Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CFE-Financial-Transactions-and-Fraud-Schemes Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers

Questions 4

Which of the following is a reason why prepaid debit and gift card fraud schemes are appealing to fraudsters?

Options:

A.

Prepaid cards can be purchased with stolen credit cards and used to quickly convert illicit credit card funds into legitimate cash.

B.

Prepaid cards can only be purchased from financial institutions.

C.

Prepaid cards are often not accepted by online retailers and can only be used in transactions in which the cards must be physically present.

D.

All of the above are reasons why prepaid cards are appealing to fraudsters.

Buy Now
Questions 5

Which of the following would NOT be helpful in preventing expense reimbursement schemes?

Options:

A.

Requiring all employees to submit receipts electronically

B.

Comparing current expenses to budgeted expense amounts

C.

Requiring employees to explain the specific business purpose of each expense

D.

Comparing current expenses to historical expenditure amounts

Buy Now
Questions 6

Which of the following controls BEST describes the safeguards an organization implements to provide protection for computing resources by increasing security policies and awareness, conducting security audits and tests, and properly classifying data?

Options:

A.

Technical security controls

B.

Logical access controls

C.

Administrative security controls

D.

Physical access controls

Buy Now
Questions 7

Jonathan, a Certified Fraud Examiner (CFE), is tasked with identifying potential indicators of intrusion into his employer ' s computer network. Which of the following might indicate that the organization ' s network has been compromised or accessed without authorization?

Options:

A.

When logging into the computer network, employees receive a reminder to change their log-in passwords before they expire.

B.

Network users are prompted to install unfamiliar software onto their computers.

C.

The network is receiving data from a country where one of the organization ' s suppliers is located.

D.

Users are denied access to network files they do not typically use in their organizational role.

Buy Now
Questions 8

Depreciation is especially applicable when companies try to overvalue their assets and net worth; the lower their depreciation expense, the higher the company’s profits.

Options:

A.

True

B.

False

Buy Now
Questions 9

Which of the following is NOT an example of bribery prevention policies?

Options:

A.

Reporting gifts

B.

Discounts

C.

Business meetings

D.

Resource diversions

Buy Now
Questions 10

Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?

Options:

A.

Requiring all fraud tips to be reported to employees ' direct supervisors

B.

Combining the purchasing and payment functions within a single department

C.

Enforcing competitive bidding from potential vendors

D.

Using an external vendor to negotiate procurement contracts

Buy Now
Questions 11

Not having any accounts receivable that are overdue is a common red flag of fictitious revenue schemes.

Options:

A.

True

B.

False

Buy Now
Questions 12

__________ is required if and when officers, executives, or other persons in trusted positions become subjects of a criminal indictment.

Options:

A.

Conflict of interest

B.

Turnaround sale or flip

C.

Disclosure

D.

Resource diversion

Buy Now
Questions 13

Which of the following is NOT the aspect of inventory purchase?

Options:

A.

Inventory purchases purposely increase in year 1 only to be liquidated in year 2.

B.

Inventory for year 2 will be much greater than year 1.

C.

Increased sales in year 2 are unexpected and purchase of inventory does not keep pace with the sales.

D.

Might be some fraud scheme in inventory.

Buy Now
Questions 14

Which of the following is an example of a cash larceny scheme?

Options:

A.

Paul sold insurance policies to individuals but never filed the policies with the insurance company. He then stole the customers ' payments, which he was able to do because the insurance company did not know the policies existed.

B.

Emily is an accounts receivable clerk. She stole Customer A ' s monthly payment. When Customer B ' s payment arrived, she applied it to Customer A ' s account. When Customer C ' s payment arrived, she applied it to Customer B ' s account.

C.

Sarah returned a $250 mirror to the store. Jenna, the cashier, recorded a $350 return on the cash register and kept the remaining $100.

D.

Mark, a cashier, knew the access code for Joe ' s cash register. He logged in as Joe and processed transactions as usual. He then took $50 from the register at the end of his shift.

Buy Now
Questions 15

Occupational fraud and abuse is a (an) __________ of doing business, in much the same way that we pay expenses for electricity, taxes, and wages.

Options:

A.

Equity

B.

Balance sheet

C.

Expense

D.

Financial record

Buy Now
Questions 16

Larceny by fraud or deception means that:

Options:

A.

Creates or reinforces a false impression

B.

Fails to correct a false impression

C.

Fails to disclose a known lien, adverse claim, or other legal impediment

D.

All of the above

Buy Now
Questions 17

The principle behind full disclosure is:

Options:

A.

Any material deviation from GAAP must be explained to the reader of the financial information.

B.

Any material deviation from SAS must be explained to the writer of the financial information.

C.

Any material deviation from GAAP must be explained to the writer of the financial information.

D.

None of above

Buy Now
Questions 18

The behavior profile of employees who are involved in bribery schemes may include:

Options:

A.

Gambling habit

B.

Extravagant lifestyle

C.

Drug and/or alcohol addiction

D.

All of the above

Buy Now
Questions 19

Which of the following is NOT a method for stealing inventory and other assets?

Options:

A.

Larceny schemes

B.

Asset requisition and transfer

C.

Purchasing and receiving schemes

D.

Sales & Equipment handling

Buy Now
Questions 20

By what accountant means that the financial figures presented by the company are at least as much as reflected in the statements, if not more.

Options:

A.

Fraudulent statement

B.

Misappropriations

C.

Conservatism

D.

Matching

Buy Now
Questions 21

Which of the following scenarios is an example of an economic extortion scheme?

Options:

A.

A purchasing employee and vendor agree to bill the company for services that were not provided.

B.

A government official demands money in exchange for awarding a contract to a vendor.

C.

An employee receives a payment for directing excess business to a vendor.

D.

A vendor rewards a purchasing employee with a free trip after the employee directs business to the vendor.

Buy Now
Questions 22

Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp’s business to Oak Company. In exchange for receiving additional business, Oak Company’s sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?

Options:

A.

Economic extortion scheme

B.

Kickback scheme

C.

Illegal gratuity scheme

D.

Diversion scheme

Buy Now
Questions 23

Delivery has not occurred or services have not been rendered when:

Options:

A.

Until installation and customer testing and acceptance has occurred.

B.

A written order exists but contains a right of return.

C.

Both A & B

D.

Neither A nor B

Buy Now
Questions 24

According to SAB 104, for revenue to be considered realized or realizable and earned, which of the following criteria is NOT met?

Options:

A.

Persuasive evidence of an arrangement exists

B.

Services have been rendered

C.

Timings have been met

D.

Collectability is reasonably assured

Buy Now
Questions 25

Revenue is recognized when it is:

Options:

A.

Realized and Earned

B.

Fictitious and Earned

C.

Realized and Evidenced

D.

All of the above

Buy Now
Questions 26

George, a 71-year-old man, receives a fraudulent message on his computer stating that his computer has been infected by a virus. When George calls the phone number listed on the message, he speaks with a fraudster who charges him for computer repair services that are unnecessary. George has MOST LIKELY been victimized by which of the following schemes?

Options:

A.

Pharming

B.

Bait and switch scheme

C.

Tech-support scheme

D.

Smishing

Buy Now
Questions 27

____________ is a summary of the account balances carried in a ledger.

Options:

A.

Balance sheet

B.

Income statement

C.

Financial statement

D.

General journal

Buy Now
Questions 28

Asset misappropriations have an effect on the liabilities and do also have an indirect effect on the equity account.

Options:

A.

True

B.

False

Buy Now
Questions 29

Which of the following is NOT a justifiable reason to depart from generally accepted accounting principles (GAAP)?

Options:

A.

To avoid overstating assets and/or income

B.

Reporting a transaction that is compliant with GAAP would be more expensive

C.

To better reflect the substance of a transaction

D.

Following GAAP would produce misleading results on financial statements

Buy Now
Questions 30

Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp ' s business to Oak Company. In exchange for receiving additional business, Oak Company ' s sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?

Options:

A.

Kickback scheme

B.

Illegal gratuity scheme

C.

Diversion scheme

D.

Economic extortion scheme

Buy Now
Questions 31

Placing any restriction in the solicitation documents that tend to restrict competition is called prebid solicitation.

Options:

A.

True

B.

False

Buy Now
Questions 32

Skimming is:

Options:

A.

The removal of cash from a victim entity prior to its entry in an accounting system.

B.

The addition of cash from a victim entity prior to its entry in an accounting system.

C.

The removal of cash from a victim entity after its entry in an accounting system.

D.

None of above

Buy Now
Questions 33

The fraudster’s interest lies with an employer other than the company.

Options:

A.

True

B.

False

Buy Now
Questions 34

A journal in which all sales made on credit or cash are listed is:

Options:

A.

Disbursement journal

B.

Accounts receivable journal

C.

Accounts payable journal

D.

General journal

Buy Now
Questions 35

Which of the following statements about skimming is CORRECT?

Options:

A.

Skimming schemes involve the theft of cash sales but not accounts receivable payments.

B.

Skimming schemes involve stolen customer payments that were not recorded.

C.

Skimming schemes are considered on-book frauds because they leave an audit trail.

D.

Skimming schemes are generally less difficult to detect than cash larceny schemes.

Buy Now
Questions 36

The person or persons who have access to __________ are often the targets of unethical vendors seeking an advantage in the process.

Options:

A.

Bid-splitting

B.

Sealed bids

C.

General purchasing

D.

Tailor specifications

Buy Now
Questions 37

Conflict of interest cases are more easily prevented than detected.

Options:

A.

True

B.

False

Buy Now
Questions 38

The most common method of detection in corruption cases is:

Options:

A.

Internal audits

B.

Internal controls

C.

Tips

D.

By accident

Buy Now
Questions 39

Which of the following scenarios is an example of upcoding ?

Options:

A.

Cindy receives payment in exchange for allowing an unnecessary surgical procedure to be completed on her that is then billed to her health care program

B.

Dr. Loomis uses three procedure codes when submitting a claim for a surgery that she performed that is supposed to be billed using one procedure code

C.

Landon inflates a medical bill that he wants to receive reimbursement for by misrepresenting the amount of the bill

D.

Dr. Raul advises a patient with a small fracture in her leg to use crutches, but he submits the claim using a code to indicate that he placed a cast on the patient

Buy Now
Questions 40

Collusion or bid-rigging between bidders is called

Options:

A.

Bribery receipt

B.

Bid solicitation

C.

To withdraw low bids

D.

Contract acceptance

Buy Now
Questions 41

Persuasive evidence of an arrangement does not exist when:

Options:

A.

Revenue and corresponding expenses don’t match each other.

B.

No written or verbal agreement exists.

C.

Timings not meet properly.

D.

Capitalized expenses and Liabilities will not be up to satisfied level.

Buy Now
Questions 42

Which of the following is a method that a fraudster might use to conceal inventory shrinkage?

Options:

A.

Selling merchandise without recording the sale

B.

Writing off stolen inventory as scrap

C.

Falsely increasing the perpetual inventory record

D.

All of the above

Buy Now
Questions 43

Which of the following is a condition that facilitates insider cyberfraud?

Options:

A.

Access logs are not reviewed by management.

B.

Production programs are run during the business day.

C.

Access privileges are restricted to assigned job functions.

D.

Separation of duties exists in the data center.

Buy Now
Questions 44

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK ' s clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina ' s approach is an example of:

Options:

A.

Human intelligence

B.

Scavenging

C.

Baiting

D.

Open-source intelligence

Buy Now
Questions 45

Which of the following is a recommended method for safeguarding an organization ' s proprietary information?

Options:

A.

Changing locks and reprogramming door access codes every three to five years

B.

Classifying data into security access levels based on the number of years that employees have worked for the company

C.

Educating employees about nondisclosure agreements when they are hired and during exit interviews

D.

Requiring employees to make notes and keep drafts related to confidential projects

Buy Now
Questions 46

_____________ involves purposeful misreporting of financial information about the organization that is intended to mislead those who read it.

Options:

A.

Fraudulent statement

B.

Corruption

C.

Asset misappropriations

D.

None of the above

Buy Now
Questions 47

All the following are basic methods used to prove corrupt payments in corruption schemes EXCEPT:

Options:

A.

Making inquiries to the relevant Administration of Taxation

B.

Secretly infiltrating ongoing transactions

C.

Using an inside witness

D.

Identifying and tracing payments through audit steps

Buy Now
Questions 48

Which of the following statements is MOST ACCURATE regarding the methods used for making corrupt payments in corruption schemes?

Options:

A.

Payers often make corrupt payments by providing loans to recipients on favorable terms.

B.

Payers cannot use their credit cards to make corrupt payments because of anti-money laundering rules.

C.

Payers often make corrupt payments by selling property to recipients at prices that are higher than the property ' s market value.

D.

Payers ' promises of favorable treatment are not considered corrupt payments under bribery laws.

Buy Now
Questions 49

In which approach do fraudsters produce whatever financial statements they wish, perhaps using just a typewriter or a personal computer?

Options:

A.

Organized accounting

B.

Playing the accounting

C.

Beating accounting

D.

Outside accounting system

Buy Now
Questions 50

Which of the following is the MOST APPROPRIATE technique for detecting a nonconforming goods or services scheme?

Options:

A.

Interviewing complaining contractors and unsuccessful bidders about the presence of red flags

B.

Reviewing correspondence and contract files for indications of noncompliance regarding specifications

C.

Comparing the direct and indirect labor account totals from the prior year to the current year

D.

Determining if the costs of the contract have exceeded or are expected to exceed the value of the contract

Buy Now
Questions 51

Which of the following is an example of a technical security control that organizations can use to secure computer systems and communication networks?

Options:

A.

Application security

B.

Human audits

C.

Penetration testing

D.

Data security

Buy Now
Questions 52

Employees steal an incoming payment and then place the incoming funds in an interest-bearing account for:

Options:

A.

Converting stolen checks

B.

Concealing the fraud

C.

Short-term skimming

D.

All of the above

Buy Now
Questions 53

Which of the following statements regarding financial statement disclosures is TRUE?

Options:

A.

Events occurring after the close of the reporting period that might significantly affect the financial statements do not need to be disclosed.

B.

Management must disclose potential losses from ongoing litigation even when it is unlikely that the related liability will result in a future obligation.

C.

All information relating to the company must be disclosed in the financial statements, regardless of materiality.

D.

Changes in accounting principles must be disclosed in the financial statements.

Buy Now
Questions 54

Which of the following statements is TRUE regarding income statements?

Options:

A.

Gross revenue is the total amount of sales after deductions are applied.

B.

Net profit is a company ' s earnings before operating expenses have been deducted.

C.

Gross profit is the difference between net sales and cost of goods sold.

D.

A company ' s operating expenses are usually listed as the first line item.

Buy Now
Questions 55

Which of the following statements is TRUE regarding the prevention of inventory theft?

Options:

A.

The inventory requisition form should be completed by the same person who is responsible for incoming shipments.

B.

The purchasing supervisor should conduct the physical inventory count.

C.

Shipping documents should be prenumbered and controlled.

D.

The person who is responsible for shipping inventory should also be responsible for converting inventory to scrap.

Buy Now
Questions 56

Which of the following is the MOST ACCURATE statement about the different types of malware?

Options:

A.

Spyware is a software program with instructions executed every time a computer is turned on.

B.

A Trojan horse is a hidden program that displays advertisements while the computer is operating.

C.

A computer worm is a program that appears useful but monitors and logs keystrokes.

D.

Ransomware is malicious software that locks the operating system and restricts access to data files.

Buy Now
Questions 57

A method for gaining unauthorized access to a computer system whereby the attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme is known as:

Options:

A.

IP spoofing

B.

Electronic piggybacking

C.

Packet sniffing

D.

Social engineering

Buy Now
Questions 58

To detect fraud committed by a health care provider, a fraud examiner should look for which of the following red flags?

Options:

A.

The number of claims made by the provider for reimbursement are lower than average.

B.

There is a high percentage of coding outliers in the provider ' s documentation.

C.

The details in the provider ' s supporting documentation match the health care claim.

D.

The provider has unusually low profits compared to similar businesses in the same region.

Buy Now
Questions 59

Which of the following is NOT a standard of generally accepted accounting principles (GAAP)?

Options:

A.

Conservatism

B.

Cost

C.

Full disclosure

D.

Quality control

Buy Now
Questions 60

Skimming cases can more likely be detected by:

Options:

A.

Internal audits

B.

Accidents

C.

Internal controls

D.

Occupational frauds

Buy Now
Questions 61

According to a survey, in principal perpetrator cases, males were the primary culprit in a majority of cases, accounting for ___ percent of frauds versus ___ percent for females.

Options:

A.

62 versus 36

B.

61 versus 39

C.

62 versus 37

D.

None of the above

Buy Now
Questions 62

Employees with the authority to grant discounts in order to skim revenues may use which authority?

Options:

A.

False discounts

B.

Recording a discount on sale procedure

C.

Internal discount sales audits

D.

None of the above

Buy Now
Questions 63

Which of the following are the classifications for Corruption?

Options:

A.

Bribery, economic extortion, illegal gratuities, and conflicts of interest

B.

Corruption, bribery, economic extortion, conflicts of interest

C.

Overbilling, bribery, bid-rigging, and illegal gratuities

D.

Economic extortion, bribery, illegal gratuities, and corruption

Buy Now
Questions 64

In the fraud scale, pressure, opportunity, and integrity variables all result in a list of ___ possible red flags or indicators of occupational fraud and abuse.

Options:

A.

81

B.

82

C.

83

D.

84

Buy Now
Questions 65

The _______________ cost method of pricing would carry an asset’s value on the financial statements as what it would currently cost, considering inflation.

Options:

Buy Now
Questions 66

The principal way to detect omitted credits from books of account is through:

Options:

A.

Forced Balance

B.

Trend analysis

C.

Expense account

D.

None of all

Buy Now
Questions 67

Which of the following is a recommended activity that organizations should engage in to protect their proprietary information from threats?

Options:

A.

Enlisting a company task force to identify the information security practices of competitors

B.

Practicing data minimization to limit the information available during a data breach

C.

Storing devices that contain sensitive data in specially constructed quiet rooms

D.

Prohibiting all nonemployees from entering the organization ' s premises

Buy Now
Questions 68

The essential elements of a ________ are an actual or constructive taking away of the goods or property of another without the consent and against the will of the owner and with a felonious intent.

Options:

A.

Larceny

B.

Abuse

C.

Fiduciary

D.

None of the above

Buy Now
Questions 69

Which of the following methods would NOT be helpful in detecting a skimming scheme?

Options:

A.

Confirming customers ' unpaid account balances

B.

Examining journal entries for false credits made to the inventory

C.

Performing physical inventory counts

D.

Comparing cash register totals to the cash count

Buy Now
Questions 70

Another way to eliminate competition in the solicitation phase of the selection process is to:

Options:

A.

Solicit bids from fictitious suppliers

B.

Solicit transactions from fictitious vendors

C.

Solicit bid-splitting from fictitious vendors

D.

None of the above

Buy Now
Questions 71

Joe ' s automobile insurance policy expired in June. In August, Joe was involved in an automobile accident, and his vehicle was severely damaged. After the accident, Joe contacted his insurance company and reinstated the policy. In September, Joe then submitted a claim with a September accident date for the damages that occurred to his vehicle in August. Joe has engaged in which of the following insurance schemes?

Options:

A.

Staged accident

B.

Inflated damages

C.

Past posting

D.

Vehicle repair

Buy Now
Questions 72

When an incorrect total is carried from the journal to the ledger or from the ledger to the financial statements, this method is called:

Options:

A.

Forced Balance

B.

Out-of-balance

C.

False balance

D.

None of all

Buy Now
Exam Name: Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam
Last Update: May 17, 2026
Questions: 242

PDF + Testing Engine

$64.99  $185.69

Testing Engine

$49.99  $142.83
buy now CFE-Financial-Transactions-and-Fraud-Schemes testing engine

PDF (Q&A)

$54.99  $157.11
buy now CFE-Financial-Transactions-and-Fraud-Schemes pdf