Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

ACFE CFE-Financial-Transactions-and-Fraud-Schemes Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Exam Practice Test

Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which of the following statements is MOST ACCURATE regarding the methods used for making corrupt payments in corruption schemes?

Options:

A.

Payers often make corrupt payments by providing loans to recipients on favorable terms.

B.

Payers cannot use their credit cards to make corrupt payments because of anti-money laundering rules.

C.

Payers often make corrupt payments by selling property to recipients at prices that are higher than the property's market value.

D.

Payers' promises of favorable treatment are not considered corrupt payments under bribery laws.

Question 2

The most basic skimming scheme occurs when:

Options:

A.

An employee sells goods or services to a customer, collects the customer’s payment, but makes no record of the sale.

B.

An employee buys goods or services from a customer, drops the customer’s payment, but makes no record of the purchase.

C.

An employee sells goods or services to a stakeholder, collects the stakeholder’s payment and makes record of the sale too.

D.

An employee buys goods or services from a stakeholder, drops the stakeholder’s payment and makes record of the purchase too.

Question 3

In which approach do fraudsters produce whatever financial statements they wish, perhaps using just a typewriter or a personal computer?

Options:

A.

Organized accounting

B.

Playing the accounting

C.

Beating accounting

D.

Outside accounting system

Question 4

According to the Fraud Tree, cash has three following schemes:

Options:

A.

Skimming, cash larceny, and fraudulent disbursements

B.

Fraud analysis, skimming, and cash misappropriations

C.

Cash larceny, cash distribution, and fraudulent disbursements

D.

Cash distribution, skimming, and fraud analysis

Question 5

__________ means that traditional bribery statutes proscribe only payments made to influence the decisions of government agents or employees.

Options:

Question 6

Otto, a bank manager, purchases a new boat that he cannot afford. Knowing that one of the bank customers is an older client who does not regularly check their account, Otto takes money from the customer's account to make his boat payments. To conceal the missing amount, Otto adjusts the bank's general ledger. Which of the following BEST describes Otto's scheme?

Options:

A.

Unauthorized disbursement of funds

B.

Moving money from dormant accounts

C.

False accounting entry

D.

Unauthorized withdrawal

Question 7

People commit financial statement fraud to:

Options:

A.

Conceal false business performances

B.

Preserve personal status/control

C.

Maintain personal income

D.

Stand outside the accounting system

Question 8

The behavior profile of employees who are involved in bribery schemes may include:

Options:

A.

Gambling habit

B.

Extravagant lifestyle

C.

Drug and/or alcohol addiction

D.

All of the above

Question 9

Which of the following statements is TRUE regarding income statements?

Options:

A.

Gross revenue is the total amount of sales after deductions are applied.

B.

Net profit is a company's earnings before operating expenses have been deducted.

C.

Gross profit is the difference between net sales and cost of goods sold.

D.

A company's operating expenses are usually listed as the first line item.

Question 10

Once the expense account is closed, it becomes a historical item and probably will never be reviewed again.

Options:

A.

True

B.

False

Question 11

One of the simplest ways to justify unacceptable conduct and avoid guilt feelings is to invent a good reason for ________.

Options:

Question 12

According to Hollinger and Clark, for policy development, management must pay attention to:

Options:

A.

A clear understanding regarding theft behavior

B.

Enforcement of sanctions

C.

Both A & B

D.

Neither A nor B

Question 13

The prime targets for skimming schemes, which are hard to monitor and predict such as late fees and parking fees, are:

Options:

A.

Revenue sources

B.

Recorded sales

C.

Internal audits

D.

Register manipulations

Question 14

Which of the following statements is TRUE regarding the prevention of inventory theft?

Options:

A.

The inventory requisition form should be completed by the same person who is responsible for incoming shipments.

B.

The purchasing supervisor should conduct the physical inventory count.

C.

Shipping documents should be prenumbered and controlled.

D.

The person who is responsible for shipping inventory should also be responsible for converting inventory to scrap.

Question 15

Which of the following is one of the sections on the statement of cash flows?

Options:

A.

Cash flows from purchasing activities

B.

Cash flows from financing activities

C.

Cash flows from earnings activities

D.

Cash flows from strategic activities

Question 16

Which of the following would NOT be considered a conflict of interest?

Options:

A.

Harriet owns a significant amount of stock in a company she regularly buys her employer's office supplies from, but her employer is unaware of this fact.

B.

Robert works for Muir's Printing Services on weekdays and Winsted Café on weekends, but he does not tell either employer about the other job.

C.

Jennifer is on the board of directors of two companies that compete in the retail market, but she does not tell either company about her role at the other.

D.

Ernest hires his brother, John, to provide vending services to his employer's lunch areas, but he does not disclose their relationship.

Question 17

Assets that are long-lived and that differ from property, plant, and equipment that has been purchased outright or acquired under a capital lease are:

Options:

A.

Tangible Assets

B.

Intangible Assets

C.

Forced Assets

D.

None of the above

Question 18

Brenda was a cashier at a retail store. When Brenda's friend shopped at the store, she would take her merchandise to Brenda's cash register. Instead of charging her friend, Brenda would record a No-Sale transaction on the register, and her friend would pretend to pay for the merchandise. Brenda's friend would leave the store without paying for the merchandise, and the two would later divide the merchandise between themselves. This scheme can BEST be described as:

Options:

A.

A register disbursement scheme

B.

A false sale scheme

C.

A purchasing and receiving scheme

D.

A skimming scheme

Question 19

__________ may be defined as the offering, giving, receiving, or soliciting anything of value to influence an official act.

Options:

A.

Corruption

B.

Diverting business to vendors

C.

Bribery

D.

Lacking approval authority

Question 20

In which phase of the competitive bidding process do fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?

Options:

A.

Need recognition

B.

Solicitation

C.

False specification

D.

Submission

Question 21

A typical issue involving materiality and fraud would be:

Options:

A.

Fraudulent statement

B.

Misappropriations

C.

Civil lawsuit

D.

Quality control

Question 22

A running count that records how much inventory should be on hand is referred to:

Options:

A.

Altered inventory

B.

Perpetual inventory

C.

Shrinking inventory

D.

Fictitious inventory

Question 23

The difference between assets and liabilities is called:

Options:

A.

Equity

B.

Expense

C.

Revenue

D.

Income statement

Question 24

The most common method of detection in corruption cases is:

Options:

A.

Internal audits

B.

Internal controls

C.

Tips

D.

By accident

Question 25

Larceny by fraud or deception means that:

Options:

A.

Creates or reinforces a false impression

B.

Fails to correct a false impression

C.

Fails to disclose a known lien, adverse claim, or other legal impediment

D.

All of the above

Question 26

Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?

Options:

A.

Restricting other employees from performing the duties of an absent employee

B.

Assigning the duties of depositing cash receipts and performing bank reconciliations to different employees

C.

Having all employees use the same cash register for their transactions

D.

Keeping employees unaware that the company performs surprise cash counts

Question 27

Undisclosed payments made by vendors to employees of purchasing companies are referred to as:

Options:

A.

Bid-rigging

B.

Kickbacks

C.

Presolicitation

D.

None of the above

Question 28

Fraud in financial statements generally takes the form of _______ assets or revenue and _______ liabilities and expenses.

Options:

A.

Understated; overstated

B.

Overstated; understated

C.

Overstated; overstated

D.

Understated; understated

Question 29

George, a 71-year-old man, receives a fraudulent message on his computer stating that his computer has been infected by a virus. When George calls the phone number listed on the message, he speaks with a fraudster who charges him for computer repair services that are unnecessary. George has MOST LIKELY been victimized by which of the following schemes?

Options:

A.

Pharming

B.

Bait and switch scheme

C.

Tech-support scheme

D.

Smishing

Question 30

When a victim company purchases unnecessary goods or services from a supplier at the direction of the corrupt employee, this results in:

Options:

A.

Presolicitation scheme

B.

Need recognition scheme

C.

False sole-source scheme

D.

Submission scheme

Question 31

Statistical sampling enables the examiner to predict the occurrence rate for the population and therefore determine with some accuracy the error rate, or the potential for fraud.

Options:

A.

True

B.

False

Question 32

Which of the following statements regarding financial statement disclosures is TRUE?

Options:

A.

Events occurring after the close of the reporting period that might significantly affect the financial statements do not need to be disclosed.

B.

Management must disclose potential losses from ongoing litigation even when it is unlikely that the related liability will result in a future obligation.

C.

All information relating to the company must be disclosed in the financial statements, regardless of materiality.

D.

Changes in accounting principles must be disclosed in the financial statements.

Question 33

A fraudster poses as ABC Organization's chief executive officer (CEO) and sends an email to an employee requesting that company funds be transferred to an account that the fraudster owns. This is an example of which of the following types of fraud schemes?

Options:

A.

Reverse social engineering

B.

Executive email attack

C.

Electronic piggybacking

D.

Business email compromise

Question 34

Depreciation is especially applicable when companies try to overvalue their assets and net worth; the lower their depreciation expense, the higher the company’s profits.

Options:

A.

True

B.

False

Question 35

An analytical review reveals that XYZ Company's cost of goods sold has increased by 75% in the last year. However, its sales revenues only increased by 25% during the same period. This situation MOST LIKELY indicates which of the following?

Options:

A.

The company started recording warranty liabilities.

B.

There were fewer sales this year compared to last year.

C.

There were more sales returns this year than in the prior year.

D.

Inventory has been depleted by theft.

Question 36

Which of the following is NOT a medium that commonly causes an organization's proprietary information to be compromised?

Options:

A.

Reports to company shareholders

B.

Documents that were shredded using a cross-cut shredder

C.

Speeches made by executives

D.

Information displayed at an employee's workstation

Question 37

___________ and __________ are used to increase (or decrease) the equity account.

Options:

A.

Journal Entries & Debit

B.

Journal Entries & Transactions

C.

Journal Entries & Credit

D.

None of all

Question 38

The excess credits (or debits) on the income statement are used to decrease (or increase) the equity account.

Options:

A.

True

B.

False

Question 39

Cynthia receives a fraudulent text message that appears to be from her credit card company. The message claims that the company has detected suspicious card transactions and provides a link for her to click to sign into her account for more information. Cynthia is MOST LIKELY being targeted by which of the following types of social engineering schemes?

Options:

A.

Vishing

B.

Smishing

C.

Catfishing

D.

Pharming

Question 40

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:

Options:

A.

Human intelligence

B.

Baiting

C.

Scavenging

D.

Open-source intelligence

Question 41

By what accountant means that the financial figures presented by the company are at least as much as reflected in the statements, if not more.

Options:

A.

Fraudulent statement

B.

Misappropriations

C.

Conservatism

D.

Matching

Question 42

A journal in which all sales made on credit or cash are listed is:

Options:

A.

Disbursement journal

B.

Accounts receivable journal

C.

Accounts payable journal

D.

General journal

Question 43

Hannah is a manager at a financial institution. To safeguard the bank and its customers from electronic funds transfer (EFT) fraud, Hannah is implementing several preventive measures. Which of the following is NOT a measure Hannah should take to prevent EFT fraud?

Options:

A.

If a customer reports the loss or theft of an access device, then cancel the existing card, PIN, or other form of access and issue a new one.

B.

Send a welcome letter to new customers to determine if the address submitted on the account application is valid.

C.

Separate the duties of bank employees so that the responsibilities for the issuance of access devices are separate from the issuance of PINs.

D.

Mail PINs and other associated account information together to reduce the chance of those items being lost during transit.

Question 44

Which of the following is the MOST ACCURATE statement about the different types of malware?

Options:

A.

Spyware is a software program with instructions executed every time a computer is turned on.

B.

A Trojan horse is a hidden program that displays advertisements while the computer is operating.

C.

A computer worm is a program that appears useful but monitors and logs keystrokes.

D.

Ransomware is malicious software that locks the operating system and restricts access to data files.

Question 45

Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?

Options:

A.

Requiring all fraud tips to be reported to employees' direct supervisors

B.

Combining the purchasing and payment functions within a single department

C.

Enforcing competitive bidding from potential vendors

D.

Using an external vendor to negotiate procurement contracts

Question 46

_____________ involves purposeful misreporting of financial information about the organization that is intended to mislead those who read it.

Options:

A.

Fraudulent statement

B.

Corruption

C.

Asset misappropriations

D.

None of the above

Question 47

Another way to eliminate competition in the solicitation phase of the selection process is to:

Options:

A.

Solicit bids from fictitious suppliers

B.

Solicit transactions from fictitious vendors

C.

Solicit bid-splitting from fictitious vendors

D.

None of the above

Question 48

The _______________ cost method of pricing would carry an asset’s value on the financial statements as what it would currently cost, considering inflation.

Options:

Question 49

The essential elements of a ________ are an actual or constructive taking away of the goods or property of another without the consent and against the will of the owner and with a felonious intent.

Options:

A.

Larceny

B.

Abuse

C.

Fiduciary

D.

None of the above

Question 50

Which of the following is NOT the reason to bribe employees of the purchaser?

Options:

A.

To ensure receipt of a late bid

B.

To extend the bid opening date

C.

To ensure bid-splitting

D.

To falsify the bid log

Question 51

Which of the following is not a skimming scheme?

Options:

A.

Unrecorded sales

B.

Fraud & Cost

C.

Theft of checks through the mail

D.

Understated sales and receivables

Question 52

Several people who work in real estate collude to obtain a loan for the construction of a residential building on a property that does not exist. The co-conspirators divide the proceeds among themselves and leave the lender with no collateral to seize when loan payments are not made. Which of the following BEST describes this scheme?

Options:

A.

Property flopping

B.

Air loan

C.

Phantom lien

D.

Daisy chain

Question 53

Which of the following is a common way that dishonest contractors collude to evade the competitive bidding process?

Options:

A.

Arranging an agreement with competitors to divide and allocate markets

B.

Submitting bids on fake contracts to give the appearance of genuine competition

C.

Using different publications to publish their bid solicitations

D.

Submitting invoices for work that was not performed on joint projects

Question 54

_________ is defined as a person who works for the victim organization and who is the primary culprit.

Options:

Question 55

__________ are the amounts which are owed to other entities:

Options:

A.

Supplies

B.

Expenses

C.

Assets

D.

Liabilities

Question 56

__________ can be defined as conduct detrimental to the organization and to the employee.

Options:

A.

Employee deviance

B.

Employee theft

C.

Employee fraud

D.

All of the above

Question 57

Fraudsters use the accounting system as a tool to generate the results they want in ___________ approach:

Options:

A.

Organized accounting

B.

Playing the accounting

C.

Beating accounting

D.

All of the above

Question 58

Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?

Options:

A.

Kickback scheme

B.

Illegal gratuity scheme

C.

Diversion scheme

D.

Economic extortion scheme

Question 59

Reconciling the sales records to the cash receipts is an effective way to detect a sales skimming scheme.

Options:

A.

True

B.

False

Question 60

Which of the following is a method of identity theft prevention that is recommended for businesses?

Options:

A.

Use government identification numbers as employee identification numbers

B.

Audit practices involving the handling of information only when regulators require it

C.

Use encryption only when sending personal information externally through a hardwired internet connection

D.

Collect government identification numbers from customers only when legally required to gather that information

Question 61

Delivery has not occurred or services have not been rendered when:

Options:

A.

Until installation and customer testing and acceptance has occurred.

B.

A written order exists but contains a right of return.

C.

Both A & B

D.

Neither A nor B

Question 62

Which of the following would be helpful in detecting a cash larceny scheme?

Options:

A.

Having the accounts receivable clerk prepare the bank deposit

B.

Prohibiting employees from performing the duties of an absent employee

C.

Reconciling cash register totals to the amount of cash in the register drawer

D.

Requiring cashiers to perform cash counts of their own cash registers at the end of each shift

Question 63

A person is said to be in ________ act, when the business which he transacts, or the money or property which he handles, is not for his own benefit, but for another person:

Options:

A.

Fiduciary Capacity

B.

Embezzlement

C.

Conversion

D.

None of the above

Question 64

________, one of the synonyms for fraud, implies deceiving so thoroughly as to obscure the truth.

Options:

A.

Deceive

B.

Delude

C.

Mislead

D.

Beguile

Question 65

Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?

Options:

A.

Pharming is the practice of changing a victim's email or mailing address so that the identity thief receives the victim's mail.

B.

Dumpster diving involves searching for sensitive personal information on used computers that have been purchased from a reseller.

C.

Shoulder surfing is the practice of exploiting another person's access capability to gain access to restricted areas.

D.

Baiting involves leaving flash drives or similar items that have been infected with malware in places where people are likely to find them.

Question 66

What can make it easy for an employee to skim sales or receivables?

Options:

A.

Revenue sources and recording procedures

B.

Poor collection and recording procedures

C.

Internal audits and recording procedures

D.

Register manipulations and recording procedures

Question 67

Which of the following items do NOT appear on the balance sheet?

Options:

A.

Owners' equity

B.

Liabilities

C.

Expenses

D.

Assets

Question 68

All the following are basic methods used to prove corrupt payments in corruption schemes EXCEPT:

Options:

A.

Making inquiries to the relevant Administration of Taxation

B.

Secretly infiltrating ongoing transactions

C.

Using an inside witness

D.

Identifying and tracing payments through audit steps

Question 69

Forced reconciliation of the account says:

Options:

A.

To conceal shrinkage is to alter inventory record so that it matches the physical inventory count.

B.

To conceal inventory is to alter shrinkage record so that it matches the physical inventory count.

C.

To conceal shrinkage is to change the perpetual inventory record so that it matches the physical inventory count.

D.

To conceal write-offs is to change the perpetual inventory record so that it matches the physical inventory count.

Question 70

Which of the following is NOT one of the information security goals that should be achieved to secure an e-commerce system for users and account holders?

Options:

A.

Confidentiality of data

B.

Availability of data

C.

Penetrability of data

D.

Integrity of data