CFE-Financial-Transactions-and-Fraud-Schemes Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers
Which of the following is a reason why prepaid debit and gift card fraud schemes are appealing to fraudsters?
Which of the following would NOT be helpful in preventing expense reimbursement schemes?
Which of the following controls BEST describes the safeguards an organization implements to provide protection for computing resources by increasing security policies and awareness, conducting security audits and tests, and properly classifying data?
Jonathan, a Certified Fraud Examiner (CFE), is tasked with identifying potential indicators of intrusion into his employer ' s computer network. Which of the following might indicate that the organization ' s network has been compromised or accessed without authorization?
Depreciation is especially applicable when companies try to overvalue their assets and net worth; the lower their depreciation expense, the higher the company’s profits.
Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?
Not having any accounts receivable that are overdue is a common red flag of fictitious revenue schemes.
__________ is required if and when officers, executives, or other persons in trusted positions become subjects of a criminal indictment.
Occupational fraud and abuse is a (an) __________ of doing business, in much the same way that we pay expenses for electricity, taxes, and wages.
The behavior profile of employees who are involved in bribery schemes may include:
Which of the following is NOT a method for stealing inventory and other assets?
By what accountant means that the financial figures presented by the company are at least as much as reflected in the statements, if not more.
Which of the following scenarios is an example of an economic extortion scheme?
Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp’s business to Oak Company. In exchange for receiving additional business, Oak Company’s sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?
According to SAB 104, for revenue to be considered realized or realizable and earned, which of the following criteria is NOT met?
George, a 71-year-old man, receives a fraudulent message on his computer stating that his computer has been infected by a virus. When George calls the phone number listed on the message, he speaks with a fraudster who charges him for computer repair services that are unnecessary. George has MOST LIKELY been victimized by which of the following schemes?
Asset misappropriations have an effect on the liabilities and do also have an indirect effect on the equity account.
Which of the following is NOT a justifiable reason to depart from generally accepted accounting principles (GAAP)?
Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp ' s business to Oak Company. In exchange for receiving additional business, Oak Company ' s sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?
Placing any restriction in the solicitation documents that tend to restrict competition is called prebid solicitation.
The person or persons who have access to __________ are often the targets of unethical vendors seeking an advantage in the process.
Which of the following is a method that a fraudster might use to conceal inventory shrinkage?
Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK ' s clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina ' s approach is an example of:
Which of the following is a recommended method for safeguarding an organization ' s proprietary information?
_____________ involves purposeful misreporting of financial information about the organization that is intended to mislead those who read it.
All the following are basic methods used to prove corrupt payments in corruption schemes EXCEPT:
Which of the following statements is MOST ACCURATE regarding the methods used for making corrupt payments in corruption schemes?
In which approach do fraudsters produce whatever financial statements they wish, perhaps using just a typewriter or a personal computer?
Which of the following is the MOST APPROPRIATE technique for detecting a nonconforming goods or services scheme?
Which of the following is an example of a technical security control that organizations can use to secure computer systems and communication networks?
Employees steal an incoming payment and then place the incoming funds in an interest-bearing account for:
Which of the following statements regarding financial statement disclosures is TRUE?
Which of the following statements is TRUE regarding the prevention of inventory theft?
Which of the following is the MOST ACCURATE statement about the different types of malware?
A method for gaining unauthorized access to a computer system whereby the attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme is known as:
To detect fraud committed by a health care provider, a fraud examiner should look for which of the following red flags?
Which of the following is NOT a standard of generally accepted accounting principles (GAAP)?
According to a survey, in principal perpetrator cases, males were the primary culprit in a majority of cases, accounting for ___ percent of frauds versus ___ percent for females.
Employees with the authority to grant discounts in order to skim revenues may use which authority?
In the fraud scale, pressure, opportunity, and integrity variables all result in a list of ___ possible red flags or indicators of occupational fraud and abuse.
The _______________ cost method of pricing would carry an asset’s value on the financial statements as what it would currently cost, considering inflation.
Which of the following is a recommended activity that organizations should engage in to protect their proprietary information from threats?
The essential elements of a ________ are an actual or constructive taking away of the goods or property of another without the consent and against the will of the owner and with a felonious intent.
Which of the following methods would NOT be helpful in detecting a skimming scheme?
Another way to eliminate competition in the solicitation phase of the selection process is to:
Joe ' s automobile insurance policy expired in June. In August, Joe was involved in an automobile accident, and his vehicle was severely damaged. After the accident, Joe contacted his insurance company and reinstated the policy. In September, Joe then submitted a claim with a September accident date for the damages that occurred to his vehicle in August. Joe has engaged in which of the following insurance schemes?
When an incorrect total is carried from the journal to the ledger or from the ledger to the financial statements, this method is called:
