A typical issue involving materiality and fraud would be:
Financial statement fraud is BEST described as the intentional or accidental misstatement of amounts in the financial statements.
The scheme in which the same vendor is receiving favorable treatment can be found in purchases by vendor searches.
Otto, a bank manager, purchases a new boat that he cannot afford. Knowing that one of the bank customers is an older client who does not regularly check their account, Otto takes money from the customer's account to make his boat payments. To conceal the missing amount, Otto adjusts the bank's general ledger. Which of the following BEST describes Otto's scheme?
Forced reconciliation of the account says:
The excess credits (or debits) on the income statement are used to decrease (or increase) the equity account.
_________ revenues involve the recording of sales of goods or services that did not occur.
Which of the following is a common red flag of a bid tailoring scheme?
Which of the following is a red flag that might indicate that someone is attempting to commit insurance fraud?
By what accountant means that the financial figures presented by the company are at least as much as reflected in the statements, if not more.
Black, an accounts receivable clerk, stole Customer A's monthly payment instead of posting it to A's account. When Customer B's payment arrives a few days later, Black applies the payment to Customer A's account. When Customer C's payment arrives a few days after that, Black applies it to Customer B's account. Black's method of crediting one account with money taken from another account is known as:
Which of the following scenarios is the MOST ACCURATE example of insurer health care fraud?
A __________ is a day-by-day, or chronological, record of transactions.
Persuasive evidence of an arrangement does not exist when:
Any expenses that are incurred but not paid by the end of the year are counted in our records of profit and loss, and are called:
Which of the following is an insurance fraud detection tool used for identifying funds fraudulently sent to fictitious payees by using computer-generated reports to compare payments sent to the same location?
Which of the following is NOT a red flag of register disbursement schemes?
A running count that records how much inventory should be on hand is referred to:
The essential elements of a ________ are an actual or constructive taking away of the goods or property of another without the consent and against the will of the owner and with a felonious intent.
Which of the following is one of the sections on the statement of cash flows?
Which of the following is NOT the aspect of inventory purchase?
Which of the following is NOT an example of bribery prevention policies?
__________ are the amounts which are owed to other entities:
Jonathan, a Certified Fraud Examiner (CFE), is tasked with identifying potential indicators of intrusion into his employer's computer network. Which of the following might indicate that the organization's network has been compromised or accessed without authorization?
Placing any restriction in the solicitation documents that tend to restrict competition is called prebid solicitation.
Which of the following is an example of a technical security control that organizations can use to secure computer systems and communication networks?
Which of the following is an example of a corruption scheme?
Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?
Which of the following is the criterion for bid solicitation?
Joe's automobile insurance policy expired in June. In August, Joe was involved in an automobile accident, and his vehicle was severely damaged. After the accident, Joe contacted his insurance company and reinstated the policy. In September, Joe then submitted a claim with a September accident date for the damages that occurred to his vehicle in August. Joe has engaged in which of the following insurance schemes?
A method for gaining unauthorized access to a computer system whereby the attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme is known as:
Which of the following situations describes a red flag that might be indicative of loan fraud?
___________ allows the fraud examiner to inspect key attributes on a smaller portion (or sample) of those documents.
Accounting records are designed to be kept on subjective rather than objective evidence.
__________ may be defined as the offering, giving, receiving, or soliciting anything of value to influence an official act.
Which of the following is a method that a fraudster might use to conceal inventory shrinkage?
Which of the following is NOT a justifiable reason to depart from generally accepted accounting principles (GAAP)?
Employees steal an incoming payment and then place the incoming funds in an interest-bearing account for:
Which of the four basic measures, if properly installed and implemented, may help prevent inventory fraud?
According to SAB 104, for revenue to be considered realized or realizable and earned, which of the following criteria is NOT met?
Larceny by fraud or deception means that:
Which of the following statements is MOST ACCURATE regarding the methods used for making corrupt payments in corruption schemes?
If the assets are intentionally purchased by the company but simply misappropriated by the fraudster, this is referred to as:
Larceny is the scheme in which an employee simply takes inventory from the company premises without attempting to conceal it in the books and records.
________ decrease assets and expenses and/or increase liabilities and/or equity.
Jorge, a Certified Fraud Examiner (CFE), is investigating a tip involving an accountant at a bank who allegedly adjusted the bank’s general ledger to conceal the theft of funds from a customer’s account. If Jorge finds evidence that proves the allegation, which of the following BEST describes the accountant’s scheme?
The person or persons who have access to __________ are often the targets of unethical vendors seeking an advantage in the process.
Which of the following is NOT a medium that commonly causes an organization's proprietary information to be compromised?
_________ assumes the business will go on indefinitely in the future.
Delivery has not occurred or services have not been rendered when:
Which of the following actions would balance the accounting equation to conceal the misappropriation of cash?
When expenses used to produce income—all of them—should be matched in a consistent manner against that income, this is referred to:
Ada uses her mother’s government identification card to impersonate her mother and obtain health care for herself under her mother’s insurance benefits. Which type of patient health care fraud scheme is Ada MOST LIKELY committing?
________, one of the synonyms for fraud, implies deceiving so thoroughly as to obscure the truth.
Which of the following is a TRUE statement about counterfeit payment cards?
Which of the following would be helpful in detecting a cash larceny scheme?
A variation between the physical inventory and the perpetual inventory totals is called:
Which of the following is true for red flags associated with fictitious revenues?
Several people who work in real estate collude to obtain a loan for the construction of a residential building on a property that does not exist. The co-conspirators divide the proceeds among themselves and leave the lender with no collateral to seize when loan payments are not made. Which of the following BEST describes this scheme?
Assets that are long-lived and that differ from property, plant, and equipment that has been purchased outright or acquired under a capital lease are:
Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?
____________ is a summary of the account balances carried in a ledger.
Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?
Which of the following are the classifications for Corruption?
A ____________ can be very costly for an organization to undertake, both in terms of money and time spent.
People commit financial statement fraud to:
A fraudster poses as ABC Organization's chief executive officer (CEO) and sends an email to an employee requesting that company funds be transferred to an account that the fraudster owns. This is an example of which of the following types of fraud schemes?
Physical assets including _________ and ________ are the most commonly misappropriated noncash assets in our study.
Cynthia receives a fraudulent text message that appears to be from her credit card company. The message claims that the company has detected suspicious card transactions and provides a link for her to click to sign into her account for more information. Cynthia is MOST LIKELY being targeted by which of the following types of social engineering schemes?
_____________ involves purposeful misreporting of financial information about the organization that is intended to mislead those who read it.