![]() ![]() Original documents are always preferable to photocopies as documentary evidence There is no difference between forensic document experts and graphologists False. The traditional chain of custody of evidence procedures apply to electronic evidence, along with new procedures like cloning and calculating checksum on the hard drive Photocopies are always preferable to original documents as evidence False. Checks are documentary evidence Traditional chain of custody evidence procedures are not appropriate when used with electronic evidence False. true Checks are excellent sources of physical evidence. What can a fraud examiner conclude if his or her tests confirm that no instances of fraud are present in a sample taken from a population?Ī) there is virtually no risk that fraud exists in the populationĬ) only that no fraud is present in that particular sampleĭ) the sample is most likely not representative of the population as a whole c) only that no fraud is present in that particular sample How are most frauds concealed?ī) by converting to a paperless office without paper transactionsĬ) by creating fictitious documents or altering source documentsĭ) by firing employees who will not go along with the fraud c) only that no fraud is present in that particular sample Which of the following is usually the best way to obtain documentary evidence?Ī) computer-based queries of full-population accounting and other databasesī) a statistically sound sampling approach like discovery samplingĭ) none of the above are effective methods of discovery evidence a) computer-based queries of full-population accounting and other databases Programs like CaseMap, CaseCentral, ZANTAZ, Ringtail, and DatiCon are examples of:Ī) software that implements discovery sampling techniquesĬ) software packages used to index and store evidenceĭ) forensic software used to investigate hard drives and other digital devices c) software packages used to index and store evidence Concealment is the covering of tracks, obscuring of evidence, and removal of red flags to hide a perpetrator's fraud.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |