An electronic access control record reveals that at the time or a computer theft, an employee was m the vicinity. The record would be considered
An electronic access control record reveals that at the time or a computer theft, an employee was m the vicinity. The record would be consideredA . entirely non- incriminatingB . direct evidenceC . circumstantial evidence.D . prima facie evidenceView AnswerAnswer: C
Misappropriation of trust funds or money held in any fiduciary capacity is referred to as:
Misappropriation of trust funds or money held in any fiduciary capacity is referred to as:A . concealmentB . defalcation.C . conversionD . switchingView AnswerAnswer: B
An interviewer/interrogator is much more likely to gain the cooperation of an individual by exhibiting a/an:
An interviewer/interrogator is much more likely to gain the cooperation of an individual by exhibiting a/an:A . angry and aggressive mannerB . cairn manner.C . Easygoing and lackadaisical manner.D . businesslike. impersonal manner.View AnswerAnswer: B
One of the best positions for the undercover operative in a business is in which department?
One of the best positions for the undercover operative in a business is in which department?A . AccountingB . TransportationC . Mail roomD . AdministrationView AnswerAnswer: C
The most significant potential problem in an undercover investigation is the possibility that:
The most significant potential problem in an undercover investigation is the possibility that:A . no criminal charges will resultB . there will be no financial recovery.C . the criminal activity will continue after the Investigation is completedD . the investigation will be exposed or compromisedView AnswerAnswer: D
Which of the following is the term for receiving the money or property of another and fraudulently withholding or applying it for one's own use?
Which of the following is the term for receiving the money or property of another and fraudulently withholding or applying it for one's own use?A . ConcealmentB . MisrepresentationC . ConversionD . RepresentationView AnswerAnswer: C
Allowing an accounts payable clerk access to the vendor master file so the clerk can add or delete names is a violation of which of the following fraud prevention practices?
Allowing an accounts payable clerk access to the vendor master file so the clerk can add or delete names is a violation of which of the following fraud prevention practices?A . Offline entry controls and limitsB . Separation of dutiesC . Signature authoritiesD . Rotation of dutiesView AnswerAnswer: B
A special report documents:
A special report documents:A . the overall investigation and its primary conclusionB . the need for an investigation and the costs associated with itC . elements of the crimes committed and the theories involvedD . an action other than normal in the course of the investigationView AnswerAnswer: D
Which of the following points does NOT support budget Justification for an investigative unit?
Which of the following points does NOT support budget Justification for an investigative unit?A . Accurate and detailed tracking of Investigative costB . Effective implementation of cost management measuresC . Demonstration of restitution and recovery benefitsD . Aligning investigative objectives to business strategic objectivesView AnswerAnswer: D
This is called Risk Identification and will Identify?
John has accepted a management role in a new organization and has been requested to conduct a Risk Assessment. As part of that process he will need to determine what the risks are that can affect the organization. This is called Risk Identification and will Identify?A . The acceptance or...