Which of the following statements is MOST ACCURATE regarding the methods used for making corrupt payments in corruption schemes?
The most basic skimming scheme occurs when:
In which approach do fraudsters produce whatever financial statements they wish, perhaps using just a typewriter or a personal computer?
According to the Fraud Tree, cash has three following schemes:
__________ means that traditional bribery statutes proscribe only payments made to influence the decisions of government agents or employees.
Otto, a bank manager, purchases a new boat that he cannot afford. Knowing that one of the bank customers is an older client who does not regularly check their account, Otto takes money from the customer's account to make his boat payments. To conceal the missing amount, Otto adjusts the bank's general ledger. Which of the following BEST describes Otto's scheme?
People commit financial statement fraud to:
The behavior profile of employees who are involved in bribery schemes may include:
Which of the following statements is TRUE regarding income statements?
Once the expense account is closed, it becomes a historical item and probably will never be reviewed again.
One of the simplest ways to justify unacceptable conduct and avoid guilt feelings is to invent a good reason for ________.
According to Hollinger and Clark, for policy development, management must pay attention to:
The prime targets for skimming schemes, which are hard to monitor and predict such as late fees and parking fees, are:
Which of the following statements is TRUE regarding the prevention of inventory theft?
Which of the following is one of the sections on the statement of cash flows?
Which of the following would NOT be considered a conflict of interest?
Assets that are long-lived and that differ from property, plant, and equipment that has been purchased outright or acquired under a capital lease are:
Brenda was a cashier at a retail store. When Brenda's friend shopped at the store, she would take her merchandise to Brenda's cash register. Instead of charging her friend, Brenda would record a No-Sale transaction on the register, and her friend would pretend to pay for the merchandise. Brenda's friend would leave the store without paying for the merchandise, and the two would later divide the merchandise between themselves. This scheme can BEST be described as:
__________ may be defined as the offering, giving, receiving, or soliciting anything of value to influence an official act.
In which phase of the competitive bidding process do fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?
A typical issue involving materiality and fraud would be:
A running count that records how much inventory should be on hand is referred to:
The difference between assets and liabilities is called:
The most common method of detection in corruption cases is:
Larceny by fraud or deception means that:
Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?
Undisclosed payments made by vendors to employees of purchasing companies are referred to as:
Fraud in financial statements generally takes the form of _______ assets or revenue and _______ liabilities and expenses.
George, a 71-year-old man, receives a fraudulent message on his computer stating that his computer has been infected by a virus. When George calls the phone number listed on the message, he speaks with a fraudster who charges him for computer repair services that are unnecessary. George has MOST LIKELY been victimized by which of the following schemes?
When a victim company purchases unnecessary goods or services from a supplier at the direction of the corrupt employee, this results in:
Statistical sampling enables the examiner to predict the occurrence rate for the population and therefore determine with some accuracy the error rate, or the potential for fraud.
Which of the following statements regarding financial statement disclosures is TRUE?
A fraudster poses as ABC Organization's chief executive officer (CEO) and sends an email to an employee requesting that company funds be transferred to an account that the fraudster owns. This is an example of which of the following types of fraud schemes?
Depreciation is especially applicable when companies try to overvalue their assets and net worth; the lower their depreciation expense, the higher the company’s profits.
An analytical review reveals that XYZ Company's cost of goods sold has increased by 75% in the last year. However, its sales revenues only increased by 25% during the same period. This situation MOST LIKELY indicates which of the following?
Which of the following is NOT a medium that commonly causes an organization's proprietary information to be compromised?
___________ and __________ are used to increase (or decrease) the equity account.
The excess credits (or debits) on the income statement are used to decrease (or increase) the equity account.
Cynthia receives a fraudulent text message that appears to be from her credit card company. The message claims that the company has detected suspicious card transactions and provides a link for her to click to sign into her account for more information. Cynthia is MOST LIKELY being targeted by which of the following types of social engineering schemes?
Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:
By what accountant means that the financial figures presented by the company are at least as much as reflected in the statements, if not more.
A journal in which all sales made on credit or cash are listed is:
Hannah is a manager at a financial institution. To safeguard the bank and its customers from electronic funds transfer (EFT) fraud, Hannah is implementing several preventive measures. Which of the following is NOT a measure Hannah should take to prevent EFT fraud?
Which of the following is the MOST ACCURATE statement about the different types of malware?
Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?
_____________ involves purposeful misreporting of financial information about the organization that is intended to mislead those who read it.
Another way to eliminate competition in the solicitation phase of the selection process is to:
The _______________ cost method of pricing would carry an asset’s value on the financial statements as what it would currently cost, considering inflation.
The essential elements of a ________ are an actual or constructive taking away of the goods or property of another without the consent and against the will of the owner and with a felonious intent.
Which of the following is NOT the reason to bribe employees of the purchaser?
Which of the following is not a skimming scheme?
Several people who work in real estate collude to obtain a loan for the construction of a residential building on a property that does not exist. The co-conspirators divide the proceeds among themselves and leave the lender with no collateral to seize when loan payments are not made. Which of the following BEST describes this scheme?
Which of the following is a common way that dishonest contractors collude to evade the competitive bidding process?
_________ is defined as a person who works for the victim organization and who is the primary culprit.
__________ are the amounts which are owed to other entities:
__________ can be defined as conduct detrimental to the organization and to the employee.
Fraudsters use the accounting system as a tool to generate the results they want in ___________ approach:
Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?
Reconciling the sales records to the cash receipts is an effective way to detect a sales skimming scheme.
Which of the following is a method of identity theft prevention that is recommended for businesses?
Delivery has not occurred or services have not been rendered when:
Which of the following would be helpful in detecting a cash larceny scheme?
A person is said to be in ________ act, when the business which he transacts, or the money or property which he handles, is not for his own benefit, but for another person:
________, one of the synonyms for fraud, implies deceiving so thoroughly as to obscure the truth.
Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?
What can make it easy for an employee to skim sales or receivables?
Which of the following items do NOT appear on the balance sheet?
All the following are basic methods used to prove corrupt payments in corruption schemes EXCEPT:
Forced reconciliation of the account says:
Which of the following is NOT one of the information security goals that should be achieved to secure an e-commerce system for users and account holders?