ACFE CFE-Financial-Transactions-and-Fraud-Schemes Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Exam Practice Test
Total 235 questions
Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers
Which of the following statements is MOST ACCURATE regarding financial reporting practices and accounting frameworks, such as U.S. generally accepted accounting principles (GAAP) and International Financial Reporting Standards (IFRS)?
Once the expense account is closed, it becomes a historical item and probably will never be reviewed again.
Forced reconciliation of the account says:
Which of the following is NOT a distinguishing characteristic of a Ponzi scheme?
Which of the following is true for red flags associated with fictitious revenues?
Which of the following is a method that a fraudster might use to conceal inventory shrinkage?
The amount of cash on hand in a register may be compared to the amount showing in the register tape in order to detect _______.
Which of the following is a red flag of a Ponzi scheme?
Bid-rigging scheme occurs when:
Which of the following is FALSE regarding electronic payment tampering?
A ____________ can be very costly for an organization to undertake, both in terms of money and time spent.
Collusion or bid-rigging between bidders is called
If the assets are intentionally purchased by the company but simply misappropriated by the fraudster, this is referred to as:
Which of the following is NOT an example of bribery prevention policies?
Every bribe is a two-sided transaction, in which where a vendor bribes a purchaser, there is someone on the vendor’s side of the transaction who is not making an illicit payment.
________ increase assets and expenses and/or decrease liabilities and/or equity.
Which of the following statements describes a best practice for preventing contract and procurement fraud?
The excess credits (or debits) on the income statement are used to decrease (or increase) the equity account.
Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail and recording the receipt of payments.
Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?
In which phase of the competitive bidding process do fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?
Several people who work in real estate collude to obtain a loan for the construction of a residential building on a property that does not exist. The co-conspirators divide the proceeds among themselves and leave the lender with no collateral to seize when loan payments are not made. Which of the following BEST describes this scheme?
Fraud in financial statements generally takes the form of _______ assets or revenue and _______ liabilities and expenses.
Which of the following is NOT the reason to bribe employees of the purchaser?
Which of the following is a method of identity theft prevention that is recommended for individuals?
A journal in which all sales made on credit or cash are listed is:
Which of the following scenarios is an example of upcoding?
Which of the following is NOT one of the information security goals that should be achieved to secure an e-commerce system for users and account holders?
Financial statement fraud is committed by:
Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?
One of the simplest ways to justify unacceptable conduct and avoid guilt feelings is to invent a good reason for ________.
Which counts sometimes can give rise to inventory theft detection?
A person is said to be in ________ act, when the business which he transacts, or the money or property which he handles, is not for his own benefit, but for another person:
Accounting records are designed to be kept on subjective rather than objective evidence.
According to a survey, in principal perpetrator cases, males were the primary culprit in a majority of cases, accounting for ___ percent of frauds versus ___ percent for females.
Employees with the authority to grant discounts in order to skim revenues may use which authority?
Which of the following is a condition that facilitates insider cyberfraud?
Any expenses that are incurred but not paid by the end of the year are counted in our records of profit and loss, and are called:
An analytical review reveals that XYZ Company's cost of goods sold has increased by 75% in the last year. However, its sales revenues only increased by 25% during the same period. This situation MOST LIKELY indicates which of the following?
The behavior profile of employees who are involved in bribery schemes may include:
Which of the following is NOT a phase of the bidding process?
__________ are the amounts which are owed to other entities:
Which of the following can constitute a bribe, even if the illicit payment is never actually made?
When expenses used to produce income—all of them—should be matched in a consistent manner against that income, this is referred to:
Which of the following is a method of identity theft prevention that is recommended for businesses?
The person or persons who have access to __________ are often the targets of unethical vendors seeking an advantage in the process.
Which of the following is NOT a justifiable reason to depart from generally accepted accounting principles (GAAP)?
White used a company vehicle for unauthorized, personal purposes while working in a different city. He provided false written and oral information regarding the use of the vehicle. The vehicle was returned without damages. What type of fraud did White commit?
A scheme is classified as a Conflict of Interest:
Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:
Which of the following ratios can be used to determine the efficiency with which a company uses its assets?
The essential elements of a ________ are an actual or constructive taking away of the goods or property of another without the consent and against the will of the owner and with a felonious intent.
____________ corrupt employees can cause inventory to be fraudulently delivered to themselves or accomplices.
Which of the following is a recommended method for safeguarding an organization's proprietary information?
The principal way to detect omitted credits from books of account is through:
Which of the following statements regarding financial statement disclosures is TRUE?
Conflict of interest cases are more easily prevented than detected.
When a victim company purchases unnecessary goods or services from a supplier at the direction of the corrupt employee, this results in:
A client contacts Emma, a Certified Fraud Examiner (CFE), and explains that they prepaid a commission to a broker for help with obtaining a loan. However, after sending the payment for services, the client did not receive a response from the broker and is unable to contact them. This type of fraud is known as a(n):
Which of the following scenarios is an example of upcoding?
Which of the following is NOT the aspect of inventory purchase?
A running count that records how much inventory should be on hand is referred to:
George, a 71-year-old man, receives a fraudulent message on his computer stating that his computer has been infected by a virus. When George calls the phone number listed on the message, he speaks with a fraudster who charges him for computer repair services that are unnecessary. George has MOST LIKELY been victimized by which of the following schemes?
When situational pressures and perceived opportunities are low and personal integrity is high, occupational fraud is much more likely to occur than when the opposite is true.
Which of the following is the criterion for bid solicitation?
Perceived certainty of detection is directly related to employee theft for respondents in all industry sectors, that is, the stronger the perception that theft would be detected, the more the likelihood that the employee would engage in deviant behavior.
Which of the following is a common way that dishonest contractors collude to evade the competitive bidding process?
Larceny is the scheme in which an employee simply takes inventory from the company premises without attempting to conceal it in the books and records.
Which of the following scenarios describes a card skimming or shimming scheme?
Which of the following scenarios is an example of an economic extortion scheme?
Total 235 questions