ACCT 574 Week 4 Midterm Exam
Page: 1 – Multiple Choice
- Question (TCO A) Which statement is false?
- Question (TCO A) What would be a task of a litigation services practitioner?
- Question (TCO A) Which is not one of the three Ms of financial statement fraud?
- Question (TCO A) Which statement is false with respect to Howard M. Schilit’s financial shenanigans?
- Question (TCO A) COSO defines “internal controls” as a process, effected by an entity’s board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories except:
- Question (TCO A) What is an investigative technique used by the SEC to investigate specific companies for cooking the books?
- Question (TCO A) Which would be a preventive control?
- Question (TCO A) Which would be a corrective control?
- Question (TCO A) Which statement is false?
- Question (TCO A) Which of the following is a type of brainstorming?
- Question (TCO A) Implementing a code of ethics is a Sarbanes-Oxley requirement related to which component of the management process?
- Question (TCO A) Given these facts, compute inventory turnover:
- Question (TCO B) Skimming can be caught by:
- Question (TCO B) Which type of investigative technique works best at accumulating evidence to build a legal case against a financial fraudster?
- Question (TCO B) In the process of using the net worth method, you find that income of a person is $92,000 and overall expenses are $61,000. Calculated net worth is $611,000 and computed net worth is $430,000. Any unexplained net worth income or (decrease) would be:
- Question (TCO B) Which statement is false?
- Question (TCO B) Which would not be a procurement fraud scheme?
- Question (TCO B) Which would not be a procurement fraud scheme?
- Question (TCO B) In computing income under the net worth method, the following facts are found:
- Question (TCO B) The purpose of money laundering is to:
- Question (TCO B) To avoid detection by law enforcement authorities, money launderers will only send a maximum money transfer that is:
- Question (TCO B) Which one of the following is the easiest to falsify?
- Question (TCO B) Many times auditors do not believe they should report possible money laundering activities that they find in their audits because:
- Question (TCO C) Which is not one of the Daubert factors?
- Question (TCO C) Which is not a Daubert factor?
- Question (TCO C) Which statement about witness immunity is false?
- Question (TCO C) Which of the following is not an example of demonstrative evidence?
- Question (TCO C) Which item would not be demonstrative evidence?
- Question (TCO C) Which is an inductive approach?
- Question (TCO C) Benford analysis is not useful in which of the following situations?
Page: 2 – Essay
- Question (TCO C) What guidelines should forensic auditors follow when examining computer evidence?
- Question (TCO A) What are the three Ms of financial reporting fraud?
- Question (TCO B) Name some of the techniques that can be used by money launderers to break the audit trail.
ACCT 574 Week 8 Final Exam (Q & A)
Page: 1 – Multiple Choice
- Question (TCO A) Which statement is false?
- Question (TCO A) Which would not be useful in searching for hidden assets?
- Question (TCO A) Which statement is false?
- Question (TCO A) If an internal auditor finds fraud, what communication step should not be taken?
- Question (TCO A) What is an investigative technique used by the SEC to investigate specific companies for cooking the books?
- Question (TCO A) Which statement is false?
- Question (TCO A) Which is not one of the six areas of litigation services?
- Question (TCO B) Select the true answer. To prevent fraud, the entity may choose to:
- Question (TCO B) Which type of investigative technique works best at accumulating evidence to build a legal case against a financial fraudster?
- Question (TCO B) A fraud investigation should not be commenced without proper:
- Question (TCO B) You are told that a company has a 30% profit margin and the discovered fraud has caused $2,400,000 more needed revenue to cover the fraud. How much was stolen?
- Question (TCO B) Which statement is false?
- Question (TCO B) All of the following would be found in HTTP log files except:
- Question (TCO B) In order to avoid working with a money launderer, due diligence in a relationship with a new business partner means:
- Question (TCO B) Which would be the least effective procedure for preventing procurement fraud?
- Question (TCO B) The purpose of money laundering is to:
- Question (TCO C) Which is not a situation which would cause an expert to be ejected?
- Question (TCO C) Side-taking refers to:
- Question (TCO C) Which item is not required in an expert’s report?
- Question (TCO C) Which statement is false?
- Question (TCO C) Which statement is false?
- Question (TCO C) Which statement is false?
- Question (TCO C) In a criminal case, the burden of proof is normally:
- Question (TCO D) In analyzing cost behavior data for cases, most experts find that the most effective and defensible analysis method is:
- Question (TCO D) A simple but potentially useful method of estimating cost behavior is the:
Page: 2 – Multiple Choice
- Question (TCO D) Beth Company sold assets to Karen Company with an alleged value of $2,400,000. Beth Company paid $2,100,000 for the assets. The actual value of the assets was $1,700,000. Using the “out-of-pocket” damage loss rule, the fraud damages would be:
- Question (TCO D) Jones Lumber had an exclusive three-year supply agreement with Wood Construction. The contract called for lumber sales of $4,000,000 per year. After one year, Wood Construction canceled the contract without cause. The court found Wood Construction liable under the contract. Jones Lumber had average gross margins of 40% and average net income of 10% of sales. Jones Lumber’s operating expenses average 70% fixed. The damages from the loss of this contract would be:
- Question (TCO D) Georgetown Company’s weekly store operating costs for a 10-week period had a high value of $300,000 and a low value of $260,000. Sales volumes for the two weeks were $4,000,000 and $3,200,000 respectively. The estimated variable cost per dollar of sales using the high-low method is:
- Question (TCO D) In correlation analysis, the coefficient that describes the percentage of explained variance is:
- Question (TCO D) Antitrust laws were enacted to:
- Question (TCO D) When evaluating whether or not a company is engaged in predatory pricing, the forensic accountant must determine if the company:
- Question (TCO E) Magnetic force microscopy is used:
- Question (TCO E) Actually “deleting” data from a hard drive means:
- Question (TCO E) The purpose of remailers is to:
- Question (TCO E) To determine if a port on a Web server is alive and connected to the Internet, which of the following tools would be best to use?
- Question (TCO E) What are the dates found on an electronic file?
- Question (TCO E) When a suspect’s PC is disconnected, all the following data is lost, except:
- Question (TCO E) Datagrams are:
- Question (TCO F) Of the following costs, which cost is not part of the value of a tangible physical asset?
- Question (TCO F) A serious problem for forensic investigators in finding cybercriminals is:
- Question (TCO F) A “protected computer” under federal legislation is defined as:
- Question (TCO F) Which of the following is NOT part of a loss evaluation from a cyber attack?
- Question (TCO F) WishGift.com had its website shut down for two days due to a cyber attack. During that period, it is estimated that 200 customers were permanently lost. Registered customers visit once a month, on average, spend $20 on each visit, and remain registered for five years. What is the sales loss for WishGift assuming a cost of capital of 7%?
- Question (TCO F) Determine the value of the option for the Snyder Company by delaying its investment for one year. Consider the value of the option is the difference between traditional present value analysis and real option analysis. The initial investment is for $7,000,000, but the investment will not be made until next year. The investment is being delayed so that Snyder’s management can better determine the market for its product. There are two alternatives for sales in the next year of $10,000,000 or $7,500,000. Each sales level has an occurrence probability of 50%. The cost of capital for Snyder is 10%. If traditional present value analysis shows that the net present value of the project is $1,000,000, what is the value of the option (the ability to wait one year before executing or abandoning the project)?
- Question (TCO G) One type of agreement that can have a direct impact on the valuation of parts of a closely held business is a:
- Question (TCO G) IRS Rev. Rul. 59-60:
- Question (TCO G) A valuation professional who holds a CVA has the credentials of a:
- Question (TCO G) Generally speaking, “book value” is considered to be:
- Question (TCO G) In trying to determine how many years of data are necessary to perform a business valuation, a commonly used starting point is:
- Question (TCO G) Atlas Manufacturing produces axels for automobiles. The company’s weighted average cost of capital is 12%. The company forecasted the following free cash flows for the next 20 years…………..Use the discounted cash flow approach to value Atlas Manufacturing. Note – you will need a present value table or a financial calculator to solve this problem.
Page: 3 – Essay
- Question (TCO F) The legal statutes and insurance policy coverage identify a number of loss categories from a cyber attack. In the list of losses is one for “general injuries.” Identify one general injury that might be suffered during a cyber attack. How should a loss estimate be determined for the item you have identified as a general injury loss?
- Question (TCO G) What are the most commonly used methods of business valuations? Are there any reasons to use business valuation methods other than the common ones? Discuss/explain.
- Question (TCO D) Name and describe the two basic assumptions that underlie cost behavior patterns. Explain in full.
- Question (TCO E) What provisions of the Patriot Act have been enacted to make it easier to apprehend cybercriminals?