New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium ACFE CFE-Financial-Transactions-and-Fraud-Schemes Dumps Questions Answers

Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers

Question 1

____________ is a process by which a bookkeeper records all transactions and can adjust the books.

Options:

A.

Journal Entries

B.

Accounting Cycle

C.

Financial statement

D.

None of all

Buy Now
Question 2

Accounting records are designed to be kept on subjective rather than objective evidence.

Options:

A.

True

B.

False

Question 3

Which of the following is FALSE concerning methods that corporate spies generally use to steal information from other organizations?

Options:

A.

Spies often create counterfeit employee badges to gain entry into a target company.

B.

Spies often gain direct access to a target company by obtaining employment as a security officer or a member of the maintenance staff.

C.

Spies primarily use social engineering to search for confidential information on employee desks or workstations at the target company.

D.

Spies use technical surveillance to obtain nondocumentary information about target companies that cannot be found through open sources.

Question 4

In which phase of the competitive bidding process do fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?

Options:

A.

Need recognition

B.

Solicitation

C.

False specification

D.

Submission

Question 5

Not having any accounts receivable that are overdue is a common red flag of fictitious revenue schemes.

Options:

A.

True

B.

False

Question 6

A __________ is a day-by-day, or chronological, record of transactions.

Options:

A.

Asset

B.

Journal

C.

Checkbook

D.

Ledger

Question 7

John is a salesperson whose job requires him to entertain potential clients frequently. When John and another salesperson from a different company take a potential client to dinner, the other salesperson pays for the meal. John creates his own receipt for the meal and submits the expense for reimbursement from his company. John's scheme can BEST be characterized as:

Options:

A.

A mischaracterized expense reimbursement scheme

B.

A fictitious expense reimbursement scheme

C.

A multiple reimbursement scheme

D.

An overstated expense reimbursement scheme

Question 8

Which of the following scenarios is an example of upcoding?

Options:

A.

Hope is diagnosed with an ear infection. Hope's doctor writes her a prescription for a name brand medication instead of prescribing a less expensive generic medication.

B.

Dr. Smith performed a hysterectomy on Roberta. Dr. Smith submits an insurance claim using three procedure codes instead of the single code normally used for a hysterectomy.

C.

Dr. Catz spends 15 minutes with a patient. She later submits a bill to the patient's insurance company using a code that corresponds to an office visit lasting 60 minutes.

D.

Steven receives medical services prior to his new insurance going into effect. Before submitting the claim, he changes the service date on his bill so that it will be covered by insurance.

Question 9

Reconciling the sales records to the cash receipts is an effective way to detect a sales skimming scheme.

Options:

A.

True

B.

False

Question 10

The heart of the bookkeeping system is the ___________.

Options:

A.

Asset

B.

Liability

C.

Checkbook

D.

Journal

Question 11

Which of the following scenarios is an example of upcoding?

Options:

A.

Cindy receives payment in exchange for allowing an unnecessary surgical procedure to be completed on her that is then billed to her health care program

B.

Dr. Loomis uses three procedure codes when submitting a claim for a surgery that she performed that is supposed to be billed using one procedure code

C.

Landon inflates a medical bill that he wants to receive reimbursement for by misrepresenting the amount of the bill

D.

Dr. Raul advises a patient with a small fracture in her leg to use crutches, but he submits the claim using a code to indicate that he placed a cast on the patient

Question 12

Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?

Options:

A.

Requiring all fraud tips to be reported to employees' direct supervisors

B.

Combining the purchasing and payment functions within a single department

C.

Enforcing competitive bidding from potential vendors

D.

Using an external vendor to negotiate procurement contracts

Question 13

Which of the following is the MOST APPROPRIATE technique for detecting a cost mischarging scheme?

Options:

A.

Reviewing the inspection and testing reports of questioned goods or materials

B.

Comparing the direct and indirect labor account totals from the prior year to the current year

C.

Inspecting questioned goods or materials by examining packaging, appearance, and description

D.

Examining any change orders submitted by a contractor that add new items

Question 14

Entering a sales total lower than the amount actually paid by the customer is called:

Options:

A.

Underrings a sale

B.

Recording a sale procedure

C.

Internal sales audits

D.

All of the above

Question 15

The prime targets for skimming schemes, which are hard to monitor and predict such as late fees and parking fees, are:

Options:

A.

Revenue sources

B.

Recorded sales

C.

Internal audits

D.

Register manipulations

Question 16

Which of the following are the classifications for Corruption?

Options:

A.

Bribery, economic extortion, illegal gratuities, and conflicts of interest

B.

Corruption, bribery, economic extortion, conflicts of interest

C.

Overbilling, bribery, bid-rigging, and illegal gratuities

D.

Economic extortion, bribery, illegal gratuities, and corruption

Question 17

_________ assumes the business will go on indefinitely in the future.

Options:

A.

Materiality

B.

Going concern

C.

Cost

D.

Fair value

Question 18

Which of the following is TRUE regarding accrual-basis accounting?

Options:

A.

Expenses are recorded in the accounting system when they are paid.

B.

Accrual-basis accounting is simpler to use than cash-basis accounting.

C.

The accrual-basis method focuses on tracking a company's current cash flow.

D.

Revenues are generally recognized when goods are delivered to a customer.

Question 19

__________ may be defined as the offering, giving, receiving, or soliciting anything of value to influence an official act.

Options:

A.

Corruption

B.

Diverting business to vendors

C.

Bribery

D.

Lacking approval authority

Question 20

Assets that are long-lived and that differ from property, plant, and equipment that has been purchased outright or acquired under a capital lease are:

Options:

A.

Tangible Assets

B.

Intangible Assets

C.

Forced Assets

D.

None of the above

Question 21

One of the simplest ways to justify unacceptable conduct and avoid guilt feelings is to invent a good reason for ________.

Options:

Question 22

Which of the following is a method of identity theft prevention that is recommended for individuals?

Options:

A.

Do not reuse passwords for more than two accounts.

B.

Install security updates and patches for personal computers annually.

C.

Only use email to send personal information when contacting reputable organizations.

D.

Use biometric authentication when it is available.

Question 23

Which of the following is NOT the reason why senior management will overstate business statements?

Options:

A.

Comply with debt covenants

B.

Meet personal performance criteria

C.

Trigger performance-related compensation

D.

Show a pattern of growth to support sale of a business

Question 24

__________ can be defined as conduct detrimental to the organization and to the employee.

Options:

A.

Employee deviance

B.

Employee theft

C.

Employee fraud

D.

All of the above

Question 25

Which of the following is a recommended method for safeguarding an organization's proprietary information?

Options:

A.

Changing locks and reprogramming door access codes every three to five years

B.

Classifying data into security access levels based on the number of years that employees have worked for the company

C.

Educating employees about nondisclosure agreements when they are hired and during exit interviews

D.

Requiring employees to make notes and keep drafts related to confidential projects

Question 26

Which of the following search is used for unusually high incidence of returns and allowances scheme?

Options:

A.

Allowances by vendors

B.

Disposals of allowances than reorders

C.

Returns and allowances

D.

None of the above

Question 27

The essential elements of a ________ are an actual or constructive taking away of the goods or property of another without the consent and against the will of the owner and with a felonious intent.

Options:

A.

Larceny

B.

Abuse

C.

Fiduciary

D.

None of the above

Question 28

Which of the following would be MOST INDICATIVE of loan fraud in a draw request submitted by a construction developer?

Options:

A.

The developer's personal account statements have been omitted.

B.

Change orders have been included.

C.

Lien releases from subcontractors are not included with the request.

D.

There are several inspection reports.

Question 29

If the assets are intentionally purchased by the company but simply misappropriated by the fraudster, this is referred to as:

Options:

A.

Inventory larceny scheme

B.

Asset receiving scheme

C.

Fraudulent purchase

D.

Falsify shipping

Question 30

Which of the following is the MOST ACCURATE statement about the phases of procurements involving open and free competition among contractors?

Options:

A.

In the post-award and administration phase, the parties that were contracted perform their contractual obligations.

B.

In the solicitation phase, the procuring entity identifies its needs and develops the criteria used to award the contract.

C.

In the presolicitation phase, prospective contractors prepare and submit their bids.

D.

In the bid evaluation and award phase, the procuring entity issues the solicitation document.

Question 31

The most common method of detection in corruption cases is:

Options:

A.

Internal audits

B.

Internal controls

C.

Tips

D.

By accident

Question 32

A fraudster uses a victim’s name, government identification number, and birthdate to impersonate the victim and open a credit card account in the victim’s name. This scheme can BEST be described as:

Options:

A.

New account identity theft

B.

Traditional identity theft

C.

Synthetic identity theft

D.

Criminal identity theft

Question 33

A typical issue involving materiality and fraud would be:

Options:

A.

Fraudulent statement

B.

Misappropriations

C.

Civil lawsuit

D.

Quality control

Question 34

Which of the following controls BEST describes the safeguards an organization implements to provide protection for computing resources by increasing security policies and awareness, conducting security audits and tests, and properly classifying data?

Options:

A.

Technical security controls

B.

Logical access controls

C.

Administrative security controls

D.

Physical access controls

Question 35

Asset misappropriation schemes were the “middle children” of the study; they were more common than fraudulent statements and more costly than corruption.

Options:

A.

True

B.

False

Question 36

A person is said to be in ________ act, when the business which he transacts, or the money or property which he handles, is not for his own benefit, but for another person:

Options:

A.

Fiduciary Capacity

B.

Embezzlement

C.

Conversion

D.

None of the above

Question 37

People commit financial statement fraud to:

Options:

A.

Conceal false business performances

B.

Preserve personal status/control

C.

Maintain personal income

D.

Stand outside the accounting system

Question 38

Hannah is a manager at a financial institution. To safeguard the bank and its customers from electronic funds transfer (EFT) fraud, Hannah is implementing several preventive measures. Which of the following is NOT a measure Hannah should take to prevent EFT fraud?

Options:

A.

If a customer reports the loss or theft of an access device, then cancel the existing card, PIN, or other form of access and issue a new one.

B.

Send a welcome letter to new customers to determine if the address submitted on the account application is valid.

C.

Separate the duties of bank employees so that the responsibilities for the issuance of access devices are separate from the issuance of PINs.

D.

Mail PINs and other associated account information together to reduce the chance of those items being lost during transit.

Question 39

A scheme is classified as a Conflict of Interest:

Options:

A.

when an employee must have some kind of ownership or employment interest in the vendor submitting the invoice.

B.

when a salesman must have some kind of ownership or employment interest in the vendor submitting the sales.

C.

when a purchaser must have some kind of ownership or employment interest in the vendor submitting the purchase.

D.

when a dealer must have some kind of dealership interest in the vendor submitting the stock.

Question 40

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:

Options:

A.

Human intelligence

B.

Baiting

C.

Scavenging

D.

Open-source intelligence

Question 41

According to the recommended methodology for responding to cybersecurity incidents, which of the following activities should occur during the detection and analysis step?

Options:

A.

Limiting the damage caused by the attack

B.

Creating an incident response plan

C.

Restoring control of the systems that were affected

D.

Identifying all breaches that occurred

Question 42

The principal way to detect omitted credits from books of account is through:

Options:

A.

Forced Balance

B.

Trend analysis

C.

Expense account

D.

None of all

Question 43

Which of the following methods is NOT used to detect conflicts of interest?

Options:

A.

Tips & Complaints

B.

Review of vendor ownership files

C.

Underbillings of assets

D.

Interviews with purchasing personnel

Question 44

The most basic skimming scheme occurs when:

Options:

A.

An employee sells goods or services to a customer, collects the customer’s payment, but makes no record of the sale.

B.

An employee buys goods or services from a customer, drops the customer’s payment, but makes no record of the purchase.

C.

An employee sells goods or services to a stakeholder, collects the stakeholder’s payment and makes record of the sale too.

D.

An employee buys goods or services from a stakeholder, drops the stakeholder’s payment and makes record of the purchase too.

Question 45

Which of the following fraud schemes is MOST LIKELY to target members of a religious community?

Options:

A.

Affinity fraud

B.

Social control fraud

C.

Bait and switch scheme

D.

Advance-fee scheme

Question 46

Which of the following is NOT one of the information security goals that should be achieved to secure an e-commerce system for users and account holders?

Options:

A.

Confidentiality of data

B.

Availability of data

C.

Penetrability of data

D.

Integrity of data

Question 47

Occupational fraud and abuse is a (an) __________ of doing business, in much the same way that we pay expenses for electricity, taxes, and wages.

Options:

A.

Equity

B.

Balance sheet

C.

Expense

D.

Financial record

Question 48

By removing a tangible asset from the business (a debit), the books will be ___________ by the exact amount of the tangible asset misappropriated.

Options:

A.

Journal Entries

B.

Out-of-balance

C.

False debits

D.

None of all

Question 49

“Anticipate possible losses and omit potential profits”, this results in:

Options:

A.

Asymmetrical accounting

B.

Symmetrical accounting

C.

Playing accounting

D.

Bearing accounting

Question 50

The difference between assets and liabilities is called:

Options:

A.

Equity

B.

Expense

C.

Revenue

D.

Income statement

Question 51

Which of the following statements regarding financial statement disclosures is TRUE?

Options:

A.

Events occurring after the close of the reporting period that might significantly affect the financial statements do not need to be disclosed.

B.

Management must disclose potential losses from ongoing litigation even when it is unlikely that the related liability will result in a future obligation.

C.

All information relating to the company must be disclosed in the financial statements, regardless of materiality.

D.

Changes in accounting principles must be disclosed in the financial statements.

Question 52

Which of the following is an example of a cash larceny scheme?

Options:

A.

Paul sold insurance policies to individuals but never filed the policies with the insurance company. He then stole the customers' payments, which he was able to do because the insurance company did not know the policies existed.

B.

Emily is an accounts receivable clerk. She stole Customer A's monthly payment. When Customer B's payment arrived, she applied it to Customer A's account. When Customer C's payment arrived, she applied it to Customer B's account.

C.

Sarah returned a $250 mirror to the store. Jenna, the cashier, recorded a $350 return on the cash register and kept the remaining $100.

D.

Mark, a cashier, knew the access code for Joe's cash register. He logged in as Joe and processed transactions as usual. He then took $50 from the register at the end of his shift.

Question 53

Which of the following ratios can be used to determine the efficiency with which a company uses its assets?

Options:

A.

Quick ratio

B.

Receivable turnover ratio

C.

Debt-to-equity ratio

D.

Asset turnover ratio

Question 54

The _______________ cost method of pricing would carry an asset’s value on the financial statements as what it would currently cost, considering inflation.

Options:

Question 55

Perceived certainty of detection is directly related to employee theft for respondents in all industry sectors, that is, the stronger the perception that theft would be detected, the more the likelihood that the employee would engage in deviant behavior.

Options:

A.

True

B.

False

Question 56

Joe's automobile insurance policy expired in June. In August, Joe was involved in an automobile accident, and his vehicle was severely damaged. After the accident, Joe contacted his insurance company and reinstated the policy. In September, Joe then submitted a claim with a September accident date for the damages that occurred to his vehicle in August. Joe has engaged in which of the following insurance schemes?

Options:

A.

Staged accident

B.

Inflated damages

C.

Past posting

D.

Vehicle repair

Question 57

Skimming is:

Options:

A.

The removal of cash from a victim entity prior to its entry in an accounting system.

B.

The addition of cash from a victim entity prior to its entry in an accounting system.

C.

The removal of cash from a victim entity after its entry in an accounting system.

D.

None of above

Question 58

________, one of the synonyms for fraud, implies deceiving so thoroughly as to obscure the truth.

Options:

A.

Deceive

B.

Delude

C.

Mislead

D.

Beguile

Question 59

The behavior profile of employees who are involved in bribery schemes may include:

Options:

A.

Gambling habit

B.

Extravagant lifestyle

C.

Drug and/or alcohol addiction

D.

All of the above

Question 60

In which of the following process, all bidders are legally supposed to be placed on the same plane of equality, bidding on the same terms and conditions?

Options:

A.

Bid-rigging

B.

Kickbacks

C.

Competitive bidding

D.

Bid solicitation

Question 61

Which counts sometimes can give rise to inventory theft detection?

Options:

A.

Perpetual inventory counts

B.

Physical inventory counts

C.

Concealment inventory counts

D.

None of the above

Question 62

A client contacts Emma, a Certified Fraud Examiner (CFE), and explains that they prepaid a commission to a broker for help with obtaining a loan. However, after sending the payment for services, the client did not receive a response from the broker and is unable to contact them. This type of fraud is known as a(n):

Options:

A.

Bait and switch scheme

B.

Advance-fee scheme

C.

Split deposit scheme

D.

Scavenger scheme

Question 63

Physical assets including _________ and ________ are the most commonly misappropriated noncash assets in our study.

Options:

A.

Interest & Collusion

B.

Inventory & Equipment

C.

Inventory & Purchase

D.

Sales & Equipment

Question 64

Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?

Options:

A.

Kickback scheme

B.

Illegal gratuity scheme

C.

Diversion scheme

D.

Economic extortion scheme

Question 65

A ____________ can be very costly for an organization to undertake, both in terms of money and time spent.

Options:

Question 66

Which of the following is the amount of money that would be realized upon the sale of the asset at some point in the future, less the costs associated with owning, operating, and selling it?

Options:

A.

Net realizable value

B.

Going concern

C.

Cost

D.

Fair value

Question 67

Which of the following statements is TRUE regarding income statements?

Options:

A.

Gross revenue is the total amount of sales after deductions are applied.

B.

Net profit is a company's earnings before operating expenses have been deducted.

C.

Gross profit is the difference between net sales and cost of goods sold.

D.

A company's operating expenses are usually listed as the first line item.

Question 68

In Cressey’s fraud triangle, its three legs are Opportunity, Pressure, and:

Options:

A.

Violation

B.

Isolation

C.

Rationalization

D.

None of the above

Question 69

Which of the following is NOT the reason to bribe employees of the purchaser?

Options:

A.

To ensure receipt of a late bid

B.

To extend the bid opening date

C.

To ensure bid-splitting

D.

To falsify the bid log

Question 70

Which of the following scenarios is an example of an economic extortion scheme?

Options:

A.

A purchasing employee and vendor agree to bill the company for services that were not provided.

B.

A government official demands money in exchange for awarding a contract to a vendor.

C.

An employee receives a payment for directing excess business to a vendor.

D.

A vendor rewards a purchasing employee with a free trip after the employee directs business to the vendor.

CFE-Financial-Transactions-and-Fraud-Schemes Question Answers