New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CFE-Financial-Transactions-and-Fraud-Schemes Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers

Questions 4

Which of the following are used in a short-term skimming scheme?

Options:

A.

Unrecorded sales, understated sales, and theft of incoming checks

B.

Unrecorded sales, understated sales, and dual endorsements

C.

False company accounts, understated sales, and theft of incoming checks

D.

Understated sales, theft of incoming checks, and check-for-currency substitutions

Buy Now
Questions 5

According to a survey, in principal perpetrator cases, males were the primary culprit in a majority of cases, accounting for ___ percent of frauds versus ___ percent for females.

Options:

A.

62 versus 36

B.

61 versus 39

C.

62 versus 37

D.

None of the above

Buy Now
Questions 6

White used a company vehicle for unauthorized, personal purposes while working in a different city. He provided false written and oral information regarding the use of the vehicle. The vehicle was returned without damages. What type of fraud did White commit?

Options:

A.

White did not commit fraud

B.

An expense reimbursement scheme

C.

A misuse of a noncash asset

D.

A financial statement fraud scheme

Buy Now
Questions 7

Which of the following statements is MOST ACCURATE regarding financial reporting practices and accounting frameworks, such as U.S. generally accepted accounting principles (GAAP) and International Financial Reporting Standards (IFRS)?

Options:

A.

The financial reporting practices that a publicly traded company must follow are determined by the company's jurisdiction.

B.

All publicly traded companies are required to adopt either U.S. GAAP or IFRS as their accounting framework.

C.

Organizations that conduct business internationally must adopt IFRS as their accounting framework for financial reporting.

D.

U.S. GAAP is a principle-based accounting framework, and IFRS is a rules-based accounting framework.

Buy Now
Questions 8

Which of the following is a red flag of a Ponzi scheme?

Options:

A.

There is pressure to take payouts rather than reinvest profits.

B.

The financial manager manages, administers, and retains custody of investment funds.

C.

The investment strategy is very easy to understand.

D.

A firm has a history of returns on investments that fluctuate based on market conditions.

Buy Now
Questions 9

Which of the following is an example of a technical security control that organizations can use to secure computer systems and communication networks?

Options:

A.

Application security

B.

Human audits

C.

Penetration testing

D.

Data security

Buy Now
Questions 10

Which of the following is the MOST ACCURATE statement about the different types of malware?

Options:

A.

Spyware is a software program with instructions executed every time a computer is turned on.

B.

A Trojan horse is a hidden program that displays advertisements while the computer is operating.

C.

A computer worm is a program that appears useful but monitors and logs keystrokes.

D.

Ransomware is malicious software that locks the operating system and restricts access to data files.

Buy Now
Questions 11

Not having any accounts receivable that are overdue is a common red flag of fictitious revenue schemes.

Options:

A.

True

B.

False

Buy Now
Questions 12

Inventory shrinkage is the unaccounted-for reduction in the company’s inventory that does not result from theft.

Options:

A.

True

B.

False

Buy Now
Questions 13

According to Marshall, ______ are probable future economic benefits obtained or controlled by a particular entity as a result of past transactions or events.

Options:

A.

Assets

B.

Liabilities

C.

Credentials

D.

None of the above

Buy Now
Questions 14

Fraud in financial statements generally takes the form of _______ assets or revenue and _______ liabilities and expenses.

Options:

A.

Understated; overstated

B.

Overstated; understated

C.

Overstated; overstated

D.

Understated; understated

Buy Now
Questions 15

An analytical review reveals that XYZ Company's cost of goods sold has increased by 75% in the last year. However, its sales revenues only increased by 25% during the same period. This situation MOST LIKELY indicates which of the following?

Options:

A.

The company started recording warranty liabilities.

B.

There were fewer sales this year compared to last year.

C.

There were more sales returns this year than in the prior year.

D.

Inventory has been depleted by theft.

Buy Now
Questions 16

According to Hollinger and Clark, for policy development, management must pay attention to:

Options:

A.

A clear understanding regarding theft behavior

B.

Enforcement of sanctions

C.

Both A & B

D.

Neither A nor B

Buy Now
Questions 17

Which of the following statements is TRUE regarding the prevention of inventory theft?

Options:

A.

The inventory requisition form should be completed by the same person who is responsible for incoming shipments.

B.

The purchasing supervisor should conduct the physical inventory count.

C.

Shipping documents should be prenumbered and controlled.

D.

The person who is responsible for shipping inventory should also be responsible for converting inventory to scrap.

Buy Now
Questions 18

Which of the following scenarios is an example of upcoding?

Options:

A.

Cindy receives payment in exchange for allowing an unnecessary surgical procedure to be completed on her that is then billed to her health care program

B.

Dr. Loomis uses three procedure codes when submitting a claim for a surgery that she performed that is supposed to be billed using one procedure code

C.

Landon inflates a medical bill that he wants to receive reimbursement for by misrepresenting the amount of the bill

D.

Dr. Raul advises a patient with a small fracture in her leg to use crutches, but he submits the claim using a code to indicate that he placed a cast on the patient

Buy Now
Questions 19

___________ allows the fraud examiner to inspect key attributes on a smaller portion (or sample) of those documents.

Options:

Buy Now
Questions 20

Skimming cases can more likely be detected by:

Options:

A.

Internal audits

B.

Accidents

C.

Internal controls

D.

Occupational frauds

Buy Now
Questions 21

Which of the following is a TRUE statement about counterfeit payment cards?

Options:

A.

The hologram on payment cards is relatively simple to reproduce.

B.

The production of counterfeit payment cards is too complicated for the use of high-speed printers.

C.

Counterfeit payment cards can be created with blank plastic cards.

D.

All of the above are true statements about counterfeit payment cards.

Buy Now
Questions 22

Which of the following would NOT be considered a conflict of interest?

Options:

A.

Harriet owns a significant amount of stock in a company she regularly buys her employer's office supplies from, but her employer is unaware of this fact.

B.

Robert works for Muir's Printing Services on weekdays and Winsted Café on weekends, but he does not tell either employer about the other job.

C.

Jennifer is on the board of directors of two companies that compete in the retail market, but she does not tell either company about her role at the other.

D.

Ernest hires his brother, John, to provide vending services to his employer's lunch areas, but he does not disclose their relationship.

Buy Now
Questions 23

Assets that are long-lived and that differ from property, plant, and equipment that has been purchased outright or acquired under a capital lease are:

Options:

A.

Tangible Assets

B.

Intangible Assets

C.

Forced Assets

D.

None of the above

Buy Now
Questions 24

A running count that records how much inventory should be on hand is referred to:

Options:

A.

Altered inventory

B.

Perpetual inventory

C.

Shrinking inventory

D.

Fictitious inventory

Buy Now
Questions 25

Depreciation is especially applicable when companies try to overvalue their assets and net worth; the lower their depreciation expense, the higher the company’s profits.

Options:

A.

True

B.

False

Buy Now
Questions 26

Bid-rigging scheme occurs when:

Options:

A.

An employee fraudulently assists a vendor in winning a contract through the competitive bidding process.

B.

An employee does not assist a vendor in winning a contract through the competitive bidding process.

C.

An employee once assists a vendor in winning a contract through a single competitive bidding process.

D.

An employee once assists a vendor in winning a contract through a single competitive bidding process.

Buy Now
Questions 27

Which of the following offender types are people who take the money and run away?

Options:

A.

Absconders

B.

Long-term violators

C.

Offender types

D.

None of the above

Buy Now
Questions 28

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:

Options:

A.

Human intelligence

B.

Baiting

C.

Scavenging

D.

Open-source intelligence

Buy Now
Questions 29

Which of the following is NOT a medium that commonly causes an organization's proprietary information to be compromised?

Options:

A.

Reports to company shareholders

B.

Documents that were shredded using a cross-cut shredder

C.

Speeches made by executives

D.

Information displayed at an employee's workstation

Buy Now
Questions 30

Which of the following must be present for a fraud to exist?

Options:

A.

A material false statement

B.

Knowledge that the statement was false when it was uttered

C.

Reliance on the false statement by the victim

D.

All of the above

Buy Now
Questions 31

Which of the following scenarios is an example of upcoding?

Options:

A.

Hope is diagnosed with an ear infection. Hope's doctor writes her a prescription for a name brand medication instead of prescribing a less expensive generic medication.

B.

Dr. Smith performed a hysterectomy on Roberta. Dr. Smith submits an insurance claim using three procedure codes instead of the single code normally used for a hysterectomy.

C.

Dr. Catz spends 15 minutes with a patient. She later submits a bill to the patient's insurance company using a code that corresponds to an office visit lasting 60 minutes.

D.

Steven receives medical services prior to his new insurance going into effect. Before submitting the claim, he changes the service date on his bill so that it will be covered by insurance.

Buy Now
Questions 32

In which of the following process, all bidders are legally supposed to be placed on the same plane of equality, bidding on the same terms and conditions?

Options:

A.

Bid-rigging

B.

Kickbacks

C.

Competitive bidding

D.

Bid solicitation

Buy Now
Questions 33

Which of the following is NOT a distinguishing characteristic of a Ponzi scheme?

Options:

A.

Participants believe that they are making a legitimate investment.

B.

Promoters of Ponzi schemes promise investors uncommonly high returns.

C.

Participants are paid based on the number of new investors that they recruit.

D.

Promoters of Ponzi schemes engage in minimal amounts of valid commerce or investments.

Buy Now
Questions 34

Which of the following is FALSE regarding electronic payment tampering?

Options:

A.

Positive pay is recommended for ACH transactions to ensure their legitimacy.

B.

ACH blocks allow account holders to notify their banks that ACH debits should not be allowed on specific accounts.

C.

The lack of physical evidence makes electronic payment tampering more difficult to detect than traditional check tampering.

D.

The individual who makes electronic payments on behalf of the company should also set ACH filters to ensure that only designated individuals are paid.

Buy Now
Questions 35

Which of the following fraud schemes is MOST LIKELY to target members of a religious community?

Options:

A.

Affinity fraud

B.

Social control fraud

C.

Bait and switch scheme

D.

Advance-fee scheme

Buy Now
Questions 36

Which of the following is a common red flag of a bid tailoring scheme?

Options:

A.

The procuring entity's request for bid submissions provides clear bid submission information.

B.

There are unusually narrow specifications for the type of goods being procured.

C.

The procuring entity rebids contracts because fewer than the minimum number of bids are received.

D.

Numerous bidders respond to the procuring entity's bid requests.

Buy Now
Questions 37

Which of the following ratios can be used to determine the efficiency with which a company uses its assets?

Options:

A.

Quick ratio

B.

Receivable turnover ratio

C.

Debt-to-equity ratio

D.

Asset turnover ratio

Buy Now
Questions 38

Larceny is the scheme in which an employee simply takes inventory from the company premises without attempting to conceal it in the books and records.

Options:

A.

True

B.

False

Buy Now
Questions 39

Revenue is recognized when it is:

Options:

A.

Realized and Earned

B.

Fictitious and Earned

C.

Realized and Evidenced

D.

All of the above

Buy Now
Questions 40

Which of the following is not a skimming scheme?

Options:

A.

Unrecorded sales

B.

Fraud & Cost

C.

Theft of checks through the mail

D.

Understated sales and receivables

Buy Now
Questions 41

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:

Options:

A.

Human intelligence

B.

Scavenging

C.

Baiting

D.

Open-source intelligence

Buy Now
Questions 42

Entering a sales total lower than the amount actually paid by the customer is called:

Options:

A.

Underrings a sale

B.

Recording a sale procedure

C.

Internal sales audits

D.

All of the above

Buy Now
Questions 43

Which of the following is the amount of money that would be realized upon the sale of the asset at some point in the future, less the costs associated with owning, operating, and selling it?

Options:

A.

Net realizable value

B.

Going concern

C.

Cost

D.

Fair value

Buy Now
Questions 44

Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?

Options:

A.

Requiring all fraud tips to be reported to employees' direct supervisors

B.

Combining the purchasing and payment functions within a single department

C.

Enforcing competitive bidding from potential vendors

D.

Using an external vendor to negotiate procurement contracts

Buy Now
Questions 45

A special scheme in which employees know their employer is seeking to purchase a certain asset and take advantage of the situation by purchasing the asset themselves is:

Options:

A.

Conflict of interest in sale

B.

Turnaround sale or flip

C.

Unauthorized sale

D.

Written sale of unique assets

Buy Now
Questions 46

Ada uses her mother’s government identification card to impersonate her mother and obtain health care for herself under her mother’s insurance benefits. Which type of patient health care fraud scheme is Ada MOST LIKELY committing?

Options:

A.

Misrepresentations fraud

B.

Fictitious claims fraud

C.

Third-party fraud

D.

Multiple claims fraud

Buy Now
Questions 47

Pilar had to purchase computer equipment for ABC Corporation, her employer. Pilar created a shell company, used the shell company to purchase used computer equipment, and then resold that equipment to ABC Corporation at an increased price. This is an example of a:

Options:

A.

Need recognition scheme

B.

Pay and return scheme

C.

Pass-through scheme

D.

Cash larceny scheme

Buy Now
Questions 48

A method for gaining unauthorized access to a computer system whereby the attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme is known as:

Options:

A.

IP spoofing

B.

Electronic piggybacking

C.

Packet sniffing

D.

Social engineering

Buy Now
Questions 49

Jorge, a Certified Fraud Examiner (CFE), is investigating a tip involving an accountant at a bank who allegedly adjusted the bank’s general ledger to conceal the theft of funds from a customer’s account. If Jorge finds evidence that proves the allegation, which of the following BEST describes the accountant’s scheme?

Options:

A.

Unauthorized withdrawal

B.

False accounting entry

C.

Moving money from inactive accounts

D.

Unauthorized disbursement of funds

Buy Now
Questions 50

Several people who work in real estate collude to obtain a loan for the construction of a residential building on a property that does not exist. The co-conspirators divide the proceeds among themselves and leave the lender with no collateral to seize when loan payments are not made. Which of the following BEST describes this scheme?

Options:

A.

Property flopping

B.

Air loan

C.

Phantom lien

D.

Daisy chain

Buy Now
Questions 51

Skimming is:

Options:

A.

The removal of cash from a victim entity prior to its entry in an accounting system.

B.

The addition of cash from a victim entity prior to its entry in an accounting system.

C.

The removal of cash from a victim entity after its entry in an accounting system.

D.

None of above

Buy Now
Questions 52

Which of the following is a red flag that might indicate that someone is attempting to commit insurance fraud?

Options:

A.

A claim is made soon after an insurance policy commences.

B.

The insured made one other insurance claim within the past five years.

C.

A burglary loss claim includes small electronic items and jewelry.

D.

A theft claim includes items that were purchased recently and the receipts.

Buy Now
Questions 53

Delivery has not occurred or services have not been rendered when:

Options:

A.

Until installation and customer testing and acceptance has occurred.

B.

A written order exists but contains a right of return.

C.

Both A & B

D.

Neither A nor B

Buy Now
Questions 54

Which of the following search is used for unusually high incidence of returns and allowances scheme?

Options:

A.

Allowances by vendors

B.

Disposals of allowances than reorders

C.

Returns and allowances

D.

None of the above

Buy Now
Questions 55

According to accounting principles, ________ and ________ should be recorded or matched in the same accounting period; failing to do so violates the matching principle of GAAP.

Options:

A.

Revenue and corresponding expenses

B.

Revenue and Income statement

C.

Income statement and Long-term contracts

D.

Capitalized expenses and Liabilities

Buy Now
Questions 56

Organizations that had external audits actually had higher median losses and longer-lasting fraud schemes than those organizations that were not audited.

Options:

A.

True

B.

False

Buy Now
Questions 57

A variation between the physical inventory and the perpetual inventory totals is called:

Options:

A.

Altered inventory

B.

Account receivable

C.

Shrinkage

D.

Write-offs

Buy Now
Questions 58

The _______________ cost method of pricing would carry an asset’s value on the financial statements as what it would currently cost, considering inflation.

Options:

Buy Now
Questions 59

The most basic skimming scheme occurs when:

Options:

A.

An employee sells goods or services to a customer, collects the customer’s payment, but makes no record of the sale.

B.

An employee buys goods or services from a customer, drops the customer’s payment, but makes no record of the purchase.

C.

An employee sells goods or services to a stakeholder, collects the stakeholder’s payment and makes record of the sale too.

D.

An employee buys goods or services from a stakeholder, drops the stakeholder’s payment and makes record of the purchase too.

Buy Now
Questions 60

___________ is to allow the owner, investors, creditors, and others with an interest to know the appropriate book worth of the business at a particular date.

Options:

A.

Equity

B.

Balance sheet

C.

Income statement

D.

Financial record

Buy Now
Questions 61

Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?

Options:

A.

Pharming is the practice of changing a victim's email or mailing address so that the identity thief receives the victim's mail.

B.

Dumpster diving involves searching for sensitive personal information on used computers that have been purchased from a reseller.

C.

Shoulder surfing is the practice of exploiting another person's access capability to gain access to restricted areas.

D.

Baiting involves leaving flash drives or similar items that have been infected with malware in places where people are likely to find them.

Buy Now
Questions 62

Which of the following scenarios is the MOST ACCURATE example of insurer health care fraud?

Options:

A.

While acting as an intermediary for a government health care program, the insurance company verifies provider claims before billing the government for them.

B.

To obtain regulatory approval for increasing its rates, the insurance company submits inflated cost data for review.

C.

After negotiating discounts with its medical providers, the insurance company provides the negotiated rate to its consumers instead of the original amount.

D.

Upon identifying that a claimant has provided incomplete information, the insurance company refuses to pay a claim.

Buy Now
Questions 63

Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail and recording the receipt of payments.

Options:

A.

Single employee

B.

Two employees

C.

More than two employees

D.

None of the above

Buy Now
Questions 64

Larceny by fraud or deception means that:

Options:

A.

Creates or reinforces a false impression

B.

Fails to correct a false impression

C.

Fails to disclose a known lien, adverse claim, or other legal impediment

D.

All of the above

Buy Now
Questions 65

Which of the following is NOT a red flag of register disbursement schemes?

Options:

A.

There are gaps in the transaction numbers on the register log.

B.

Personal checks from cashiers are found in the cash register.

C.

Voids just over the review limit have been approved by a supervisor.

D.

Cashiers are authorized to void their own transactions.

Buy Now
Questions 66

If the assets are intentionally purchased by the company but simply misappropriated by the fraudster, this is referred to as:

Options:

A.

Inventory larceny scheme

B.

Asset receiving scheme

C.

Fraudulent purchase

D.

Falsify shipping

Buy Now
Questions 67

__________ is required if and when officers, executives, or other persons in trusted positions become subjects of a criminal indictment.

Options:

A.

Conflict of interest

B.

Turnaround sale or flip

C.

Disclosure

D.

Resource diversion

Buy Now
Questions 68

Baker, an employee of ABC Corporation, was the only employee who had control of the purchasing function for his department. Baker authorized the purchase of supplies that ABC did not need and used these supplies to make improvements to his house. This is an example of what kind of fraud?

Options:

A.

Pay and return scheme

B.

Personal purchases with company funds

C.

Pass-through scheme

D.

Theft of inventory

Buy Now
Questions 69

Which of the following is NOT the aspect of inventory purchase?

Options:

A.

Inventory purchases purposely increase in year 1 only to be liquidated in year 2.

B.

Inventory for year 2 will be much greater than year 1.

C.

Increased sales in year 2 are unexpected and purchase of inventory does not keep pace with the sales.

D.

Might be some fraud scheme in inventory.

Buy Now
Questions 70

Which of the following is a recommended method for safeguarding an organization's proprietary information?

Options:

A.

Changing locks and reprogramming door access codes every three to five years

B.

Classifying data into security access levels based on the number of years that employees have worked for the company

C.

Educating employees about nondisclosure agreements when they are hired and during exit interviews

D.

Requiring employees to make notes and keep drafts related to confidential projects

Buy Now
Exam Name: Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam
Last Update: Dec 18, 2025
Questions: 235

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CFE-Financial-Transactions-and-Fraud-Schemes testing engine

PDF (Q&A)

$43.57  $124.49
buy now CFE-Financial-Transactions-and-Fraud-Schemes pdf