New Year Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ACFE CFE-Financial-Transactions-and-Fraud-Schemes Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Exam Practice Test

Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers

Question 1

Which of the following statements is MOST ACCURATE regarding financial reporting practices and accounting frameworks, such as U.S. generally accepted accounting principles (GAAP) and International Financial Reporting Standards (IFRS)?

Options:

A.

The financial reporting practices that a publicly traded company must follow are determined by the company's jurisdiction.

B.

All publicly traded companies are required to adopt either U.S. GAAP or IFRS as their accounting framework.

C.

Organizations that conduct business internationally must adopt IFRS as their accounting framework for financial reporting.

D.

U.S. GAAP is a principle-based accounting framework, and IFRS is a rules-based accounting framework.

Question 2

Once the expense account is closed, it becomes a historical item and probably will never be reviewed again.

Options:

A.

True

B.

False

Question 3

Forced reconciliation of the account says:

Options:

A.

To conceal shrinkage is to alter inventory record so that it matches the physical inventory count.

B.

To conceal inventory is to alter shrinkage record so that it matches the physical inventory count.

C.

To conceal shrinkage is to change the perpetual inventory record so that it matches the physical inventory count.

D.

To conceal write-offs is to change the perpetual inventory record so that it matches the physical inventory count.

Question 4

Which of the following is NOT a distinguishing characteristic of a Ponzi scheme?

Options:

A.

Participants believe that they are making a legitimate investment.

B.

Promoters of Ponzi schemes promise investors uncommonly high returns.

C.

Participants are paid based on the number of new investors that they recruit.

D.

Promoters of Ponzi schemes engage in minimal amounts of valid commerce or investments.

Question 5

Which of the following is true for red flags associated with fictitious revenues?

Options:

A.

Slow growth or unusual profitability, when not compared to other companies in the same industry.

B.

Unusual growth in the number of days’ purchases in receivables.

C.

A significant volume of sales to entities whose substance and ownership is not known.

D.

An unusual surge in purchases by a majority of units within a company, or of purchases recorded by corporate headquarters.

Question 6

Which of the following is a method that a fraudster might use to conceal inventory shrinkage?

Options:

A.

Selling merchandise without recording the sale

B.

Writing off stolen inventory as scrap

C.

Falsely increasing the perpetual inventory record

D.

All of the above

Question 7

The amount of cash on hand in a register may be compared to the amount showing in the register tape in order to detect _______.

Options:

A.

Employee theft

B.

Recorded sales

C.

Internal audits

D.

Occupational frauds

Question 8

Which of the following is a red flag of a Ponzi scheme?

Options:

A.

There is pressure to take payouts rather than reinvest profits.

B.

The financial manager manages, administers, and retains custody of investment funds.

C.

The investment strategy is very easy to understand.

D.

A firm has a history of returns on investments that fluctuate based on market conditions.

Question 9

Bid-rigging scheme occurs when:

Options:

A.

An employee fraudulently assists a vendor in winning a contract through the competitive bidding process.

B.

An employee does not assist a vendor in winning a contract through the competitive bidding process.

C.

An employee once assists a vendor in winning a contract through a single competitive bidding process.

D.

An employee once assists a vendor in winning a contract through a single competitive bidding process.

Question 10

Which of the following is FALSE regarding electronic payment tampering?

Options:

A.

Positive pay is recommended for ACH transactions to ensure their legitimacy.

B.

ACH blocks allow account holders to notify their banks that ACH debits should not be allowed on specific accounts.

C.

The lack of physical evidence makes electronic payment tampering more difficult to detect than traditional check tampering.

D.

The individual who makes electronic payments on behalf of the company should also set ACH filters to ensure that only designated individuals are paid.

Question 11

A ____________ can be very costly for an organization to undertake, both in terms of money and time spent.

Options:

Question 12

Collusion or bid-rigging between bidders is called

Options:

A.

Bribery receipt

B.

Bid solicitation

C.

To withdraw low bids

D.

Contract acceptance

Question 13

If the assets are intentionally purchased by the company but simply misappropriated by the fraudster, this is referred to as:

Options:

A.

Inventory larceny scheme

B.

Asset receiving scheme

C.

Fraudulent purchase

D.

Falsify shipping

Question 14

Which of the following is NOT an example of bribery prevention policies?

Options:

A.

Reporting gifts

B.

Discounts

C.

Business meetings

D.

Resource diversions

Question 15

Every bribe is a two-sided transaction, in which where a vendor bribes a purchaser, there is someone on the vendor’s side of the transaction who is not making an illicit payment.

Options:

A.

True

B.

False

Question 16

________ increase assets and expenses and/or decrease liabilities and/or equity.

Options:

A.

Journal Entries

B.

Debit

C.

Credit

D.

None of all

Question 17

Which of the following statements describes a best practice for preventing contract and procurement fraud?

Options:

A.

Companies should conduct background checks on all vendors before they are added to the vendor master file.

B.

Companies should have vendor-monitoring procedures that address the red flags of all vendor schemes.

C.

Companies should permit the person who maintains the vendor master file to also have authority to approve payments for invoices.

D.

Companies should restrict the monitoring of their procurement activities to once a year to ensure comparability from year to year.

Question 18

The excess credits (or debits) on the income statement are used to decrease (or increase) the equity account.

Options:

A.

True

B.

False

Question 19

Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail and recording the receipt of payments.

Options:

A.

Single employee

B.

Two employees

C.

More than two employees

D.

None of the above

Question 20

Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?

Options:

A.

Pharming is the practice of changing a victim's email or mailing address so that the identity thief receives the victim's mail.

B.

Dumpster diving involves searching for sensitive personal information on used computers that have been purchased from a reseller.

C.

Shoulder surfing is the practice of exploiting another person's access capability to gain access to restricted areas.

D.

Baiting involves leaving flash drives or similar items that have been infected with malware in places where people are likely to find them.

Question 21

In which phase of the competitive bidding process do fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?

Options:

A.

Need recognition

B.

Solicitation

C.

False specification

D.

Submission

Question 22

Several people who work in real estate collude to obtain a loan for the construction of a residential building on a property that does not exist. The co-conspirators divide the proceeds among themselves and leave the lender with no collateral to seize when loan payments are not made. Which of the following BEST describes this scheme?

Options:

A.

Property flopping

B.

Air loan

C.

Phantom lien

D.

Daisy chain

Question 23

Fraud in financial statements generally takes the form of _______ assets or revenue and _______ liabilities and expenses.

Options:

A.

Understated; overstated

B.

Overstated; understated

C.

Overstated; overstated

D.

Understated; understated

Question 24

Which of the following is NOT the reason to bribe employees of the purchaser?

Options:

A.

To ensure receipt of a late bid

B.

To extend the bid opening date

C.

To ensure bid-splitting

D.

To falsify the bid log

Question 25

Which of the following is a method of identity theft prevention that is recommended for individuals?

Options:

A.

Do not reuse passwords for more than two accounts.

B.

Install security updates and patches for personal computers annually.

C.

Only use email to send personal information when contacting reputable organizations.

D.

Use biometric authentication when it is available.

Question 26

A journal in which all sales made on credit or cash are listed is:

Options:

A.

Disbursement journal

B.

Accounts receivable journal

C.

Accounts payable journal

D.

General journal

Question 27

Which of the following scenarios is an example of upcoding?

Options:

A.

Hope is diagnosed with an ear infection. Hope's doctor writes her a prescription for a name brand medication instead of prescribing a less expensive generic medication.

B.

Dr. Smith performed a hysterectomy on Roberta. Dr. Smith submits an insurance claim using three procedure codes instead of the single code normally used for a hysterectomy.

C.

Dr. Catz spends 15 minutes with a patient. She later submits a bill to the patient's insurance company using a code that corresponds to an office visit lasting 60 minutes.

D.

Steven receives medical services prior to his new insurance going into effect. Before submitting the claim, he changes the service date on his bill so that it will be covered by insurance.

Question 28

Which of the following is NOT one of the information security goals that should be achieved to secure an e-commerce system for users and account holders?

Options:

A.

Availability of data

B.

Accuracy of data

C.

Authentication

D.

Non-repudiation

Question 29

Financial statement fraud is committed by:

Options:

A.

Organized criminals

B.

Mid and lower-level employees

C.

Senior Management

D.

All of the above

Question 30

Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?

Options:

A.

Restricting other employees from performing the duties of an absent employee

B.

Assigning the duties of depositing cash receipts and performing bank reconciliations to different employees

C.

Having all employees use the same cash register for their transactions

D.

Keeping employees unaware that the company performs surprise cash counts

Question 31

One of the simplest ways to justify unacceptable conduct and avoid guilt feelings is to invent a good reason for ________.

Options:

Question 32

Which counts sometimes can give rise to inventory theft detection?

Options:

A.

Perpetual inventory counts

B.

Physical inventory counts

C.

Concealment inventory counts

D.

None of the above

Question 33

A person is said to be in ________ act, when the business which he transacts, or the money or property which he handles, is not for his own benefit, but for another person:

Options:

A.

Fiduciary Capacity

B.

Embezzlement

C.

Conversion

D.

None of the above

Question 34

Accounting records are designed to be kept on subjective rather than objective evidence.

Options:

A.

True

B.

False

Question 35

According to a survey, in principal perpetrator cases, males were the primary culprit in a majority of cases, accounting for ___ percent of frauds versus ___ percent for females.

Options:

A.

62 versus 36

B.

61 versus 39

C.

62 versus 37

D.

None of the above

Question 36

Employees with the authority to grant discounts in order to skim revenues may use which authority?

Options:

A.

False discounts

B.

Recording a discount on sale procedure

C.

Internal discount sales audits

D.

None of the above

Question 37

Which of the following is a condition that facilitates insider cyberfraud?

Options:

A.

Access logs are not reviewed by management.

B.

Production programs are run during the business day.

C.

Access privileges are restricted to assigned job functions.

D.

Separation of duties exists in the data center.

Question 38

Any expenses that are incurred but not paid by the end of the year are counted in our records of profit and loss, and are called:

Options:

A.

Accruals

B.

Depreciations

C.

Expenses

D.

Financial record

Question 39

An analytical review reveals that XYZ Company's cost of goods sold has increased by 75% in the last year. However, its sales revenues only increased by 25% during the same period. This situation MOST LIKELY indicates which of the following?

Options:

A.

The company started recording warranty liabilities.

B.

There were fewer sales this year compared to last year.

C.

There were more sales returns this year than in the prior year.

D.

Inventory has been depleted by theft.

Question 40

The behavior profile of employees who are involved in bribery schemes may include:

Options:

A.

Gambling habit

B.

Extravagant lifestyle

C.

Drug and/or alcohol addiction

D.

All of the above

Question 41

Which of the following is NOT a phase of the bidding process?

Options:

A.

Presolicitation

B.

Postsolicitation

C.

Solicitation

D.

Submission

Question 42

__________ are the amounts which are owed to other entities:

Options:

A.

Supplies

B.

Expenses

C.

Assets

D.

Liabilities

Question 43

Which of the following can constitute a bribe, even if the illicit payment is never actually made?

Options:

A.

Offering a payment

B.

Corruption in payment

C.

Kickback payment

D.

Overbilling in payment

Question 44

When expenses used to produce income—all of them—should be matched in a consistent manner against that income, this is referred to:

Options:

A.

Equity

B.

Accrual basis accounting

C.

Expense

D.

Financial record

Question 45

Which of the following is a method of identity theft prevention that is recommended for businesses?

Options:

A.

Use government identification numbers as employee identification numbers

B.

Audit practices involving the handling of information only when regulators require it

C.

Use encryption only when sending personal information externally through a hardwired internet connection

D.

Collect government identification numbers from customers only when legally required to gather that information

Question 46

The person or persons who have access to __________ are often the targets of unethical vendors seeking an advantage in the process.

Options:

A.

Bid-splitting

B.

Sealed bids

C.

General purchasing

D.

Tailor specifications

Question 47

Which of the following is NOT a justifiable reason to depart from generally accepted accounting principles (GAAP)?

Options:

A.

The expected costs associated with following GAAP would exceed the expected benefits of compliance.

B.

It is likely that assets would be understated and liabilities would be overstated.

C.

A transaction is considered immaterial and therefore irrelevant to the accurate interpretation of financial statements.

D.

The application of GAAP could produce misleading financial statements.

Question 48

White used a company vehicle for unauthorized, personal purposes while working in a different city. He provided false written and oral information regarding the use of the vehicle. The vehicle was returned without damages. What type of fraud did White commit?

Options:

A.

White did not commit fraud

B.

An expense reimbursement scheme

C.

A misuse of a noncash asset

D.

A financial statement fraud scheme

Question 49

A scheme is classified as a Conflict of Interest:

Options:

A.

when an employee must have some kind of ownership or employment interest in the vendor submitting the invoice.

B.

when a salesman must have some kind of ownership or employment interest in the vendor submitting the sales.

C.

when a purchaser must have some kind of ownership or employment interest in the vendor submitting the purchase.

D.

when a dealer must have some kind of dealership interest in the vendor submitting the stock.

Question 50

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:

Options:

A.

Human intelligence

B.

Scavenging

C.

Baiting

D.

Open-source intelligence

Question 51

Which of the following ratios can be used to determine the efficiency with which a company uses its assets?

Options:

A.

Quick ratio

B.

Receivable turnover ratio

C.

Debt-to-equity ratio

D.

Asset turnover ratio

Question 52

The essential elements of a ________ are an actual or constructive taking away of the goods or property of another without the consent and against the will of the owner and with a felonious intent.

Options:

A.

Larceny

B.

Abuse

C.

Fiduciary

D.

None of the above

Question 53

____________ corrupt employees can cause inventory to be fraudulently delivered to themselves or accomplices.

Options:

A.

False shipping slip

B.

False packing slip

C.

Fraudulent inventory slip

D.

False credit slip

Question 54

Which of the following is a recommended method for safeguarding an organization's proprietary information?

Options:

A.

Changing locks and reprogramming door access codes every three to five years

B.

Classifying data into security access levels based on the number of years that employees have worked for the company

C.

Educating employees about nondisclosure agreements when they are hired and during exit interviews

D.

Requiring employees to make notes and keep drafts related to confidential projects

Question 55

The principal way to detect omitted credits from books of account is through:

Options:

A.

Forced Balance

B.

Trend analysis

C.

Expense account

D.

None of all

Question 56

Which of the following statements regarding financial statement disclosures is TRUE?

Options:

A.

Events occurring after the close of the reporting period that might significantly affect the financial statements do not need to be disclosed.

B.

Management must disclose potential losses from ongoing litigation even when it is unlikely that the related liability will result in a future obligation.

C.

All information relating to the company must be disclosed in the financial statements, regardless of materiality.

D.

Changes in accounting principles must be disclosed in the financial statements.

Question 57

Conflict of interest cases are more easily prevented than detected.

Options:

A.

True

B.

False

Question 58

When a victim company purchases unnecessary goods or services from a supplier at the direction of the corrupt employee, this results in:

Options:

A.

Presolicitation scheme

B.

Need recognition scheme

C.

False sole-source scheme

D.

Submission scheme

Question 59

A client contacts Emma, a Certified Fraud Examiner (CFE), and explains that they prepaid a commission to a broker for help with obtaining a loan. However, after sending the payment for services, the client did not receive a response from the broker and is unable to contact them. This type of fraud is known as a(n):

Options:

A.

Bait and switch scheme

B.

Advance-fee scheme

C.

Split deposit scheme

D.

Scavenger scheme

Question 60

Which of the following scenarios is an example of upcoding?

Options:

A.

Cindy receives payment in exchange for allowing an unnecessary surgical procedure to be completed on her that is then billed to her health care program

B.

Dr. Loomis uses three procedure codes when submitting a claim for a surgery that she performed that is supposed to be billed using one procedure code

C.

Landon inflates a medical bill that he wants to receive reimbursement for by misrepresenting the amount of the bill

D.

Dr. Raul advises a patient with a small fracture in her leg to use crutches, but he submits the claim using a code to indicate that he placed a cast on the patient

Question 61

Which of the following is NOT the aspect of inventory purchase?

Options:

A.

Inventory purchases purposely increase in year 1 only to be liquidated in year 2.

B.

Inventory for year 2 will be much greater than year 1.

C.

Increased sales in year 2 are unexpected and purchase of inventory does not keep pace with the sales.

D.

Might be some fraud scheme in inventory.

Question 62

A running count that records how much inventory should be on hand is referred to:

Options:

A.

Altered inventory

B.

Perpetual inventory

C.

Shrinking inventory

D.

Fictitious inventory

Question 63

George, a 71-year-old man, receives a fraudulent message on his computer stating that his computer has been infected by a virus. When George calls the phone number listed on the message, he speaks with a fraudster who charges him for computer repair services that are unnecessary. George has MOST LIKELY been victimized by which of the following schemes?

Options:

A.

Pharming

B.

Bait and switch scheme

C.

Tech-support scheme

D.

Smishing

Question 64

When situational pressures and perceived opportunities are low and personal integrity is high, occupational fraud is much more likely to occur than when the opposite is true.

Options:

A.

True

B.

False

Question 65

Which of the following is the criterion for bid solicitation?

Options:

A.

Containing false statements

B.

Allowing the purchaser to discuss possible employment with the contractor

C.

To withdraw low bids

D.

To falsify the bid log

Question 66

Perceived certainty of detection is directly related to employee theft for respondents in all industry sectors, that is, the stronger the perception that theft would be detected, the more the likelihood that the employee would engage in deviant behavior.

Options:

A.

True

B.

False

Question 67

Which of the following is a common way that dishonest contractors collude to evade the competitive bidding process?

Options:

A.

Arranging an agreement with competitors to divide and allocate markets

B.

Submitting bids on fake contracts to give the appearance of genuine competition

C.

Using different publications to publish their bid solicitations

D.

Submitting invoices for work that was not performed on joint projects

Question 68

Larceny is the scheme in which an employee simply takes inventory from the company premises without attempting to conceal it in the books and records.

Options:

A.

True

B.

False

Question 69

Which of the following scenarios describes a card skimming or shimming scheme?

Options:

A.

After processing a customer's payment, a server returns with the receipt but keeps the payment card hoping that the customer does not notice.

B.

An imitation website is created to deceive users into providing their payment card information.

C.

While processing a payment concealed from the customer's view, a retail employee uses a small device to scan and record the customer's payment card information.

D.

None of the above.

Question 70

Which of the following scenarios is an example of an economic extortion scheme?

Options:

A.

A purchasing employee and vendor agree to bill the company for services that were not provided.

B.

A government official demands money in exchange for awarding a contract to a vendor.

C.

An employee receives a payment for directing excess business to a vendor.

D.

A vendor rewards a purchasing employee with a free trip after the employee directs business to the vendor.