Test Bank For Forensic Accounting and Fraud Examination, 2nd Edition

Preview Extract
Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE โˆ™ (989) 205-4182 โˆ™ [email protected] CHAPTER 2 Module 1 1. A number of theories about why the vast majority of people do not commit crime have been set forth over time. Which of the following is NOT one of the reasons cited in the text? A. B. C. D. 2. The term occupational fraud and abuse is defined as: A. B. C. D. 3. The use of oneโ€™s occupation for status enrichment through misuse or misapplication of the employing organizationโ€™s resources or assets. The use of oneโ€™s occupation for personal enrichment through the unintentional misuse or misapplication of the employing organizationโ€™s resources or assets. The use of oneโ€™s occupation for personal enrichment through the deliberate misuse or misapplication of a different organizationโ€™s resources or assets. The use of oneโ€™s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organizationโ€™s resources or assets. Four common elements to occupational fraud and abuse schemes were first identified by ACFE in its 1996 Report to the Nation on Occupational Fraud and Abuse. Which of the following does not contain all four elements? A. B. C. D. 4. Social conditioning/parental upbringing Fear of punishment To act in a just and moral manner according to societyโ€™s standards Desire for rewards The activity is clandestine, violates the employeeโ€™s fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, may or may not result in costs to the employing organizationโ€™s assets, revenues, or reserves. The activity is clandestine, violates the employeeโ€™s fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, and is a violation of state and/or federal law(s). The activity is clandestine, violates the employeeโ€™s fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, and costs the employing organization assets, revenues, or reserves. The activity is clandestine, violates the employeeโ€™s non-fiduciary duties to the organization, is committed for the purpose of direct or indirect financial benefit to the employee, and costs the employing organization assets, revenues, or reserves. The term white-collar crime was coined by _____________ in 1939, when he provided the following definition: crime in the upper, white-collar class, which is composed of respectable or at least respected, business and professional men. A. B. Steve Albrecht Edwin H. Sutherland 1 of 7 Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE โˆ™ (989) 205-4182 โˆ™ [email protected] C. D. 5. Organizational crime occurs when companies, corporations, not-for-profits, government bodies, and otherwise legitimate and law-abiding organizations are: A. B. C. D. 6. The RICO Act was adopted Forensic litigation advisory services are offered by forensic accountants The Sarbanes-Oxley Act was adopted SAS99 was adopted Money laundering, mail and wire fraud, criminal conspiracy and racketeering are examples of crimes associated with: A. B. C. D. 9. Ordinary corporate behavior Occupational fraud and abuse Organizational crime More of a problem nationally than internationally Civil litigation issues such as damage claims, lost wages, disability, wrongful death, assets and business valuations, costs and lost profits associated with construction delays or business interruptions, insurance claims, intellectual property infringement, environmental issues, tax claims are examples of the kinds of issues for which: A. B. C. D. 8. involved in unethical conduct involved in organized crime involved in a civil offense involved in a criminal offense Unfair pricing, unfair business practices, violation of the FCPA and tax evasion are examples of: A. B. C. D. 7. Joseph T. Wells Donald R. Cressey The fraud triangle A private or civil wrong or injury, other than breach of contract, for which the law will provide a remedy in the form of an action for damages Organized crime Occupational fraud and abuse Blackโ€™s Law Dictionary defines a tort as: E. F. G. H. A private or civil wrong or injury, other than breach of contract, for which the law will provide a remedy in the form of an action for damages An unlawful conduct of business affairs with funds derived from illegal acts When two or more people intend to commit an illegal act and take some steps toward its implementation Non-compliance with agency, regulatory, and court requirements 2 of 7 Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE โˆ™ (989) 205-4182 โˆ™ [email protected] 10. The legal standard for the tort of negligence does NOT include the following element: A. B. C. D. 11. Damages Duty Cause in Fact Intent A critical aspect of civil litigation for the forensic accountant and fraud examiner is the understanding that: E. F. G. H. Both sides (plaintiff and defendant) are expected to tell their story Both sides (plaintiff and defendant) are expected to present only facts in court Both sides (plaintiff and defendant) are expected to countersue each other as a strategy Both sides (plaintiff and defendant) are expected to negotiate a settlement Module 2 12. In the fraud perpetrator profile presented in the text, which set of characteristics summarizes the typical fraud perpetrator? A. B. C. D. 13. One of the interesting aspects of the characteristics of fraud perpetrators is that they do not typically have ______________. A. B. C. D. 14. Male, middle-aged to retired, with the company for five or more years, never charged or convicted of a criminal offense, well educated, accountant, upper management, or executive, generally acts in collusion with others Male, middle-aged to retired, with the company for five or more years, previously charged or convicted of a criminal offense, well educated, accountant, upper management, or executive, acts in alone Male, middle-aged to retired, with the company for five or more years, never charged or convicted of a criminal offense, well educated, line employee or lower management, or executive, acts in collusion with others Male, middle-aged to retired, with the company for five or more years, never charged or convicted of a criminal offense, well education, accountant, upper management, or executive, acts alone Respect within their community Much knowledge of accounting standards A criminal background A college degree Edwin H. Sutherland (1883-1850), a criminologist, coined the term white-collar crime in 1939 and later developed the theory of _____________________ whose basic tenet is that crime is learned. A. Constructivist association 3 of 7 Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE โˆ™ (989) 205-4182 โˆ™ [email protected] B. C. D. 15. Donald R. Cressey (1919-1987) used his doctoral dissertation to study embezzlers, whom he called โ€œtrust violators.โ€ Upon completion of his research, he developed what still remains as the classical model for the occupational offender. In 1991, Dr. Steve Albrecht organized Cresseyโ€™s three conditions into a tool that has become known as the โ€œfraud triangle.โ€ Which answer below constitutes the three legs of the fraud triangle? A. B. C. D. 16. General information Accounting know-how Observed gaps in internal controls Knowledge of financial fraud schemes Fraud deterrence begins _______________. A. B. C. D. 19. Financial greed Problems resulting from personal failure Depression or other mental health issues Amoral value system In Cresseyโ€™s view, there were two components of perceived opportunity necessary to commit a trust violation: ____________________ and technical skill. E. F. G. H. 18. Perceived opportunity, perceived motive, and intellectualization Perceived pressure, perceived isolation, and rationalization Perceived motive, perceived opportunity, and minimization Perceived pressure, perceived opportunity, and rationalization Cressey identified six categories of non-shareable financial pressures that prompted embezzlers to act. These included violation of ascribed obligations, business reversals, physical isolation, status gaining, employer-employee relationships, and ______________. A. B. C. D. 17. Fraud triangle association Attributional association Differential association In the existence of sound internal controls In the organizational mission and values In the employeeโ€™s mind In the beliefs of the culture at large When considering antifraud measures within an organization, the axiom that โ€œfraud deterrence begins in the employeeโ€™s mindโ€ most closely means that there has to be a _________________. E. F. G. Perception of detection Perception of punishment (if caught) Perception of fairness within all levels of the organization 4 of 7 Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE โˆ™ (989) 205-4182 โˆ™ [email protected] H. 20. Findings in the ACFEโ€™s 2016 Report to the Nations suggest that organizations that lacked _______________ were more susceptible to asset misappropriation schemes. A. B. C. D. 21. After Before While Seldom One of the most fundamental observations of the Cressey study was the _____________, i.e., that the conditions under which a trust violation occurs necessitate all three elements (of what was later named the fraud triangle). E. F. G. H. 23. Employee perception of detection A proper tone at the top Internal controls A reporting mechanism Cressey observed that rationalization as it applies to occupational fraud occurs _________________ the crime. A. B. C. D. 22. Perception of shared values within the organization Conjuncture of events Timing of events Circumstances of events Sequence of events Findings in the ACFEโ€™s 2016 Report to the Nations indicate that at least one warning sign had been displayed by the perpetrator before the fraud was detected in more than 91% of cases. In 57% of cases, two or more such red flags were seen. According to the study, the six most commonly observed behavioral red flags were: living beyond means, financial difficulties, unusually close association with a vendor or customer, a โ€œwheeler-dealerโ€ attitude, recent divorce or family problems, and ______________. I. J. K. L. Control issues or unwillingness to share duties Addiction problems Irritability, suspiciousness, or defensiveness Excessive pressure from within the organization Module 3 24. While Dr. Steve Albrechtโ€™s research findings on fraud perpetrator characteristics were very similar to the non-shareable problems and rationalizations identified by Cressey, Albrecht introduced the ____________________ into the actions of the fraudsters. A. The role of compensation 5 of 7 Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE โˆ™ (989) 205-4182 โˆ™ [email protected] B. C. D. 25. Dr. Steve Albrecht substituted _______________ for rationalization in the development of the โ€œFraud Scale.โ€ A. B. C. D. 26. Age Myers-Briggs Personality Types Arrogance (or lack of conscience) Garden variety greed Crowe expanded the fraud triangle into a pentagon by adding ______________ and ___________. A. B. C. D. 29. Internal control environment Myers-Briggs Personality Types The role of arrogance Individual capability In 2010, Jonathan Marks argued for the role of _____________ in fraud. A. B. C. D. 28. Emotional distress Greed Personal integrity Sociopathic tendencies In a 2004 CPA Journal article, Wolfe and Hermanson argue that the fraud triangle could be enhanced to improve both fraud prevention and detection by considering a fourth element, ________________. A. B. C. D. 27. The role of the organization The role of social isolation The role of (an unfair) performance evaluation system Compensation equity and cultural norms Arrogance and competence Myers-Briggs Personality Types and educational attainment Internal control environment and organizational pressure Significant research suggests that increasing _______________ may be the best way to deter employee theft. A. B. C. D. The threat of punishment by the employer The presence of internal security The perception of detection The frequency of fraud prevention education Module 4 6 of 7 Test bank project for Forensic Accounting and Fraud Examination (2nd Ed.) by Mary-Jo Kranacher and Dick Riley Test bank written by Brian L. Carpenter, PhD, CFE โˆ™ (989) 205-4182 โˆ™ [email protected] 30. In addition to the fraud triangle, typical motivations of fraud perpetrators may be identified with the acronym M.I.C.E. This stands for money, ideology, _________, and ego/entitlement. E. F. G. H. 31. Coercion Conversion Collusion Concealment According to the AICPA, the โ€œAchilles Heelโ€ of an organizationโ€™s antifraud efforts is _______________ and ___________________. A. B. C. D. An amoral corporate culture; an arrogant CEO Missing internal controls; lack of management review Collusion; management override A weak board of directors; an arrogant CEO Module 5 32. In contrast to the fraud triangle which US courts have deemed to be more of a theoretical concept rather than a set of measurable standards or a specific, practical methodology for arguing that fraud occurred, the triangle of fraud action can be used in developing prosecutorial evidence. In particular, the element of ________________ provides a compelling argument that the act was intentional. A. B. C. D. 33. The Act Conversion Opportunity Concealment The triangle of fraud action is sometimes referred to as _______________. A. B. C. D. The fraud triangle The elements of fraud The fraud diamond Croweโ€™s Fraud Pentagonโ„ข 7 of 7

Document Preview (7 of 121 Pages)

User generated content is uploaded by users for the purposes of learning and should be used following SchloarOn's honor code & terms of service.
You are viewing preview pages of the document. Purchase to get full access instantly.

Shop by Category See All


Shopping Cart (0)

Your bag is empty

Don't miss out on great deals! Start shopping or Sign in to view products added.

Shop What's New Sign in