Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CFE-Financial-Transactions-and-Fraud-Schemes Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers

Questions 4

A running count that records how much inventory should be on hand is referred to:

Options:

A.

Altered inventory

B.

Perpetual inventory

C.

Shrinking inventory

D.

Fictitious inventory

Buy Now
Questions 5

Which of the following is not a skimming scheme?

Options:

A.

Unrecorded sales

B.

Fraud & Cost

C.

Theft of checks through the mail

D.

Understated sales and receivables

Buy Now
Questions 6

What can make it easy for an employee to skim sales or receivables?

Options:

A.

Revenue sources and recording procedures

B.

Poor collection and recording procedures

C.

Internal audits and recording procedures

D.

Register manipulations and recording procedures

Buy Now
Questions 7

Which of the following are used in a short-term skimming scheme?

Options:

A.

Unrecorded sales, understated sales, and theft of incoming checks

B.

Unrecorded sales, understated sales, and dual endorsements

C.

False company accounts, understated sales, and theft of incoming checks

D.

Understated sales, theft of incoming checks, and check-for-currency substitutions

Buy Now
Questions 8

Inventory shrinkage is the unaccounted-for reduction in the company’s inventory that does not result from theft.

Options:

A.

True

B.

False

Buy Now
Questions 9

George, a 71-year-old man, receives a fraudulent message on his computer stating that his computer has been infected by a virus. When George calls the phone number listed on the message, he speaks with a fraudster who charges him for computer repair services that are unnecessary. George has MOST LIKELY been victimized by which of the following schemes?

Options:

A.

Pharming

B.

Bait and switch scheme

C.

Tech-support scheme

D.

Smishing

Buy Now
Questions 10

According to a survey, in principal perpetrator cases, males were the primary culprit in a majority of cases, accounting for ___ percent of frauds versus ___ percent for females.

Options:

A.

62 versus 36

B.

61 versus 39

C.

62 versus 37

D.

None of the above

Buy Now
Questions 11

The scheme in which the same vendor is receiving favorable treatment can be found in purchases by vendor searches.

Options:

A.

True

B.

False

Buy Now
Questions 12

A fraudster creates a fictitious identity by combining a person's real government identification number with a fabricated name and birthdate. This scheme can BEST be described as:

Options:

A.

Synthetic identity theft

B.

Simulated identity theft

C.

Traditional identity theft

D.

Criminal identity theft

Buy Now
Questions 13

Employees steal an incoming payment and then place the incoming funds in an interest-bearing account for:

Options:

A.

Converting stolen checks

B.

Concealing the fraud

C.

Short-term skimming

D.

All of the above

Buy Now
Questions 14

Brenda was a cashier at a retail store. When Brenda's friend shopped at the store, she would take her merchandise to Brenda's cash register. Instead of charging her friend, Brenda would record a No-Sale transaction on the register, and her friend would pretend to pay for the merchandise. Brenda's friend would leave the store without paying for the merchandise, and the two would later divide the merchandise between themselves. This scheme can BEST be described as:

Options:

A.

A register disbursement scheme

B.

A false sale scheme

C.

A purchasing and receiving scheme

D.

A skimming scheme

Buy Now
Questions 15

According to SAB 104, for revenue to be considered realized or realizable and earned, which of the following criteria is NOT met?

Options:

A.

Persuasive evidence of an arrangement exists

B.

Services have been rendered

C.

Timings have been met

D.

Collectability is reasonably assured

Buy Now
Questions 16

_________ revenues involve the recording of sales of goods or services that did not occur.

Options:

A.

Fictitious or fabricated revenues

B.

Financial revenues

C.

Red flag revenues

D.

Concealed revenues

Buy Now
Questions 17

In the fraud scale, pressure, opportunity, and integrity variables all result in a list of ___ possible red flags or indicators of occupational fraud and abuse.

Options:

A.

81

B.

82

C.

83

D.

84

Buy Now
Questions 18

Baker, an employee of ABC Corporation, was the only employee who had control of the purchasing function for his department. Baker authorized the purchase of supplies that ABC did not need and used these supplies to make improvements to his house. This is an example of what kind of fraud?

Options:

A.

Pay and return scheme

B.

Personal purchases with company funds

C.

Pass-through scheme

D.

Theft of inventory

Buy Now
Questions 19

Which of the following statements is MOST ACCURATE regarding the methods used for making corrupt payments in corruption schemes?

Options:

A.

Payers often make corrupt payments by providing loans to recipients on favorable terms.

B.

Payers cannot use their credit cards to make corrupt payments because of anti-money laundering rules.

C.

Payers often make corrupt payments by selling property to recipients at prices that are higher than the property's market value.

D.

Payers' promises of favorable treatment are not considered corrupt payments under bribery laws.

Buy Now
Questions 20

Which of the following is TRUE regarding accrual-basis accounting?

Options:

A.

Expenses are recorded in the accounting system when they are paid.

B.

Accrual-basis accounting is simpler to use than cash-basis accounting.

C.

The accrual-basis method focuses on tracking a company's current cash flow.

D.

Revenues are generally recognized when goods are delivered to a customer.

Buy Now
Questions 21

In which phase of the competitive bidding process do fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?

Options:

A.

Need recognition

B.

Solicitation

C.

False specification

D.

Submission

Buy Now
Questions 22

Which of the following search is used for unusually high incidence of returns and allowances scheme?

Options:

A.

Allowances by vendors

B.

Disposals of allowances than reorders

C.

Returns and allowances

D.

None of the above

Buy Now
Questions 23

Joe's automobile insurance policy expired in June. In August, Joe was involved in an automobile accident, and his vehicle was severely damaged. After the accident, Joe contacted his insurance company and reinstated the policy. In September, Joe then submitted a claim with a September accident date for the damages that occurred to his vehicle in August. Joe has engaged in which of the following insurance schemes?

Options:

A.

Staged accident

B.

Inflated damages

C.

Past posting

D.

Vehicle repair

Buy Now
Questions 24

Which of the following is the MOST ACCURATE statement about the different types of malware?

Options:

A.

Spyware is a software program with instructions executed every time a computer is turned on.

B.

A Trojan horse is a hidden program that displays advertisements while the computer is operating.

C.

A computer worm is a program that appears useful but monitors and logs keystrokes.

D.

Ransomware is malicious software that locks the operating system and restricts access to data files.

Buy Now
Questions 25

Which counts sometimes can give rise to inventory theft detection?

Options:

A.

Perpetual inventory counts

B.

Physical inventory counts

C.

Concealment inventory counts

D.

None of the above

Buy Now
Questions 26

Mario performs surgery on a patient to replace a bone. The surgery should be billed using one code, but Mario bills the surgery using three codes (one for the entire surgery, one for the removal of the bone, and another for the insertion of the artificial bone), which increases the cost. Which of the following BEST describes Mario's scheme?

Options:

A.

Fictitious services

B.

False diagnosis

C.

Upcoding

D.

Unbundling

Buy Now
Questions 27

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:

Options:

A.

Human intelligence

B.

Baiting

C.

Scavenging

D.

Open-source intelligence

Buy Now
Questions 28

A journal in which all sales made on credit or cash are listed is:

Options:

A.

Disbursement journal

B.

Accounts receivable journal

C.

Accounts payable journal

D.

General journal

Buy Now
Questions 29

Not having any accounts receivable that are overdue is a common red flag of fictitious revenue schemes.

Options:

A.

True

B.

False

Buy Now
Questions 30

__________ inventory and other assets is a relatively common way for fraudsters to remove assets from the books before or after they are stolen.

Options:

A.

Altered

B.

Perpetual

C.

False shipping slip

D.

Write-offs

Buy Now
Questions 31

Which of the following is a red flag that might indicate that someone is attempting to commit insurance fraud?

Options:

A.

A claim is made soon after an insurance policy commences.

B.

The insured made one other insurance claim within the past five years.

C.

A burglary loss claim includes small electronic items and jewelry.

D.

A theft claim includes items that were purchased recently and the receipts.

Buy Now
Questions 32

Which of the following is a TRUE statement about counterfeit payment cards?

Options:

A.

The hologram on payment cards is relatively simple to reproduce.

B.

The production of counterfeit payment cards is too complicated for the use of high-speed printers.

C.

Counterfeit payment cards can be created with blank plastic cards.

D.

All of the above are true statements about counterfeit payment cards.

Buy Now
Questions 33

Fraud in financial statements generally takes the form of _______ assets or revenue and _______ liabilities and expenses.

Options:

A.

Understated; overstated

B.

Overstated; understated

C.

Overstated; overstated

D.

Understated; understated

Buy Now
Questions 34

Which of the following is NOT the aspect of inventory purchase?

Options:

A.

Inventory purchases purposely increase in year 1 only to be liquidated in year 2.

B.

Inventory for year 2 will be much greater than year 1.

C.

Increased sales in year 2 are unexpected and purchase of inventory does not keep pace with the sales.

D.

Might be some fraud scheme in inventory.

Buy Now
Questions 35

In which of the following process, all bidders are legally supposed to be placed on the same plane of equality, bidding on the same terms and conditions?

Options:

A.

Bid-rigging

B.

Kickbacks

C.

Competitive bidding

D.

Bid solicitation

Buy Now
Questions 36

_________ normally are carried on an organization’s books as expenses because they tend to be consumed by the organization within a year of purchase.

Options:

A.

Supplies

B.

Expenses

C.

Assets

D.

Equity

Buy Now
Questions 37

Horizontal analysis can BEST be described as:

Options:

A.

A technique for analyzing the relationships among items on the financial statement where components are expressed as percentages of a specified base value.

B.

A technique for measuring the relationship between any two different financial statement amounts.

C.

A technique for analyzing the percentage change in individual line items on a financial statement from one accounting period to the next accounting period.

D.

A technique for comparing the performance of different companies in the same industry for an extended period.

Buy Now
Questions 38

Which of the following statements about competitive intelligence is CORRECT?

Options:

A.

Competitive intelligence is considered a legitimate business function.

B.

Competitive intelligence refers to government-sanctioned activities conducted to collect protected information from a foreign government.

C.

Competitive intelligence and corporate espionage describe identical practices.

D.

Competitive intelligence involves the use of illegal, covert means to acquire information for commercial purposes.

Buy Now
Questions 39

Which of the following scenarios is the MOST ACCURATE example of insurer health care fraud?

Options:

A.

While acting as an intermediary for a government health care program, the insurance company verifies provider claims before billing the government for them.

B.

To obtain regulatory approval for increasing its rates, the insurance company submits inflated cost data for review.

C.

After negotiating discounts with its medical providers, the insurance company provides the negotiated rate to its consumers instead of the original amount.

D.

Upon identifying that a claimant has provided incomplete information, the insurance company refuses to pay a claim.

Buy Now
Questions 40

Which of the following is a red flag that might indicate the existence of a need recognition scheme?

Options:

A.

The purchasing entity has an unusually large list of backup suppliers available.

B.

The purchasing entity's materials are not being ordered at the optimal reorder point.

C.

The purchasing entity identifies a need that can be met by various suppliers.

D.

The purchasing entity does not have high requirements for stock and inventory levels.

Buy Now
Questions 41

Which of the following actions would balance the accounting equation to conceal the misappropriation of cash?

Options:

A.

Increasing another asset

B.

Increasing owners' equity

C.

Increasing a liability

D.

Creating fictitious revenue

Buy Now
Questions 42

Which of the following is NOT a measure that is commonly taken by fraudsters during account takeover schemes?

Options:

A.

Placing orders for products or transferring funds from the overtaken accounts

B.

Ensuring that the contact information for the overtaken account remains the same to avoid alerting the true account holder

C.

Using log-in credentials that have been stolen from one account to attempt to gain access to other payment accounts

D.

Obtaining email addresses and other account log-in information by sending phishing emails

Buy Now
Questions 43

The _______________ cost method of pricing would carry an asset’s value on the financial statements as what it would currently cost, considering inflation.

Options:

Buy Now
Questions 44

Perceived certainty of detection is directly related to employee theft for respondents in all industry sectors, that is, the stronger the perception that theft would be detected, the more the likelihood that the employee would engage in deviant behavior.

Options:

A.

True

B.

False

Buy Now
Questions 45

The price of an asset on which the asset is selling at on the open market in a transaction between a willing buyer and a willing seller is called:

Options:

A.

Absolute value

B.

Fair value

C.

Cost value

D.

Material value

Buy Now
Questions 46

All the following are basic methods used to prove corrupt payments in corruption schemes EXCEPT:

Options:

A.

Making inquiries to the relevant Administration of Taxation

B.

Secretly infiltrating ongoing transactions

C.

Using an inside witness

D.

Identifying and tracing payments through audit steps

Buy Now
Questions 47

A ____________ can be very costly for an organization to undertake, both in terms of money and time spent.

Options:

Buy Now
Questions 48

When a victim company purchases unnecessary goods or services from a supplier at the direction of the corrupt employee, this results in:

Options:

A.

Presolicitation scheme

B.

Need recognition scheme

C.

False sole-source scheme

D.

Submission scheme

Buy Now
Questions 49

_____________ involves purposeful misreporting of financial information about the organization that is intended to mislead those who read it.

Options:

A.

Fraudulent statement

B.

Corruption

C.

Asset misappropriations

D.

None of the above

Buy Now
Questions 50

Delivery has not occurred or services have not been rendered when:

Options:

A.

Until installation and customer testing and acceptance has occurred.

B.

A written order exists but contains a right of return.

C.

Both A & B

D.

Neither A nor B

Buy Now
Questions 51

A __________ is a day-by-day, or chronological, record of transactions.

Options:

A.

Asset

B.

Journal

C.

Checkbook

D.

Ledger

Buy Now
Questions 52

Which of the following is a method of identity theft prevention that is recommended for individuals?

Options:

A.

Do not reuse passwords for more than two accounts.

B.

Install security updates and patches for personal computers annually.

C.

Only use email to send personal information when contacting reputable organizations.

D.

Use biometric authentication when it is available.

Buy Now
Questions 53

In what type of fraud scheme does an employee steal cash after it has appeared on the company’s books?

Options:

A.

Cash larceny scheme

B.

Unrecorded sales (skimming) scheme

C.

Kickback scheme

D.

Understated sales (skimming) scheme

Buy Now
Questions 54

Black, an accounts receivable clerk, stole Customer A's monthly payment instead of posting it to A's account. When Customer B's payment arrives a few days later, Black applies the payment to Customer A's account. When Customer C's payment arrives a few days after that, Black applies it to Customer B's account. Black's method of crediting one account with money taken from another account is known as:

Options:

A.

Padding

B.

Lapping

C.

Substitution

D.

Daisy chain

Buy Now
Questions 55

Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail and recording the receipt of payments.

Options:

A.

Single employee

B.

Two employees

C.

More than two employees

D.

None of the above

Buy Now
Questions 56

The excess credits (or debits) on the income statement are used to decrease (or increase) the equity account.

Options:

A.

True

B.

False

Buy Now
Questions 57

Ada uses her mother’s government identification card to impersonate her mother and obtain health care for herself under her mother’s insurance benefits. Which type of patient health care fraud scheme is Ada MOST LIKELY committing?

Options:

A.

Misrepresentations fraud

B.

Fictitious claims fraud

C.

Third-party fraud

D.

Multiple claims fraud

Buy Now
Questions 58

A fraudster uses a victim’s name, government identification number, and birthdate to impersonate the victim and open a credit card account in the victim’s name. This scheme can BEST be described as:

Options:

A.

New account identity theft

B.

Traditional identity theft

C.

Synthetic identity theft

D.

Criminal identity theft

Buy Now
Questions 59

If the assets are intentionally purchased by the company but simply misappropriated by the fraudster, this is referred to as:

Options:

A.

Inventory larceny scheme

B.

Asset receiving scheme

C.

Fraudulent purchase

D.

Falsify shipping

Buy Now
Questions 60

Which of the following is NOT an example of bribery prevention policies?

Options:

A.

Reporting gifts

B.

Discounts

C.

Business meetings

D.

Resource diversions

Buy Now
Questions 61

According to Hollinger and Clark, for policy development, management must pay attention to:

Options:

A.

A clear understanding regarding theft behavior

B.

Enforcement of sanctions

C.

Both A & B

D.

Neither A nor B

Buy Now
Questions 62

Any expenses that are incurred but not paid by the end of the year are counted in our records of profit and loss, and are called:

Options:

A.

Accruals

B.

Depreciations

C.

Expenses

D.

Financial record

Buy Now
Questions 63

Which of the following is FALSE regarding electronic payment tampering?

Options:

A.

Positive pay is recommended for ACH transactions to ensure their legitimacy.

B.

ACH blocks allow account holders to notify their banks that ACH debits should not be allowed on specific accounts.

C.

The lack of physical evidence makes electronic payment tampering more difficult to detect than traditional check tampering.

D.

The individual who makes electronic payments on behalf of the company should also set ACH filters to ensure that only designated individuals are paid.

Buy Now
Questions 64

When an employee processes a fictitious refund of goods, the amount of cash in the register does not balance with the register log.

Options:

A.

True

B.

False

Buy Now
Questions 65

Several people who work in real estate collude to obtain a loan for the construction of a residential building on a property that does not exist. The co-conspirators divide the proceeds among themselves and leave the lender with no collateral to seize when loan payments are not made. Which of the following BEST describes this scheme?

Options:

A.

Property flopping

B.

Air loan

C.

Phantom lien

D.

Daisy chain

Buy Now
Questions 66

According to Marshall, ______ are probable future economic benefits obtained or controlled by a particular entity as a result of past transactions or events.

Options:

A.

Assets

B.

Liabilities

C.

Credentials

D.

None of the above

Buy Now
Questions 67

Which of the following statements is TRUE regarding income statements?

Options:

A.

Gross revenue is the total amount of sales after deductions are applied.

B.

Net profit is a company's earnings before operating expenses have been deducted.

C.

Gross profit is the difference between net sales and cost of goods sold.

D.

A company's operating expenses are usually listed as the first line item.

Buy Now
Questions 68

Which of the following is an insurance fraud detection tool used for identifying funds fraudulently sent to fictitious payees by using computer-generated reports to compare payments sent to the same location?

Options:

A.

Duplicate payment lists

B.

Address similarity reports

C.

Exception reports

D.

Electronic confirmations

Buy Now
Questions 69

Which of the following is a method that a fraudster might use to conceal inventory shrinkage?

Options:

A.

Selling merchandise without recording the sale

B.

Writing off stolen inventory as scrap

C.

Falsely increasing the perpetual inventory record

D.

All of the above

Buy Now
Questions 70

Which of the following is a TRUE statement regarding check fraud?

Options:

A.

Most perpetrators of check fraud are caught and prosecuted.

B.

The equipment required to commit check fraud is relatively inexpensive.

C.

The penalties for committing check fraud are relatively severe.

D.

None of the above statements are true.

Buy Now
Exam Name: Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam
Last Update: Jan 19, 2026
Questions: 235

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99