Table of Contents
Get All Weeks Forensic Accounting and Fraud Examination Coursera Quiz Answers
Week 01: Forensic Accounting and Fraud Examination Coursera Quiz Answers
Q1. Which of the following correctly reflects the common law understanding of fraud?
Q2. In terms of frequency of occurrence, the largest category of fraud is which of the following:
ViewQ3. Which of the following is the most likely reason, as suggested by Cressey, that an employee tries to solve a financial problem in secret?
ViewQ4. In this week, we introduce the Accidental Fraudster. Which of the following represent skills required to be a successful forensic professional and fraud examiner? (Mark all that apply .)
View2.Investigative proficiency.
3.Critical thinking.
Q5. Common violations pertaining to occupational fraud and abuse include all of the following except:
ViewQ6. From the list below, create the typical fraud perpetrator profile.
ViewQ7. The interrelationship among auditing, fraud examination, and financial forensics is:
View dynamic and changes over time.Q8. While a fraud examiner’s objective is to determine whether fraud has occurred and who is likely responsible, the financial forensics investigator’s objective is to:
ViewQ9. Which of the following is not one of the three-pronged processes of remediation?
ViewSupport for the legal process as it tries to resolve the matter in the legal environment.
Q10. Which of the following statements is correct with regard to collusion?
ViewQ1. To understand the importance of fraud, one should understand the losses that occur due to fraud each year. According to ACFE estimates, worldwide, how much is annually lost due to fraud?
ViewQ2. In this week, we introduce the Accidental Fraudster. Which of the following represent skills required to be a successful forensic professional and fraud examiner? (Mark all that apply .)
View2.Investigative proficiency.
Q3. Pressure is a form of motive.
ViewQ4. Which of the following is NOT recognized by the ACFE as a behavioral warning sign?
View
Q5. Please identify the most correct statement with respect to fraud victims:
ViewQ6. As legitimate compensation increases, the losses associated with perpetrators generally rise. This relationship is most likely because a perpetrator frequently:
ViewQ7. The person most responsible for the creation of the fraud triangle.
ViewQ8. With regard to the fraud triangle, which of the following statements is correct?
ViewQ9. With regard to auditing, fraud examination and forensic accounting, which statement is correct?
ViewQ10. While a fraud examiner’s objective is to determine whether fraud has occurred and who is likely responsible, the financial forensics investigator’s objective is to:
ViewQ11. Which of the following statements is correct with regard to collusion?
ViewWeek 02: Forensic Accounting and Fraud Examination Coursera Quiz Answers
Q1. One major difference between fraud and a mistake is:
ViewQ2. Which if the following is usually correct, concerning a predator?
ViewQ3. Capability as an attribute of fraudsters is most closely associated with which of the following
ViewQ4. With regard to internal controls, which of the following would generally not be considered an internal control for payroll.
ViewQ5. Fraud deterrence begins:
ViewQ6. The Fraud Diamond has which of the following attributes added to the Fraud Triangle
ViewQ7.Overall, management must design, implement, and maintain:
ViewQ8. One of the main findings of Donald Cressey is the following observation.
ViewQ9. Signs that an individual is a predator fraudster include:
ViewQ10.With regard to segregation of duties, which of the following is not one of the four major functions
ViewQ1. One of the main findings of Donald Cressey is the following observation.
ViewQ2. Which of the following is NOT an attribute of the “predatory” fraud triangle?
ViewQ3. Conversion can be shown to have occurred by:
View2.Tracing the money to the defendant’s department
3.Tracing the money to the defendant’s bank account
4.All of the above
Q4. The Fraud Diamond has which of the following attributes added to the Fraud Triangle
ViewQ5. Overall, management must design, implement, and maintain:
View2.internal controls to support effective and efficiency of operations, reliability of reporting, and compliance with laws and regulations.
3.an automated accounting system that implements each component of U.S. GAAP accounting principles.
4.All of the choices are correct.
Q6. Albrecht developed the fraud scale, which includes the following components:
ViewQ7. Which of the following is true of the Dorminey et al “meta-model”
ViewQ8. Why are preventative controls preferred (if cost-effective)?
View2.They help recover the losses that can be anticipated
3.They keep losses from occurring.
Q9. With regard to segregation of duties, which of the following is not one of the four major functions
ViewQ10. Three of the various objectives of an internal control program are:
ViewWeek 03: Forensic Accounting and Fraud Examination Coursera Quiz Answers
Q1. What is the INCORRECT statement about fraud detection?
ViewQ2. A fraudster erases files from his hard drive. This is an example of data alteration.
ViewQ3. When looking for fraud, credit card companies constantly mine data and look for transactions that are similar to historical patterns of fraud. Which of the following are examples of patterns that they use. (May have more than one correct answer)
View2.Large purchases of “high-risk” items at a retailer from which the card holder has not previously purchased.
Q4. Which of the following statements about adjusting journal entries is NOT correct?
ViewQ5. Anomalies are
ViewQ6. Analytical anomalies include all of the following except:
ViewQ7. Journal entries of concern include:
ViewQ8. Duplicate searches in data extraction and analysis software could be used to discover:
ViewQ9. Which of the following best describes text analysis?
ViewQ10. Which of the following is most accurate with regard to files deleted from a computer’s hard drive prior to the arrival of fraud examiners or forensic accountants?
ViewQ1. Sources of information include:
View2.Surveillance by private detectives.
3.Surveillance by police officers.
4.All of the above
Q2. With regard to financial data analysis and effective fraud detection, which of the following statements is INACCURATE.
ViewQ3. When looking for fraud, credit card companies constantly mine data and look for transactions that are similar to historical patterns of fraud. Which of the following are examples of patterns that they use. (May have more than one correct answer)
View2.Large purchases of “high-risk” items at a retailer from which the card holder has not previously purchased.
Q4. Which of the following statements about adjusting journal entries is NOT correct?
ViewQ5. Red flags, symptoms of fraud, often go unnoticed or are not vigorously pursued because:
ViewQ6. Journal entries of concern include:
View2.entries made by members of senior management.
3.routine accrual entries prepared at year-end.
4.All of the choices are correct.
Q7. Which of the following software tools cannot be used in “big data” analysis.
ViewQ8. With regard to text analysis, which of the following is NOT correct:
ViewQ9. The functions of data extraction and analysis software tools include all EXCEPT:
ViewQ10. Which is the following statements with regard to the WorldCom fraud is NOT accurate?
ViewQ11. Which of the following best describes text analysis?
ViewQ12. With regard to financial data analysis and effective fraud detection, which of the following statements is INACCURATE.
ViewWeek 04: Forensic Accounting and Fraud Examination Coursera Quiz Answers
Q1. The three V’s of money laundering include all except the following:
ViewQ2. The three V’s of money laundering include all but the following:
ViewQ3. The Mexico City mansion cash seizure resulted in how much United States currency:
ViewQ4. The biggest advantage investigators have when tracing the flow of illegal funds is:
ViewQ5. Which of the following are the three stages of money laundering? (Mark all that apply)
View2.Layering
3.Placement
Q6. Select the following item(s) that are reasons that people launder money:
View2.To avoid using cash for large purchases (which might be detected)
3.To avoid personal liabilities (such as bankruptcy, judgments, or divorce settlements)
Q7. Barney Drum travels with large sums of cash for deposit in foreign bank accounts. This may be a method for hiding assets.
ViewQ8. Which of the following methods is used to make detection of persons responsible for money laundering more difficult?
ViewQ9. Generally, what is the best estimate of the impact of money laundering?
ViewQ10. A shell company generally refers to limited liability or other business entity with no significant assets or ongoing business activities.
ViewQ1. When looking for money laundering methods, the forensic examiner should consider which of the following as alternatives to cash : (Mark all that apply)
View2.Gift cards
3.Disguised precious metals
Q2. The Mexico City mansion cash seizure resulted in how much United States currency:
ViewQ3. The biggest advantage investigators have when tracing the flow of illegal funds is:
ViewQ4. Which of the following are the three stages of money laundering? (Mark all that apply)
View2.Layering
3.Placement
Q5. Assuming standard packs of 50 $20 bills contained within a wrapper of money, what is the maximum amount of money that can be carried in a normal-size briefcase (attaché’ case)?
ViewQ6. Barney Drum travels with large sums of cash for deposit in foreign bank accounts. This may be a method for hiding assets.
ViewQ7. With regard to emerging payments methods and money laundering, which of the following statements is NOT correct?
ViewQ8. With regarding to changes pertaining to money laundering, which of the following change is NOT a concern to those in the battle against money laundering?
ViewQ9. The traditional technique in money laundering has been to keep the money in the country.
ViewQ10. The three V’s of money laundering include all but the following:
ViewQ11. With regard to pipe wrenches used in money laundering, which of the following statements are correct?
ViewQ12. Transferring funds obtained illegally from a safe deposit box in the US to a safe deposit box in Canada is an example of:
ViewQ13. Shell companies can be found through:
View2.A lifestyle/spending habits audit
3.Examination of ownership records in a country known to harbor and protect criminal activities
4.Examination of parental trust accounts
Q14. With regard to changes pertaining to money laundering, which of the following changes is NOT a concern to those in the battle against money laundering?
ViewQ15. A shell company generally refers to limited liability or other business entity with no significant assets or ongoing business activities.
ViewQ16. Which of the following is correct, when considering the phrase “Following the money”?
View2.Is often difficult to do given the use of foreign banks for layering
3.Often requires access to foreign bank accounts
4.All of the choices are correct.
Q17. With regard to specified unlawful acts, which of the following is one such act:
ViewQ18. Shell companies typically: (Mark all that apply)
View2.Have no employees
3.Produce no independent economic value
Q19. The Mexico City mansion cash seizure resulted in how much United States currency:
ViewQ20. Money laundering is the disguising of the existence, nature, source, ownership, location, and disposition of property derived from criminal activity.
ViewQ21. The conversion of illegal funds that have been moved to disguise its origin, to assets that appear to be derived from legal sources, is which step in the money laundering process?
ViewQ22. Which of the following is NOT true?
ViewQ23. Select the following item(s) that are reasons that people launder money:
View2.To avoid using cash for large purchases (which might be detected)
3.To avoid personal liabilities (such as bankruptcy, judgments, or divorce settlements)
Q24. With regard to emerging payments methods and money laundering, the parallel banking system, not tied to any country or government, is of significant concern to the anti-money laundering community.
ViewQ25. Generally, what is the best estimate of the impact of money laundering?
ViewQ26. How would an investigator detect an offshore bank account made by a drug dealer?
ViewQ27. One method of hiding assets is to:
ViewWeek 05: Forensic Accounting and Fraud Examination Coursera Quiz Answers
Q1. The acronym “M.I.C.E.”, as typical motivations of fraud perpetrators, stands for:
ViewQ2. Which of the following is an example of financial statement fraud?
ViewQ3. One major difference between fraud and a mistake is:
ViewQ4. Which of the following acts would be considered a fraud act (in contrast to an abuse)?
ViewQ5. In terms of the definition of occupational fraud and abuse, who is an employee?
ViewQ6. Fraud can be committed by:
View2.omission of events, transactions, or other significant information in the notes related to the financial statements.
3.alteration of the underlying accounting data.
4.All of the choices are correct.
Q7. While a fraud examiner’s objective is to determine whether fraud has occurred and who is likely responsible, the financial forensics investigator’s MAIN objective is to:
ViewQ8. Signs of pressure that would prompt an individual to commit fraud include:
ViewQ9. Which of the following is the most likely reason, as suggested by Cressey, that an employee tries to solve a financial problem in secret?
ViewQ10. The Fraud Triangle consists of: pressure, opportunity, and rationalization.
ViewQ11. As compensation of the perpetrator increases, the losses associated with the perpetrator rise. This is most likely because:
ViewQ12. Which of the following is most accurate concerning a predator?
ViewQ13. Signs that an individual is a predator fraudster include:
View2.Takes advantage of sudden opportunity.
3.Frequent job turnover caused by boredom.
4.All of the above.
Q14. The difference between a predator fraudster and an accidental fraudster is:
ViewQ15. Which of the following is true concerning the fraud scale developed by Albrecht?
ViewQ16. To improve the effectiveness of the fraud triangle, Wolfe and Hermanson suggests which characteristic as an addition to the fraud triangle (making it the fraud diamond) ?
ViewQ17. Large frauds are typically associated with all of the following EXCEPT:
ViewQ18. Overall, management must design, implement, and maintain:
View2.internal controls to support effective and efficiency of operations, reliability of reporting, and compliance with laws and regulations.
3.an automated accounting system that implements each component of U.S. GAAP accounting principles.
4.All of the choices are correct.
Q19. From the statements below select the most correct.
ViewQ20. Three of the various objectives of an internal control program are:
ViewQ21. Why is it difficult for entry-level employees to be forensic accountants?
ViewQ22. When looking for fraud, credit card companies constantly mine data and look for transactions that are similar to historical patterns of fraud. Which of the following are examples of patterns that they use. (Mark all that apply)
View2.Multiple purchases at a store in a relatively short period of time.
3.Large purchases of “high-risk” items at a retailer from which the card holder has not previously purchased.
Q23. Red flags, symptoms of fraud, often go unnoticed or are not vigorously pursued because:
ViewQ24. Duplicate searches in data extraction and analysis software could be used to discover:
ViewQ25. Which of the following best describes text analysis?
ViewQ26. The Fraud Triangle is generally present when an accidental fraudster commits fraud. The three legs represent perceived or actual instances of concepts. Which of the following is NOT one of the legs of the Fraud Triangle?
ViewQ27. Which of the following is/are applicable to the “Predator”, but not the “Accidental” fraudster? (Mark all that apply)
View2.Criminal Mindset
Q28. The biggest advantage investigators have when tracing the flow of illegal funds is:
ViewQ29. Which of the following is NOT a concern to those in the battle against money laundering?
View2.New forms of value – loyalty points traded for drugs
3.Dis-intermediation – banks not center of transactions – e.g., bit-coin
4.All of the above are concerns for law enforcement
Q30. Which is generally considered the lowest threshold for ethical decision making?
ViewQ31. With regard to Cynthia Cooper and Betty Vinson, both from WorldCom, which of the following is
ViewQ32. Which is the following is NOT a best practice for an effective whistleblower program?
ViewQ33. With regard to Cynthia Cooper and Betty Vinson, both from WorldCom, which of the following is FALSE?
ViewQ34. Which of the following are the three stages of money laundering?
View2.Integration
3.Placement
4.Layering
Q35. With regard to changes pertaining to money laundering, which of the following changes is NOT a concern to those in the battle against money laundering?
ViewQ36. Financial statement fraud consists of:
View2.Inappropriate entries to reserve accounts
3.Capitalizing expenses when inappropriate
4.All of the other choices are correct
Q37. Financial statement fraud is complex because:
View2.More than one person is usually involved
3.Most people do not have access to the source documents and therefore cannot detect the fraud
4.All of the other choices are correct
Q38. Which of the following best describes situations with complex frauds and financial crimes
ViewQ39. The functions of data extraction and analysis software tools include all EXCEPT:
ViewQ40. Which of the following is correct, when considering the phrase “Following the money”? Select all that apply.
View2.Is often difficult to do given the use of foreign banks for layering
3.Often requires access to foreign bank accounts
Q41. Anomalies are:
ViewQ42. Data can be altered by:
View2.Destroying supporting detail
3.Making copies and submitting them as the original
4.All of the other answers are correct
Q43. Common violations pertaining to occupational fraud and abuse include all of the following except:
View2.corruption.
3.financial reporting fraud.
4.All of these are common violations.
Q44. Conversion can be shown to have occurred by:
View2.Tracing the money to the defendant’s department
3.Tracing the money to the defendant’s bank account
4.All of the above
Q45. Perpetrators of large frauds are likely to use the money for all of the following EXCEPT:
ViewQ46. Fraud deterrence begins:
ViewQ47. The key to successful fraud detection and investigation using digital tools and techniques requires which approach?
ViewQ48. Upon discovering fraud, internal auditors:
ViewQ49. When attempting to capture data that a fraudster has tried to delete from a device, such as a computer hard drive or mobile phone, the forensic expert should: (Mark all that apply)
ViewQ1. Which of the following are important to include in your overall fraud policy? (Mark all that apply)
View2.Provide examples of behaviors that may be red flags for fraud
3.Define fraud in the context of your organization
4.Describe the process for reporting fraud
Q2. Which of the following is an example of financial statement fraud?
ViewQ3. The main deterrent for fraud in the corporate environment:
ViewQ4. Given the acronym M.I.C.E. offered in Chapter 1 / Module 1, which attribute most closely reflects Betty Vinson’s role in the WorldCom fraud.
ViewQ5. Which of the following is NOT an example of financial statement fraud?
ViewQ6. Cynthia Cooper provides a good example of the process of what to do when fraud is suspected. Which of the following events occurred first?
ViewQ7. With regard to losses from fraud and attempts to recover stolen money, which of the following is the correct statement?
View.
Q8. In the WorldCom fraud, whose personal life most closely resembled Cynthia Coopers?
ViewQ9. Which is the following statements with regard to the WorldCom fraud in NOT correct?
ViewQ10. WorldCom’s CEO (Chief Executive Officer) received a prison sentence of 25 years, while the CFO (Chief Financial Officer) received a sentence of five (5) years. To what was the difference in sentences attributed?
ViewConclusion:
In conclusion, our journey through the Forensic Accounting and Fraud Examination course has been an enlightening exploration of the intricate world of financial investigation, fraud detection, and forensic accounting.
Throughout this course, we have gained a comprehensive understanding of the principles, techniques, and methodologies essential to uncovering financial misconduct and safeguarding the integrity of financial systems.
Find More Related Quiz Answers >>
Agile Leadership: Introduction to Change Coursera Quiz Answers
Agile Leader Training Coursera Quiz Answers
Developing an Agile Team Coursera Quiz Answers
Agile Organization Coursera Quiz Answers
Agile Leadership Capstone Coursera Quiz Answers