Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers
Occupational fraud and abuse is a (an) __________ of doing business, in much the same way that we pay expenses for electricity, taxes, and wages.
According to the Fraud Tree, cash has three following schemes:
Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?
Which of the following is a common red flag of procurement fraud schemes involving collusion among contractors?
George, a 71-year-old man, receives a fraudulent message on his computer stating that his computer has been infected by a virus. When George calls the phone number listed on the message, he speaks with a fraudster who charges him for computer repair services that are unnecessary. George has MOST LIKELY been victimized by which of the following schemes?
Antonia, a Certified Fraud Examiner (CFE), discovers that a loan applicant misrepresented their creditworthiness and income to qualify for a mortgage on a new house. Which type of loan fraud BEST describes the scheme that Antonia uncovered?
To prevent expense reimbursement fraud, it is recommended that companies require employees to submit receipts electronically.
A fraudster uses a victim’s name, government identification number, and birthdate to impersonate the victim and open a credit card account in the victim’s name. This scheme can BEST be described as:
The prime targets for skimming schemes, which are hard to monitor and predict such as late fees and parking fees, are:
Which of the following fraud schemes is MOST LIKELY to target members of a religious community?
Persuasive evidence of an arrangement does not exist when:
__________ are the amounts which are owed to other entities:
Brenda was a cashier at a retail store. When Brenda's friend shopped at the store, she would take her merchandise to Brenda's cash register. Instead of charging her friend, Brenda would record a No-Sale transaction on the register, and her friend would pretend to pay for the merchandise. Brenda's friend would leave the store without paying for the merchandise, and the two would later divide the merchandise between themselves. This scheme can BEST be described as:
Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?
Cynthia receives a fraudulent text message that appears to be from her credit card company. The message claims that the company has detected suspicious card transactions and provides a link for her to click to sign into her account for more information. Cynthia is MOST LIKELY being targeted by which of the following types of social engineering schemes?
Which of the following is a method of identity theft prevention that is recommended for individuals?
Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?
Which of the following is TRUE regarding accrual-basis accounting?
Once the expense account is closed, it becomes a historical item and probably will never be reviewed again.
“Anticipate possible losses and omit potential profits”, this results in:
Physical assets including _________ and ________ are the most commonly misappropriated noncash assets in our study.
Fraud in financial statements generally takes the form of _______ assets or revenue and _______ liabilities and expenses.
Which of the following is a method that a fraudster might use to conceal inventory shrinkage?
Which of the following situations describes a red flag that might be indicative of loan fraud?
Perceived certainty of detection is directly related to employee theft for respondents in all industry sectors, that is, the stronger the perception that theft would be detected, the more the likelihood that the employee would engage in deviant behavior.
When expenses used to produce income—all of them—should be matched in a consistent manner against that income, this is referred to:
Black, an accounts receivable clerk, stole Customer A's monthly payment instead of posting it to A's account. When Customer B's payment arrives a few days later, Black applies the payment to Customer A's account. When Customer C's payment arrives a few days after that, Black applies it to Customer B's account. Black's method of crediting one account with money taken from another account is known as:
Not having any accounts receivable that are overdue is a common red flag of fictitious revenue schemes.
Mario performs surgery on a patient to replace a bone. The surgery should be billed using one code, but Mario bills the surgery using three codes (one for the entire surgery, one for the removal of the bone, and another for the insertion of the artificial bone), which increases the cost. Which of the following BEST describes Mario's scheme?
_____________ involves purposeful misreporting of financial information about the organization that is intended to mislead those who read it.
_________ is defined as a person who works for the victim organization and who is the primary culprit.
Which of the following is a method that might be used to fraudulently overstate the inventory balance?
Which of the following is a recommended method for safeguarding an organization's proprietary information?
___________ allows the fraud examiner to inspect key attributes on a smaller portion (or sample) of those documents.
The more power a person has over the bidding process, the more likely the person can influence the selection of a supplier.
Which of the following is a common way that dishonest contractors collude to evade the competitive bidding process?
Delivery has not occurred or services have not been rendered when:
A tangible asset is one which is:
Larceny is the scheme in which an employee simply takes inventory from the company premises without attempting to conceal it in the books and records.
Which of the following is the criterion for bid solicitation?
Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail and recording the receipt of payments.
Conflict of interest cases are more easily prevented than detected.
____________ is a process by which a bookkeeper records all transactions and can adjust the books.
________ increase assets and expenses and/or decrease liabilities and/or equity.
Which of the following is NOT the aspect of inventory purchase?
A __________ is a day-by-day, or chronological, record of transactions.
Which of the following is the amount of money that would be realized upon the sale of the asset at some point in the future, less the costs associated with owning, operating, and selling it?
According to Hollinger and Clark, for policy development, management must pay attention to:
When an incorrect total is carried from the journal to the ledger or from the ledger to the financial statements, this method is called:
_________ normally are carried on an organization’s books as expenses because they tend to be consumed by the organization within a year of purchase.
Jonathan, a Certified Fraud Examiner (CFE), is tasked with identifying potential indicators of intrusion into his employer's computer network. Which of the following might indicate that the organization's network has been compromised or accessed without authorization?
Which of the following actions can make mobile payments more secure?
Which of the following is a red flag of a Ponzi scheme?
People commit financial statement fraud to:
Ada uses her mother’s government identification card to impersonate her mother and obtain health care for herself under her mother’s insurance benefits. Which type of patient health care fraud scheme is Ada MOST LIKELY committing?
Which of the following would NOT be considered a conflict of interest?
__________ means that traditional bribery statutes proscribe only payments made to influence the decisions of government agents or employees.
___________ and __________ are used to increase (or decrease) the equity account.
Joe's automobile insurance policy expired in June. In August, Joe was involved in an automobile accident, and his vehicle was severely damaged. After the accident, Joe contacted his insurance company and reinstated the policy. In September, Joe then submitted a claim with a September accident date for the damages that occurred to his vehicle in August. Joe has engaged in which of the following insurance schemes?
All the following are basic methods used to prove corrupt payments in corruption schemes EXCEPT:
The essential elements of a ________ are an actual or constructive taking away of the goods or property of another without the consent and against the will of the owner and with a felonious intent.
The scheme in which the same vendor is receiving favorable treatment can be found in purchases by vendor searches.
Which of the following actions would balance the accounting equation to conceal the misappropriation of cash?
Skimming cases can more likely be detected by:
____________ corrupt employees can cause inventory to be fraudulently delivered to themselves or accomplices.
Which of the following is the MOST ACCURATE statement about the phases of procurements involving open and free competition among contractors?
Horizontal analysis can BEST be described as:
Which of the following offender types are people who take the money and run away?
Which of the following statements about competitive intelligence is CORRECT?
Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?