____________ is a process by which a bookkeeper records all transactions and can adjust the books.
Accounting records are designed to be kept on subjective rather than objective evidence.
Which of the following is FALSE concerning methods that corporate spies generally use to steal information from other organizations?
In which phase of the competitive bidding process do fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?
Not having any accounts receivable that are overdue is a common red flag of fictitious revenue schemes.
A __________ is a day-by-day, or chronological, record of transactions.
John is a salesperson whose job requires him to entertain potential clients frequently. When John and another salesperson from a different company take a potential client to dinner, the other salesperson pays for the meal. John creates his own receipt for the meal and submits the expense for reimbursement from his company. John's scheme can BEST be characterized as:
Which of the following scenarios is an example of upcoding?
Reconciling the sales records to the cash receipts is an effective way to detect a sales skimming scheme.
The heart of the bookkeeping system is the ___________.
Which of the following scenarios is an example of upcoding?
Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?
Which of the following is the MOST APPROPRIATE technique for detecting a cost mischarging scheme?
Entering a sales total lower than the amount actually paid by the customer is called:
The prime targets for skimming schemes, which are hard to monitor and predict such as late fees and parking fees, are:
Which of the following are the classifications for Corruption?
_________ assumes the business will go on indefinitely in the future.
Which of the following is TRUE regarding accrual-basis accounting?
__________ may be defined as the offering, giving, receiving, or soliciting anything of value to influence an official act.
Assets that are long-lived and that differ from property, plant, and equipment that has been purchased outright or acquired under a capital lease are:
One of the simplest ways to justify unacceptable conduct and avoid guilt feelings is to invent a good reason for ________.
Which of the following is a method of identity theft prevention that is recommended for individuals?
Which of the following is NOT the reason why senior management will overstate business statements?
__________ can be defined as conduct detrimental to the organization and to the employee.
Which of the following is a recommended method for safeguarding an organization's proprietary information?
Which of the following search is used for unusually high incidence of returns and allowances scheme?
The essential elements of a ________ are an actual or constructive taking away of the goods or property of another without the consent and against the will of the owner and with a felonious intent.
Which of the following would be MOST INDICATIVE of loan fraud in a draw request submitted by a construction developer?
If the assets are intentionally purchased by the company but simply misappropriated by the fraudster, this is referred to as:
Which of the following is the MOST ACCURATE statement about the phases of procurements involving open and free competition among contractors?
The most common method of detection in corruption cases is:
A fraudster uses a victim’s name, government identification number, and birthdate to impersonate the victim and open a credit card account in the victim’s name. This scheme can BEST be described as:
A typical issue involving materiality and fraud would be:
Which of the following controls BEST describes the safeguards an organization implements to provide protection for computing resources by increasing security policies and awareness, conducting security audits and tests, and properly classifying data?
Asset misappropriation schemes were the “middle children” of the study; they were more common than fraudulent statements and more costly than corruption.
A person is said to be in ________ act, when the business which he transacts, or the money or property which he handles, is not for his own benefit, but for another person:
People commit financial statement fraud to:
Hannah is a manager at a financial institution. To safeguard the bank and its customers from electronic funds transfer (EFT) fraud, Hannah is implementing several preventive measures. Which of the following is NOT a measure Hannah should take to prevent EFT fraud?
A scheme is classified as a Conflict of Interest:
Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:
According to the recommended methodology for responding to cybersecurity incidents, which of the following activities should occur during the detection and analysis step?
The principal way to detect omitted credits from books of account is through:
Which of the following methods is NOT used to detect conflicts of interest?
The most basic skimming scheme occurs when:
Which of the following fraud schemes is MOST LIKELY to target members of a religious community?
Which of the following is NOT one of the information security goals that should be achieved to secure an e-commerce system for users and account holders?
Occupational fraud and abuse is a (an) __________ of doing business, in much the same way that we pay expenses for electricity, taxes, and wages.
By removing a tangible asset from the business (a debit), the books will be ___________ by the exact amount of the tangible asset misappropriated.
“Anticipate possible losses and omit potential profits”, this results in:
The difference between assets and liabilities is called:
Which of the following statements regarding financial statement disclosures is TRUE?
Which of the following is an example of a cash larceny scheme?
Which of the following ratios can be used to determine the efficiency with which a company uses its assets?
The _______________ cost method of pricing would carry an asset’s value on the financial statements as what it would currently cost, considering inflation.
Perceived certainty of detection is directly related to employee theft for respondents in all industry sectors, that is, the stronger the perception that theft would be detected, the more the likelihood that the employee would engage in deviant behavior.
Joe's automobile insurance policy expired in June. In August, Joe was involved in an automobile accident, and his vehicle was severely damaged. After the accident, Joe contacted his insurance company and reinstated the policy. In September, Joe then submitted a claim with a September accident date for the damages that occurred to his vehicle in August. Joe has engaged in which of the following insurance schemes?
Skimming is:
________, one of the synonyms for fraud, implies deceiving so thoroughly as to obscure the truth.
The behavior profile of employees who are involved in bribery schemes may include:
In which of the following process, all bidders are legally supposed to be placed on the same plane of equality, bidding on the same terms and conditions?
Which counts sometimes can give rise to inventory theft detection?
A client contacts Emma, a Certified Fraud Examiner (CFE), and explains that they prepaid a commission to a broker for help with obtaining a loan. However, after sending the payment for services, the client did not receive a response from the broker and is unable to contact them. This type of fraud is known as a(n):
Physical assets including _________ and ________ are the most commonly misappropriated noncash assets in our study.
Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?
A ____________ can be very costly for an organization to undertake, both in terms of money and time spent.
Which of the following is the amount of money that would be realized upon the sale of the asset at some point in the future, less the costs associated with owning, operating, and selling it?
Which of the following statements is TRUE regarding income statements?
In Cressey’s fraud triangle, its three legs are Opportunity, Pressure, and:
Which of the following is NOT the reason to bribe employees of the purchaser?
Which of the following scenarios is an example of an economic extortion scheme?