All of the following are good advice about how to handle a fraud suspect EXCEPT

A) Convert a verbal confession into a written statement
B) Show the suspect all the evidence you have collected
C) Don't interview the suspect in his office
D) Make copies of suspicious documents secretly


B

Computer Science & Information Technology

You might also like to view...

What are the advantages and disadvantages associated with a dedicated print server?

What will be an ideal response?

Computer Science & Information Technology

The ________ provides a description of these suggestion consequences when you select a specific suggestion

A) Performance Analyzer B) Performance Manager C) Linked Table Manager D) Linked Table Analyzer

Computer Science & Information Technology

A speaker is emitting sounds that are not normal. Check the computer for empty _______

Fill in the blank(s) with correct word

Computer Science & Information Technology

A common way to implement certificate distribution in a large company is to provide users with a web interface to request certificates using their Active Directory account. Using this technique, users need only the _______ of the CA to request a personal certificate

a. Name b. URL c. Certificate number d. Account number

Computer Science & Information Technology