According to a survey, in principal perpetrator cases, males were the primary culprit in a majority of cases, accounting for ___ percent of frauds versus ___ percent for females.
White used a company vehicle for unauthorized, personal purposes while working in a different city. He provided false written and oral information regarding the use of the vehicle. The vehicle was returned without damages. What type of fraud did White commit?
Which of the following statements is MOST ACCURATE regarding financial reporting practices and accounting frameworks, such as U.S. generally accepted accounting principles (GAAP) and International Financial Reporting Standards (IFRS)?
Which of the following is an example of a technical security control that organizations can use to secure computer systems and communication networks?
Which of the following is the MOST ACCURATE statement about the different types of malware?
Not having any accounts receivable that are overdue is a common red flag of fictitious revenue schemes.
Inventory shrinkage is the unaccounted-for reduction in the company’s inventory that does not result from theft.
According to Marshall, ______ are probable future economic benefits obtained or controlled by a particular entity as a result of past transactions or events.
Fraud in financial statements generally takes the form of _______ assets or revenue and _______ liabilities and expenses.
An analytical review reveals that XYZ Company's cost of goods sold has increased by 75% in the last year. However, its sales revenues only increased by 25% during the same period. This situation MOST LIKELY indicates which of the following?
According to Hollinger and Clark, for policy development, management must pay attention to:
Which of the following statements is TRUE regarding the prevention of inventory theft?
___________ allows the fraud examiner to inspect key attributes on a smaller portion (or sample) of those documents.
Assets that are long-lived and that differ from property, plant, and equipment that has been purchased outright or acquired under a capital lease are:
A running count that records how much inventory should be on hand is referred to:
Depreciation is especially applicable when companies try to overvalue their assets and net worth; the lower their depreciation expense, the higher the company’s profits.
Which of the following offender types are people who take the money and run away?
Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:
Which of the following is NOT a medium that commonly causes an organization's proprietary information to be compromised?
In which of the following process, all bidders are legally supposed to be placed on the same plane of equality, bidding on the same terms and conditions?
Which of the following is NOT a distinguishing characteristic of a Ponzi scheme?
Which of the following fraud schemes is MOST LIKELY to target members of a religious community?
Which of the following ratios can be used to determine the efficiency with which a company uses its assets?
Larceny is the scheme in which an employee simply takes inventory from the company premises without attempting to conceal it in the books and records.
Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:
Entering a sales total lower than the amount actually paid by the customer is called:
Which of the following is the amount of money that would be realized upon the sale of the asset at some point in the future, less the costs associated with owning, operating, and selling it?
Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?
A special scheme in which employees know their employer is seeking to purchase a certain asset and take advantage of the situation by purchasing the asset themselves is:
Ada uses her mother’s government identification card to impersonate her mother and obtain health care for herself under her mother’s insurance benefits. Which type of patient health care fraud scheme is Ada MOST LIKELY committing?
Pilar had to purchase computer equipment for ABC Corporation, her employer. Pilar created a shell company, used the shell company to purchase used computer equipment, and then resold that equipment to ABC Corporation at an increased price. This is an example of a:
A method for gaining unauthorized access to a computer system whereby the attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme is known as:
Jorge, a Certified Fraud Examiner (CFE), is investigating a tip involving an accountant at a bank who allegedly adjusted the bank’s general ledger to conceal the theft of funds from a customer’s account. If Jorge finds evidence that proves the allegation, which of the following BEST describes the accountant’s scheme?
Several people who work in real estate collude to obtain a loan for the construction of a residential building on a property that does not exist. The co-conspirators divide the proceeds among themselves and leave the lender with no collateral to seize when loan payments are not made. Which of the following BEST describes this scheme?
Which of the following is a red flag that might indicate that someone is attempting to commit insurance fraud?
Which of the following search is used for unusually high incidence of returns and allowances scheme?
According to accounting principles, ________ and ________ should be recorded or matched in the same accounting period; failing to do so violates the matching principle of GAAP.
Organizations that had external audits actually had higher median losses and longer-lasting fraud schemes than those organizations that were not audited.
A variation between the physical inventory and the perpetual inventory totals is called:
The _______________ cost method of pricing would carry an asset’s value on the financial statements as what it would currently cost, considering inflation.
___________ is to allow the owner, investors, creditors, and others with an interest to know the appropriate book worth of the business at a particular date.
Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?
Which of the following scenarios is the MOST ACCURATE example of insurer health care fraud?
Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail and recording the receipt of payments.
If the assets are intentionally purchased by the company but simply misappropriated by the fraudster, this is referred to as:
__________ is required if and when officers, executives, or other persons in trusted positions become subjects of a criminal indictment.
Baker, an employee of ABC Corporation, was the only employee who had control of the purchasing function for his department. Baker authorized the purchase of supplies that ABC did not need and used these supplies to make improvements to his house. This is an example of what kind of fraud?
Which of the following is a recommended method for safeguarding an organization's proprietary information?