Question details

MULTIPLE CHOICE 100%
$ 40.00

MULTIPLE CHOICE

 

     1.   Which of the following types of information do credit reporting agencies not maintain?

a.

Information of current and former employers

b.

Account information such as payment schedules, items purchased, and buying habits.

c.

Marketing information such as customer breakdowns by age, sex, and income levels

d.

Consumer information such as addresses and family members

e.

Credit reporting agencies maintain all of the above information

 

 

ANS:

 

     2.               Using the data below the income from unknown sources for year 2 and 3 respectively are:

 

Year 1

Year 2

Year 3

Home

220000

220000

220000

Car

25000

25000

50000

Investments

40000

50000

65000

Bank Account

3000

7000

10000

Total Assets

288000

302000

345000

 

 

 

 

Home Loan

200000

150000

100000

Auto Loan

20000

0

0

Student Loan

60000

20000

0

Total Liabilities

280000

170000

100000

 

 

 

 

Salary

 

95000

105000

Investments

 

4000

5000

Inheritance

 

6000

0

Total Income

 

105000

110000

 

 

 

 

Homeloan

 

13200

13200

Auto loan

 

9600

9600

Other living

 

20000

22000

Wedding

 

4000

0

Total Expenses

 

46800

44800

   

a.

-27,800; -41,800

b.

275,800; 267,800

c.

81,800; 311,800

d.

65,800; 47,800

 

 

ANS:

 

 

 

     3.   Social Security contains information about an individual.  Which item below is not included in an individual's social security number?

a.

Area the person was living when the number was issued

b.

A unique serial number for a person

c.

Race

d.

Group number

 

 

ANS:

A: A is included in a social security number.

B: B is included in a social security number.

  

D: D is included in a social security number.

 

     4.   Searching through someone's garbage is considered a legal activity when:

a.

the trash is more than 14 days old

b.

the trash is in the person's possession

c.

the trash has left the person's home or sidewalk

d.

Stealing a person's trash is never considered a legal activity.

 

 

ANS:

 

     5.   Income from known sources subtracted from total income gives a reasonable estimate of:

a.

Unknown funds

b.

Liabilities

c.

Living Expenses

d.

Net Worth

 

 

ANS:

 

 

     6.   During an interview with Heidi Royce, she confessed to accepting $64,500 in kickbacks from a key supplier over the last 6 months.  Heidi’s income for the year was $48,000 and her living expenses totaled $94,500 due mainly to medical costs of $40,000.  She has a current net worth of $20,000.  What was her (increase/decrease) in net worth?

a.

$6,500

b.

$2,000

c.

$71,000

d.

$9,500

 

 

ANS:

 

 

     7.   What is the purpose of the net worth calculation in fraud?

a.

It is used to determine the extent of stolen funds

b.

It is used to determine how much money can be stolen without causing a company to go bankrupt.

c.

It is used to help locate fraudulent asset accounts

d.

All of the above

 

 

ANS:

 

     8.   Which of the following is not one of the credit reporting agencies used to check identity theft?

a.

Experian

b.

Equifax

c.

Transunion

d.

Proquest

 

 

ANS:

 

     9.   ________ is both a federal and state source of information.

a.

Secretary of state

b.

Bureau of prisons

c.

Department of defense

d.

Permit departments

 

 

ANS:

 

 

   10.   Which of the following is not a needed component for computing a person's Net Worth?

a.

Parent's financial status

b.

Prior year's net worth

c.

Funds from known sources

d.

Net worth increase

 

 

ANS:

 

   11.   Which of the following is not a type of information that can be obtained from the County Land Office and Tax Assessor's Office?

a.

Real Estate that has been purchased

b.

Automobile registration

c.

Property's current assessed value

d.

Liens removed

 

 

ANS:

B: This would be available from the DMV

 

   12.   All of the following federal agencies maintain information that can help fraud investigations except which?

a.

ATF

b.

Social Security Administration

c.

Department of Justice

d.

Postal Service

 

 

ANS:

 

 

   13.   Which of the following agencies is generally the least productive in a records search?

a.

Searching Local agencies

b.

Searching County agencies

c.

Searching State agencies

d.

Searching Federal agencies

 

 

ANS:

 

 

   14.   Which of the following is not a federal source of information?

a.

Secretary of State

b.

CIA

c.

Bureau of Prisons

d.

FBI

 

 

ANS:

 

   15.   Evidence gathered from searching through someone's trash:

a.

Can help identify concealment attempts

b.

Can help to determine how a perpetrator is spending stolen money

c.

Can help understand how a perpetrator is stealing money

d.

All of the above are true

 

 

ANS:

A: Because b and c are also correct

B: Because a and c are also correct

C: Because a and b are also correct

 

   16.   Net worth calculations do all of the following except:

a.

Determine Net worth

b.

Determine funds from unknown sources

c.

Determine where fraudulent monies are hidden

d.

Determine a person's Net Worth Increase

 

 

ANS:

 

   17.   Which of the following statements is false regarding the net worth method?

a.

The net worth method generally understates amounts stolen.

b.

Much of the information necessary for determining an individual's assets, liabilities, living expenses, and income is available through public records.

c.

Courts are generally suspicious of dollar amounts determined by the net worth method because courts realize that the net worth method can only provide approximations of the amount stolen.

d.

The net worth method is useful for obtaining confessions from suspects during interviews or interrogations.

 

 

ANS:

 

   18.   Which of the following is not a good reason for involving postal inspectors in a fraud investigation?

a.

Postal inspectors share jurisdiction with other federal, state, and local agencies.

b.

Postal inspectors work for the prosecution of offenders who violate postal laws.

c.

Postal inspectors have access to an individual’s past and current addresses.

d.

Postal inspectors work to protect citizens from loss through theft that uses the mail system.

 

 

ANS:

 

   19.   Mandy calls a local newspaper and pretends to be a neighbor who is away for the winter.  She obtains account history and orders newspaper service for six months.  Has Mandy committed fraud?

a.

No.  The newspaper has not yet been delivered nor paid.

b.

Yes.  She is in violation of the Gramm-Leach Bliley Act of 1999.

c.

No.  Her neighbor can obtain all of the newspapers when they return next spring.

d.

Yes.  She has engaged in mail fraud, Title 18, U.S. Code Section 1344.

 

 

ANS:

 

   20.   You are investigating a fraud in which you suspect that one of your suppliers from another state has been giving bribes and kickbacks to your purchasing agent in exchange for a lucrative, exclusive contract.  Which of the following agencies/individuals would be the most helpful in investigating this fraud?

a.

The FBI because they have national jurisdiction and can investigate and prosecute violators from a different state.

b.

The state attorney general for the supplier’s state because they are responsible for enforcing all state civil and criminal laws.

c.

Postal inspectors because the bribes and kickbacks were most likely made through the mail system; therefore, federal mail statutes apply.

d.

The IRS because your purchasing agent is not too bright and probably reported the bribes and kickbacks as income on his tax returns.

 

 

ANS:

 

 

   21.   Which of the following is false?

a.

Rarely do perpetrators save what they steal.

b.

Conversion searches are performed to find out more about a suspect's life

c.

Conversion searches are performed to gather evidence to be used in interrogations.

d.

Public records searches are preferred to uncover concealment attempts.

 

 

ANS:

.

 

   22.   To find marital and voting records, one would need to look at:

a.

The state attorney general's office

b.

The social security administration office

c.

The county clerk's office

d.

The local courts office

 

 

ANS:

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             

   23.   Funds from unknown sources equals:

a.

Assets - Liabilities.

b.

Net Worth Increase + Living Expenses.

c.

Income - Funds from Known Sources.

d.

Net Worth - Prior Year's Net Worth.

 

 

ANS:

 

 

   24.   The Gramm-Leach Bliley Act stipulates the following:

a.

Trash that has not left the possession of a person may not be legally searched.

b.

Credit information about an individual that is furnished to a third party must also be made available to that individual.

c.

Banks may share customers' financial information with others.

d.

None of the above.

 

 

ANS:

 

   25.   Where can a fraud investigator search for public information without a search warrant?

a.

County and local records

b.

Federal and State records

c.

Financial institution records

d.

Internal Revenue Service records

 

 

ANS:

 

   26.   The Gramm-Leach Bliley Act prohibits

a.

Telemarketers selling information to corporations

b.

The use of false pretenses to access the personal information of others

c.

Public access to FBI criminal database

d.

None of the Above

 

 

ANS:

 

 

   27.   What will perpetrators of fraud almost universally do with their stolen funds?

a.

Invest the stolen funds

b.

Save the funds for emergency retirement, etc.

c.

Spend them

d.

Return them

 

 

ANS:

 

 

   28.   To effectively conduct conversion investigations, a fraud examiner must thoroughly understand all of the following except:

a.

How to search federal, state, local and other records for information.

b.

The types of information available from federal, state, and local searches.

c.

The net worth method of spending and analyzing spending information.

d.

The different types of audits that can be conducted

 

 

ANS:

 

   29.   In calculating the net worth method, you should do the following:

a.

find net worth, find the net worth increase, find Income, find the funds from unknown sources

b.

find net worth, find the net worth decrease, find income, find the funds from known sources

c.

find net worth, find the net worth decrease, find Income, find the funds from unknown sources

d.

find net worth, find the net worth increase, find Income, find the funds from known sources

 

 

ANS:

 

   30.   Which government agency would provide information that is most useful detecting "dummy doctors"?

a.

Department of business regulation

b.

Secretary of state

c.

Postal service

d.

County clerk

 

 

ANS:

 

 

   31.   Public information can be gathered from which of the following sources?

a.

State government

b.

County and local government

c.

Federal government

d.

All of the above

 

 

ANS:

 

   32.   After 1999, how could you obtain information from a financial institution?

a.

Court Subpoena

b.

Search warrants

c.

False pretenses

d.

Both a and b

 

 

ANS:

   33.   True or false: Federal records are usually more useful than state and local records when investigating fraud.

a.

True

b.

False

 

 

ANS:

 

 

   34.   Lexis-Nexis and Dun & Bradstreet are examples of:

a.

Law firms that specialize in fraud prosecution

b.

Publicly available databases

c.

Companies that have committed fraud in the past

d.

Names of legislative bills regarding fraud

 

 

ANS:

 

 

   35.   What are the three major credit reporting agencies?

a.

Experian, Equifax, and TransUnion

b.

Providian, Equifax, and TransUnion

c.

Providian, FairIsaac, and Experian

d.

TransUnion, FairIsaac, and Providian

 

 

ANS:

 

 

   36.   The ____________ contains information on individuals who may be a threat to national security.

a.

Department of justice

b.

Bureau of prisons

c.

Department of defense

d.

Secret service

 

 

ANS:

 

 

   37.   The CIA is responsible to investigate matters:

a.

Inside the United States

b.

Outside the United States

c.

Dealing with the President of the United States

d.

All of the above

 

 

ANS:

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                         

   38.   One of the agencies included in the Department of Justice is the:

a.

FBI

b.

Secret Service

c.

CIA

d.

Bureau of Prisons

 

 

ANS:

 

   39.   Which of the following is/are not federal sources of information?

a.

Central Intelligence Agency

b.

Social Security Administration

c.

Postal Service

d.

Department of Motor Vehicles

e.

All of the above are federal sources of information

 

 

ANS:

 

   40.   All of the following information can be obtained from an Internet search, except:

a.

Criminal records

b.

How many traffic tickets a person has

c.

Birth records

d.

A perpetrator’s purchase of expensive jewelry

 

 

ANS:

.

 

   41.   Why is the net worth method advantageous?

a.

It is conservative

b.

It can be used in court

c.

It can help calculate all amounts embezzled

d.

Both A and B

 

 

ANS:

 

   42.   Which of the following would provide the best information regarding the FBI?

a.

The Bureau of Prisons

b.

The Department of Justice

c.

The Department of Vital Statistics

d.

The Attorney General

 

 

ANS:

 

   43.   True or false: A net worth calculation usually yields a conservative estimate of stolen funds that is readily accepted as evidence in court.

a.

True

b.

False

 

 

ANS:

 

   44.   Under the "Net Worth Method", a person who has an increase in net worth of $100,000, known income of $80,000, and a salary of $60,000, would have unknown income of

a.

$0

b.

$10,000

c.

$20,000

d.

$40,000

 

 

ANS:

 

   45.   The Gramm-Leach Bliley Act allows all of the following except:

a.

Banks to sell customer information

b.

Individuals to gather information under false pretenses.

c.

Companies to share customer information even if the customer has "opted out".

d.

Financial Institutions to share personal information with law enforcement agencies

 

 

ANS:

 

   46.   Which of the following is an example of a state source of information?

a.

Social Security Administration.

b.

Utility records.

c.

Department of Motor Vehicles.

d.

Permit departments.

 

 

ANS:

 

   47.   The Bureau of Prisons records are available under

a.

Federal sources of information

b.

State sources of information

c.

Both of the above

d.

None of the above

 

 

ANS:

 

   48.   Which of the following government agencies does not typically use the net worth method to detect fraud?

a.

Internal Revenue Service

b.

Federal Bureau of Investigation

c.

Social Security Administration

d.

Drug Enforcement Agency

 

 

ANS:

 

   49.   When investigating conversion the ‘financial footprints’ that fraud investigators are looking for are?

a.

Purchase of assets

b.

Changes in lifestyles

c.

Changes in net worth

d.

All of the above

 

 

ANS:

 

   50.   The Net-Worth Method:

a.

Is a conservative method and is, therefore, typically accepted as evidence in court

b.

Is used in every fraud case

c.

Is useful evidence for court but does not help in the interrogation process.

d.

Both a and b

e.

Both a and c

 

 

ANS:

 

 

   51.   Which of the following is a true disadvantage of using the net worth method?

a.

the amounts are not readily accepted as evidence by courts

b.

it rarely facilitates the obtaining of a confession

c.

it is widely used by the DEA, FBI, and IRS

d.

embezzlers typically spend their money on luxuries that are difficult to track

 

 

ANS:

 

 

   52.   Which of the following is the correct method of applying the net worth method

a.

Assets – liabilities – prior year’s net worth – living expenses + funds from known sources = Funds from Unknown sources

b.

Assets – Liabilities + prior year’s net worth + living expenses – funds from known sources = Funds from Unknown sources

c.

Assets – liabilities – prior year’s net worth + living expenses – funds from known sources = Funds from Unknown sources

d.

Net Worth – prior year’s net worth + Assets + living expenses – funds from known sources = Funds from Unknown sources

 

 

ANS:

 

 

   53.   Which of the following frauds would conversion investigation methods be most effective in uncovering?

a.

Kickback schemes

b.

Revenue fraud schemes

c.

Underrecording of accounts payable

d.

Payroll schemes

 

 

ANS:

 

   54.   Which of the following statements are true:

             I.         The amounts determined to be stolen using the net worth method are            usually readily accepted as evidence by courts.

            II.        Net worth calculations tend to give a conservative estimate of stolen                 funds.

a.

I only

b.

II only

c.

Both I and II

d.

Neither I or II

 

 

ANS:

 

 

   55.   The net worth method for determining amounts embezzled is not regularly used by:

a.

The Federal Executive Board

b.

The Drug Enforcement Administration

c.

The Federal Bureau of Investigation

d.

The Internal Revenue Service

 

 

ANS:

 

   56.   Why do most fraud perpetrators initiate fraudulent activity?

 

a.

To increase their savings account

b.

To meet a perceived critical need

c.

To improve their lifestyle

d.

All of the above

 

ANS:

 

   57.   Because the use of ________ is so common in frauds, the ­­­­_________ can be a fraud investigators most important ally.

 

a.

mail, Postal Service

b.

tax returns, Internal Revenue Service

c.

narcotics, Drug Enforcement Administration

d.

fake social security numbers, Social Security Administration

 

ANS:

 

 

   58.   The ­­­__________ is a database that contains arrest and criminal records on a nationwide basis.

a.

National Crime Information Center

b.

Interstate Identification Index

c.

National Prison Bureau Database

d.

None of the above

 

ANS:

 

   59.   The Secret Service performs all of the following functions except:

a.

Protects the president of the United States

b.

Investigates counterfeiting

c.

Investigates theft of government checks

d.

Investigates charges of treason

e.

The Secret Service performs all of the above functions

 

ANS:

 

   60.   UCC records can identify all of the following except:

a.

Collateral on purchased assets

b.

The nature of the lending company

c.

Where a person banks

d.

Whether a person has a need for money

e.

UCC records cann identify all of the above

 

ANS:

 

 

   61.   A fraud investigator would have the least amount of difficulty obtaining the _________ of a suspect.

a.

Tax returns

b.

Military records

c.

Birth records

d.

Social security number

 

ANS:

 

Available solutions