CFE-Financial-Transactions-and-Fraud-Schemes Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers
A running count that records how much inventory should be on hand is referred to:
Inventory shrinkage is the unaccounted-for reduction in the company’s inventory that does not result from theft.
George, a 71-year-old man, receives a fraudulent message on his computer stating that his computer has been infected by a virus. When George calls the phone number listed on the message, he speaks with a fraudster who charges him for computer repair services that are unnecessary. George has MOST LIKELY been victimized by which of the following schemes?
According to a survey, in principal perpetrator cases, males were the primary culprit in a majority of cases, accounting for ___ percent of frauds versus ___ percent for females.
The scheme in which the same vendor is receiving favorable treatment can be found in purchases by vendor searches.
A fraudster creates a fictitious identity by combining a person's real government identification number with a fabricated name and birthdate. This scheme can BEST be described as:
Employees steal an incoming payment and then place the incoming funds in an interest-bearing account for:
Brenda was a cashier at a retail store. When Brenda's friend shopped at the store, she would take her merchandise to Brenda's cash register. Instead of charging her friend, Brenda would record a No-Sale transaction on the register, and her friend would pretend to pay for the merchandise. Brenda's friend would leave the store without paying for the merchandise, and the two would later divide the merchandise between themselves. This scheme can BEST be described as:
According to SAB 104, for revenue to be considered realized or realizable and earned, which of the following criteria is NOT met?
_________ revenues involve the recording of sales of goods or services that did not occur.
In the fraud scale, pressure, opportunity, and integrity variables all result in a list of ___ possible red flags or indicators of occupational fraud and abuse.
Baker, an employee of ABC Corporation, was the only employee who had control of the purchasing function for his department. Baker authorized the purchase of supplies that ABC did not need and used these supplies to make improvements to his house. This is an example of what kind of fraud?
Which of the following statements is MOST ACCURATE regarding the methods used for making corrupt payments in corruption schemes?
In which phase of the competitive bidding process do fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?
Which of the following search is used for unusually high incidence of returns and allowances scheme?
Joe's automobile insurance policy expired in June. In August, Joe was involved in an automobile accident, and his vehicle was severely damaged. After the accident, Joe contacted his insurance company and reinstated the policy. In September, Joe then submitted a claim with a September accident date for the damages that occurred to his vehicle in August. Joe has engaged in which of the following insurance schemes?
Which of the following is the MOST ACCURATE statement about the different types of malware?
Mario performs surgery on a patient to replace a bone. The surgery should be billed using one code, but Mario bills the surgery using three codes (one for the entire surgery, one for the removal of the bone, and another for the insertion of the artificial bone), which increases the cost. Which of the following BEST describes Mario's scheme?
Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:
Not having any accounts receivable that are overdue is a common red flag of fictitious revenue schemes.
__________ inventory and other assets is a relatively common way for fraudsters to remove assets from the books before or after they are stolen.
Which of the following is a red flag that might indicate that someone is attempting to commit insurance fraud?
Fraud in financial statements generally takes the form of _______ assets or revenue and _______ liabilities and expenses.
In which of the following process, all bidders are legally supposed to be placed on the same plane of equality, bidding on the same terms and conditions?
_________ normally are carried on an organization’s books as expenses because they tend to be consumed by the organization within a year of purchase.
Which of the following scenarios is the MOST ACCURATE example of insurer health care fraud?
Which of the following is a red flag that might indicate the existence of a need recognition scheme?
Which of the following actions would balance the accounting equation to conceal the misappropriation of cash?
Which of the following is NOT a measure that is commonly taken by fraudsters during account takeover schemes?
The _______________ cost method of pricing would carry an asset’s value on the financial statements as what it would currently cost, considering inflation.
Perceived certainty of detection is directly related to employee theft for respondents in all industry sectors, that is, the stronger the perception that theft would be detected, the more the likelihood that the employee would engage in deviant behavior.
The price of an asset on which the asset is selling at on the open market in a transaction between a willing buyer and a willing seller is called:
All the following are basic methods used to prove corrupt payments in corruption schemes EXCEPT:
A ____________ can be very costly for an organization to undertake, both in terms of money and time spent.
When a victim company purchases unnecessary goods or services from a supplier at the direction of the corrupt employee, this results in:
_____________ involves purposeful misreporting of financial information about the organization that is intended to mislead those who read it.
Which of the following is a method of identity theft prevention that is recommended for individuals?
In what type of fraud scheme does an employee steal cash after it has appeared on the company’s books?
Black, an accounts receivable clerk, stole Customer A's monthly payment instead of posting it to A's account. When Customer B's payment arrives a few days later, Black applies the payment to Customer A's account. When Customer C's payment arrives a few days after that, Black applies it to Customer B's account. Black's method of crediting one account with money taken from another account is known as:
Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail and recording the receipt of payments.
The excess credits (or debits) on the income statement are used to decrease (or increase) the equity account.
Ada uses her mother’s government identification card to impersonate her mother and obtain health care for herself under her mother’s insurance benefits. Which type of patient health care fraud scheme is Ada MOST LIKELY committing?
A fraudster uses a victim’s name, government identification number, and birthdate to impersonate the victim and open a credit card account in the victim’s name. This scheme can BEST be described as:
If the assets are intentionally purchased by the company but simply misappropriated by the fraudster, this is referred to as:
According to Hollinger and Clark, for policy development, management must pay attention to:
Any expenses that are incurred but not paid by the end of the year are counted in our records of profit and loss, and are called:
When an employee processes a fictitious refund of goods, the amount of cash in the register does not balance with the register log.
Several people who work in real estate collude to obtain a loan for the construction of a residential building on a property that does not exist. The co-conspirators divide the proceeds among themselves and leave the lender with no collateral to seize when loan payments are not made. Which of the following BEST describes this scheme?
According to Marshall, ______ are probable future economic benefits obtained or controlled by a particular entity as a result of past transactions or events.
Which of the following is an insurance fraud detection tool used for identifying funds fraudulently sent to fictitious payees by using computer-generated reports to compare payments sent to the same location?
Which of the following is a method that a fraudster might use to conceal inventory shrinkage?