrect, he or she may gamble even more than previously.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.6 – LO: 6
DIFF-01 – Easy

 

43. ​Which of the following is usually NOT a reason people hesitate to anonymously report their suspicions about an act of fraud?

  a. ​The perpetrator has bullied them in the past.
  b. ​The perpetrator is a friend who has helped them in the past.
  c. ​The perpetrator is a relative.
  d. ​The perpetrator is a neighbor.

 

ANSWER:   a
FEEDBACK:  
  a. Correct.
  b. Incorrect.
  c. Incorrect.
  d. Incorrect.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.7 – LO: 7
DIFF-01 – Easy

 

44. ​Which of the following acts by management could discourage someone from reporting an observed act of fraud?

  a. ​providing clear instructions of who to contact
  b. ​providing assurance of anonymity
  c. ​providing clear instructions on how to convey the information
  d. ​providing a clear list of possible consequences

 

ANSWER:   d
FEEDBACK:  
  a. Incorrect, this encourages reporting fraud.
  b. Incorrect, this encourages reporting fraud.
  c. Incorrect, this encourages reporting fraud.
  d. Correct, this could discourage reporting fraud.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.7 – LO: 7
DIFF-01 – Easy

 

45. ​Which of the following possible actions may discourage an employee to report suspected fraudulent activities?

  a. ​Management promises no prosecution of the individual if guilty.
  b. ​Corporate security’s number is provided.
  c. ​The number of the internal auditor is provided.
  d. ​Corporate management stresses that any information provided will be kept confidential.

 

ANSWER:   a
FEEDBACK:  
  a. Correct, if there will be no prosecution, the employee may feel it is useless to report the suspected fraud.
  b. Incorrect, this may encourage reporting a suspicious activity.
  c. Incorrect, this may encourage reporting a suspicious activity.
  d. Incorrect, this may encourage reporting a suspicious activity.
POINTS:   1
ACCREDITING STANDARDS:   Blooms Taxonomy-5 – Remembering
Business Program-1 – Communication
Ch05.7 – LO: 7
DIFF-01 – Easy

 

 

Additional information

Add Review

Your email address will not be published. Required fields are marked *