New Year Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

ACFE CFE-Financial-Transactions-and-Fraud-Schemes Dumps

Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers

Question 1

Occupational fraud and abuse is a (an) __________ of doing business, in much the same way that we pay expenses for electricity, taxes, and wages.

Options:

A.

Equity

B.

Balance sheet

C.

Expense

D.

Financial record

Question 2

According to the Fraud Tree, cash has three following schemes:

Options:

A.

Skimming, cash larceny, and fraudulent disbursements

B.

Fraud analysis, skimming, and cash misappropriations

C.

Cash larceny, cash distribution, and fraudulent disbursements

D.

Cash distribution, skimming, and fraud analysis

Question 3

Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?

Options:

A.

Restricting other employees from performing the duties of an absent employee

B.

Assigning the duties of depositing cash receipts and performing bank reconciliations to different employees

C.

Having all employees use the same cash register for their transactions

D.

Keeping employees unaware that the company performs surprise cash counts

Question 4

Which of the following is a common red flag of procurement fraud schemes involving collusion among contractors?

Options:

A.

More competitors than usual submit bids on a project or product.

B.

All contractors submit bids that are consistently low.

C.

Bid prices decline when a new contractor enters the competition.

D.

The winning bidder does not subcontract any work to a third party.

Question 5

George, a 71-year-old man, receives a fraudulent message on his computer stating that his computer has been infected by a virus. When George calls the phone number listed on the message, he speaks with a fraudster who charges him for computer repair services that are unnecessary. George has MOST LIKELY been victimized by which of the following schemes?

Options:

A.

Pharming

B.

Bait and switch scheme

C.

Tech-support scheme

D.

Smishing

Question 6

Antonia, a Certified Fraud Examiner (CFE), discovers that a loan applicant misrepresented their creditworthiness and income to qualify for a mortgage on a new house. Which type of loan fraud BEST describes the scheme that Antonia uncovered?

Options:

A.

Residential loan fraud

B.

Credit data blocking

C.

Double-pledging collateral

D.

Linked financing

Question 7

To prevent expense reimbursement fraud, it is recommended that companies require employees to submit receipts electronically.

Options:

A.

True

B.

False

Question 8

A fraudster uses a victim’s name, government identification number, and birthdate to impersonate the victim and open a credit card account in the victim’s name. This scheme can BEST be described as:

Options:

A.

New account identity theft

B.

Traditional identity theft

C.

Synthetic identity theft

D.

Criminal identity theft

Question 9

The prime targets for skimming schemes, which are hard to monitor and predict such as late fees and parking fees, are:

Options:

A.

Revenue sources

B.

Recorded sales

C.

Internal audits

D.

Register manipulations

Question 10

Which of the following fraud schemes is MOST LIKELY to target members of a religious community?

Options:

A.

Affinity fraud

B.

Social control fraud

C.

Bait and switch scheme

D.

Advance-fee scheme

Question 11

Persuasive evidence of an arrangement does not exist when:

Options:

A.

Revenue and corresponding expenses don’t match each other.

B.

No written or verbal agreement exists.

C.

Timings not meet properly.

D.

Capitalized expenses and Liabilities will not be up to satisfied level.

Question 12

__________ are the amounts which are owed to other entities:

Options:

A.

Supplies

B.

Expenses

C.

Assets

D.

Liabilities

Question 13

Brenda was a cashier at a retail store. When Brenda's friend shopped at the store, she would take her merchandise to Brenda's cash register. Instead of charging her friend, Brenda would record a No-Sale transaction on the register, and her friend would pretend to pay for the merchandise. Brenda's friend would leave the store without paying for the merchandise, and the two would later divide the merchandise between themselves. This scheme can BEST be described as:

Options:

A.

A register disbursement scheme

B.

A false sale scheme

C.

A purchasing and receiving scheme

D.

A skimming scheme

Question 14

Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?

Options:

A.

Requiring all fraud tips to be reported to employees' direct supervisors

B.

Combining the purchasing and payment functions within a single department

C.

Enforcing competitive bidding from potential vendors

D.

Using an external vendor to negotiate procurement contracts

Question 15

Cynthia receives a fraudulent text message that appears to be from her credit card company. The message claims that the company has detected suspicious card transactions and provides a link for her to click to sign into her account for more information. Cynthia is MOST LIKELY being targeted by which of the following types of social engineering schemes?

Options:

A.

Vishing

B.

Smishing

C.

Catfishing

D.

Pharming

Question 16

Which of the following is a method of identity theft prevention that is recommended for individuals?

Options:

A.

Do not reuse passwords for more than two accounts.

B.

Install security updates and patches for personal computers annually.

C.

Only use email to send personal information when contacting reputable organizations.

D.

Use biometric authentication when it is available.

Question 17

Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?

Options:

A.

Pharming is the practice of changing a victim's email or mailing address so that the identity thief receives the victim's mail.

B.

Dumpster diving involves searching for sensitive personal information on used computers that have been purchased from a reseller.

C.

Shoulder surfing is the practice of exploiting another person's access capability to gain access to restricted areas.

D.

Baiting involves leaving flash drives or similar items that have been infected with malware in places where people are likely to find them.

Question 18

Which of the following is TRUE regarding accrual-basis accounting?

Options:

A.

Expenses are recorded in the accounting system when they are paid.

B.

Accrual-basis accounting is simpler to use than cash-basis accounting.

C.

The accrual-basis method focuses on tracking a company's current cash flow.

D.

Revenues are generally recognized when goods are delivered to a customer.

Question 19

Once the expense account is closed, it becomes a historical item and probably will never be reviewed again.

Options:

A.

True

B.

False

Question 20

“Anticipate possible losses and omit potential profits”, this results in:

Options:

A.

Asymmetrical accounting

B.

Symmetrical accounting

C.

Playing accounting

D.

Bearing accounting

Question 21

Physical assets including _________ and ________ are the most commonly misappropriated noncash assets in our study.

Options:

A.

Interest & Collusion

B.

Inventory & Equipment

C.

Inventory & Purchase

D.

Sales & Equipment

Question 22

Fraud in financial statements generally takes the form of _______ assets or revenue and _______ liabilities and expenses.

Options:

A.

Understated; overstated

B.

Overstated; understated

C.

Overstated; overstated

D.

Understated; understated

Question 23

Which of the following is a method that a fraudster might use to conceal inventory shrinkage?

Options:

A.

Selling merchandise without recording the sale

B.

Writing off stolen inventory as scrap

C.

Falsely increasing the perpetual inventory record

D.

All of the above

Question 24

Which of the following situations describes a red flag that might be indicative of loan fraud?

Options:

A.

A loan file contains missing documents that are later found in another file.

B.

There is low turnover in a real estate developer's personnel.

C.

A change order is submitted at the same time as a draw request.

D.

The number of change orders for a small project continues to increase.

Question 25

Perceived certainty of detection is directly related to employee theft for respondents in all industry sectors, that is, the stronger the perception that theft would be detected, the more the likelihood that the employee would engage in deviant behavior.

Options:

A.

True

B.

False

Question 26

When expenses used to produce income—all of them—should be matched in a consistent manner against that income, this is referred to:

Options:

A.

Equity

B.

Accrual basis accounting

C.

Expense

D.

Financial record

Question 27

Black, an accounts receivable clerk, stole Customer A's monthly payment instead of posting it to A's account. When Customer B's payment arrives a few days later, Black applies the payment to Customer A's account. When Customer C's payment arrives a few days after that, Black applies it to Customer B's account. Black's method of crediting one account with money taken from another account is known as:

Options:

A.

Padding

B.

Lapping

C.

Substitution

D.

Daisy chain

Question 28

Not having any accounts receivable that are overdue is a common red flag of fictitious revenue schemes.

Options:

A.

True

B.

False

Question 29

Mario performs surgery on a patient to replace a bone. The surgery should be billed using one code, but Mario bills the surgery using three codes (one for the entire surgery, one for the removal of the bone, and another for the insertion of the artificial bone), which increases the cost. Which of the following BEST describes Mario's scheme?

Options:

A.

Fictitious services

B.

False diagnosis

C.

Upcoding

D.

Unbundling

Question 30

_____________ involves purposeful misreporting of financial information about the organization that is intended to mislead those who read it.

Options:

A.

Fraudulent statement

B.

Corruption

C.

Asset misappropriations

D.

None of the above

Question 31

_________ is defined as a person who works for the victim organization and who is the primary culprit.

Options:

Question 32

Which of the following is a method that might be used to fraudulently overstate the inventory balance?

Options:

A.

Recording an allowance for sales returns

B.

Failing to record bad debt expense

C.

Applying the lower of cost or net realizable value

D.

Failing to write off obsolete inventory

Question 33

Which of the following is a recommended method for safeguarding an organization's proprietary information?

Options:

A.

Changing locks and reprogramming door access codes every three to five years

B.

Classifying data into security access levels based on the number of years that employees have worked for the company

C.

Educating employees about nondisclosure agreements when they are hired and during exit interviews

D.

Requiring employees to make notes and keep drafts related to confidential projects

Question 34

___________ allows the fraud examiner to inspect key attributes on a smaller portion (or sample) of those documents.

Options:

Question 35

The more power a person has over the bidding process, the more likely the person can influence the selection of a supplier.

Options:

A.

True

B.

False

Question 36

Which of the following is a common way that dishonest contractors collude to evade the competitive bidding process?

Options:

A.

Arranging an agreement with competitors to divide and allocate markets

B.

Submitting bids on fake contracts to give the appearance of genuine competition

C.

Using different publications to publish their bid solicitations

D.

Submitting invoices for work that was not performed on joint projects

Question 37

Delivery has not occurred or services have not been rendered when:

Options:

A.

Until installation and customer testing and acceptance has occurred.

B.

A written order exists but contains a right of return.

C.

Both A & B

D.

Neither A nor B

Question 38

A tangible asset is one which is:

Options:

A.

Capable of being perceived

B.

Capable of being appraised

C.

Both A & B

D.

Neither A nor B

Question 39

Larceny is the scheme in which an employee simply takes inventory from the company premises without attempting to conceal it in the books and records.

Options:

A.

True

B.

False

Question 40

Which of the following is the criterion for bid solicitation?

Options:

A.

Containing false statements

B.

Allowing the purchaser to discuss possible employment with the contractor

C.

To withdraw low bids

D.

To falsify the bid log

Question 41

Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail and recording the receipt of payments.

Options:

A.

Single employee

B.

Two employees

C.

More than two employees

D.

None of the above

Question 42

Conflict of interest cases are more easily prevented than detected.

Options:

A.

True

B.

False

Question 43

____________ is a process by which a bookkeeper records all transactions and can adjust the books.

Options:

A.

Journal Entries

B.

Accounting Cycle

C.

Financial statement

D.

None of all

Question 44

________ increase assets and expenses and/or decrease liabilities and/or equity.

Options:

A.

Journal Entries

B.

Debit

C.

Credit

D.

None of all

Question 45

Which of the following is NOT the aspect of inventory purchase?

Options:

A.

Inventory purchases purposely increase in year 1 only to be liquidated in year 2.

B.

Inventory for year 2 will be much greater than year 1.

C.

Increased sales in year 2 are unexpected and purchase of inventory does not keep pace with the sales.

D.

Might be some fraud scheme in inventory.

Question 46

A __________ is a day-by-day, or chronological, record of transactions.

Options:

A.

Asset

B.

Journal

C.

Checkbook

D.

Ledger

Question 47

Which of the following is the amount of money that would be realized upon the sale of the asset at some point in the future, less the costs associated with owning, operating, and selling it?

Options:

A.

Net realizable value

B.

Going concern

C.

Cost

D.

Fair value

Question 48

According to Hollinger and Clark, for policy development, management must pay attention to:

Options:

A.

A clear understanding regarding theft behavior

B.

Enforcement of sanctions

C.

Both A & B

D.

Neither A nor B

Question 49

When an incorrect total is carried from the journal to the ledger or from the ledger to the financial statements, this method is called:

Options:

A.

Forced Balance

B.

Out-of-balance

C.

False balance

D.

None of all

Question 50

_________ normally are carried on an organization’s books as expenses because they tend to be consumed by the organization within a year of purchase.

Options:

A.

Supplies

B.

Expenses

C.

Assets

D.

Equity

Question 51

Jonathan, a Certified Fraud Examiner (CFE), is tasked with identifying potential indicators of intrusion into his employer's computer network. Which of the following might indicate that the organization's network has been compromised or accessed without authorization?

Options:

A.

When logging into the computer network, employees receive a reminder to change their log-in passwords before they expire.

B.

Network users are prompted to install unfamiliar software onto their computers.

C.

The network is receiving data from a country where one of the organization's suppliers is located.

D.

Users are denied access to network files they do not typically use in their organizational role.

Question 52

Which of the following actions can make mobile payments more secure?

Options:

A.

Using the same log-in credentials for all payment applications

B.

Activating biometric authentication to verify the user's identity

C.

Disabling the biometric features on a newer mobile device

D.

None of the above

Question 53

Which of the following is a red flag of a Ponzi scheme?

Options:

A.

There is pressure to take payouts rather than reinvest profits.

B.

The financial manager manages, administers, and retains custody of investment funds.

C.

The investment strategy is very easy to understand.

D.

A firm has a history of returns on investments that fluctuate based on market conditions.

Question 54

People commit financial statement fraud to:

Options:

A.

Conceal false business performances

B.

Preserve personal status/control

C.

Maintain personal income

D.

Stand outside the accounting system

Question 55

Ada uses her mother’s government identification card to impersonate her mother and obtain health care for herself under her mother’s insurance benefits. Which type of patient health care fraud scheme is Ada MOST LIKELY committing?

Options:

A.

Misrepresentations fraud

B.

Fictitious claims fraud

C.

Third-party fraud

D.

Multiple claims fraud

Question 56

Which of the following would NOT be considered a conflict of interest?

Options:

A.

Harriet owns a significant amount of stock in a company she regularly buys her employer's office supplies from, but her employer is unaware of this fact.

B.

Robert works for Muir's Printing Services on weekdays and Winsted Café on weekends, but he does not tell either employer about the other job.

C.

Jennifer is on the board of directors of two companies that compete in the retail market, but she does not tell either company about her role at the other.

D.

Ernest hires his brother, John, to provide vending services to his employer's lunch areas, but he does not disclose their relationship.

Question 57

__________ means that traditional bribery statutes proscribe only payments made to influence the decisions of government agents or employees.

Options:

Question 58

___________ and __________ are used to increase (or decrease) the equity account.

Options:

A.

Journal Entries & Debit

B.

Journal Entries & Transactions

C.

Journal Entries & Credit

D.

None of all

Question 59

Joe's automobile insurance policy expired in June. In August, Joe was involved in an automobile accident, and his vehicle was severely damaged. After the accident, Joe contacted his insurance company and reinstated the policy. In September, Joe then submitted a claim with a September accident date for the damages that occurred to his vehicle in August. Joe has engaged in which of the following insurance schemes?

Options:

A.

Staged accident

B.

Inflated damages

C.

Past posting

D.

Vehicle repair

Question 60

All the following are basic methods used to prove corrupt payments in corruption schemes EXCEPT:

Options:

A.

Making inquiries to the relevant Administration of Taxation

B.

Secretly infiltrating ongoing transactions

C.

Using an inside witness

D.

Identifying and tracing payments through audit steps

Question 61

The essential elements of a ________ are an actual or constructive taking away of the goods or property of another without the consent and against the will of the owner and with a felonious intent.

Options:

A.

Larceny

B.

Abuse

C.

Fiduciary

D.

None of the above

Question 62

The scheme in which the same vendor is receiving favorable treatment can be found in purchases by vendor searches.

Options:

A.

True

B.

False

Question 63

Which of the following actions would balance the accounting equation to conceal the misappropriation of cash?

Options:

A.

Increasing another asset

B.

Increasing owners' equity

C.

Increasing a liability

D.

Creating fictitious revenue

Question 64

Skimming cases can more likely be detected by:

Options:

A.

Internal audits

B.

Accidents

C.

Internal controls

D.

Occupational frauds

Question 65

____________ corrupt employees can cause inventory to be fraudulently delivered to themselves or accomplices.

Options:

A.

False shipping slip

B.

False packing slip

C.

Fraudulent inventory slip

D.

False credit slip

Question 66

Which of the following is the MOST ACCURATE statement about the phases of procurements involving open and free competition among contractors?

Options:

A.

In the post-award and administration phase, the parties that were contracted perform their contractual obligations.

B.

In the solicitation phase, the procuring entity identifies its needs and develops the criteria used to award the contract.

C.

In the presolicitation phase, prospective contractors prepare and submit their bids.

D.

In the bid evaluation and award phase, the procuring entity issues the solicitation document.

Question 67

Horizontal analysis can BEST be described as:

Options:

A.

A technique for analyzing the relationships among items on the financial statement where components are expressed as percentages of a specified base value.

B.

A technique for measuring the relationship between any two different financial statement amounts.

C.

A technique for analyzing the percentage change in individual line items on a financial statement from one accounting period to the next accounting period.

D.

A technique for comparing the performance of different companies in the same industry for an extended period.

Question 68

Which of the following offender types are people who take the money and run away?

Options:

A.

Absconders

B.

Long-term violators

C.

Offender types

D.

None of the above

Question 69

Which of the following statements about competitive intelligence is CORRECT?

Options:

A.

Competitive intelligence is considered a legitimate business function.

B.

Competitive intelligence refers to government-sanctioned activities conducted to collect protected information from a foreign government.

C.

Competitive intelligence and corporate espionage describe identical practices.

D.

Competitive intelligence involves the use of illegal, covert means to acquire information for commercial purposes.

Question 70

Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?

Options:

A.

Kickback scheme

B.

Illegal gratuity scheme

C.

Diversion scheme

D.

Economic extortion scheme

Page: 1 / 24
Total 235 questions