New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

ACFE CFE-Financial-Transactions-and-Fraud-Schemes Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Exam Practice Test

Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers

Question 1

A typical issue involving materiality and fraud would be:

Options:

A.

Fraudulent statement

B.

Misappropriations

C.

Civil lawsuit

D.

Quality control

Question 2

Financial statement fraud is BEST described as the intentional or accidental misstatement of amounts in the financial statements.

Options:

A.

True

B.

False

Question 3

The scheme in which the same vendor is receiving favorable treatment can be found in purchases by vendor searches.

Options:

A.

True

B.

False

Question 4

Otto, a bank manager, purchases a new boat that he cannot afford. Knowing that one of the bank customers is an older client who does not regularly check their account, Otto takes money from the customer's account to make his boat payments. To conceal the missing amount, Otto adjusts the bank's general ledger. Which of the following BEST describes Otto's scheme?

Options:

A.

Unauthorized disbursement of funds

B.

Moving money from dormant accounts

C.

False accounting entry

D.

Unauthorized withdrawal

Question 5

Forced reconciliation of the account says:

Options:

A.

To conceal shrinkage is to alter inventory record so that it matches the physical inventory count.

B.

To conceal inventory is to alter shrinkage record so that it matches the physical inventory count.

C.

To conceal shrinkage is to change the perpetual inventory record so that it matches the physical inventory count.

D.

To conceal write-offs is to change the perpetual inventory record so that it matches the physical inventory count.

Question 6

The excess credits (or debits) on the income statement are used to decrease (or increase) the equity account.

Options:

A.

True

B.

False

Question 7

_________ revenues involve the recording of sales of goods or services that did not occur.

Options:

A.

Fictitious or fabricated revenues

B.

Financial revenues

C.

Red flag revenues

D.

Concealed revenues

Question 8

Which of the following is a common red flag of a bid tailoring scheme?

Options:

A.

The procuring entity's request for bid submissions provides clear bid submission information.

B.

There are unusually narrow specifications for the type of goods being procured.

C.

The procuring entity rebids contracts because fewer than the minimum number of bids are received.

D.

Numerous bidders respond to the procuring entity's bid requests.

Question 9

Which of the following is a red flag that might indicate that someone is attempting to commit insurance fraud?

Options:

A.

A claim is made soon after an insurance policy commences.

B.

The insured made one other insurance claim within the past five years.

C.

A burglary loss claim includes small electronic items and jewelry.

D.

A theft claim includes items that were purchased recently and the receipts.

Question 10

By what accountant means that the financial figures presented by the company are at least as much as reflected in the statements, if not more.

Options:

A.

Fraudulent statement

B.

Misappropriations

C.

Conservatism

D.

Matching

Question 11

Black, an accounts receivable clerk, stole Customer A's monthly payment instead of posting it to A's account. When Customer B's payment arrives a few days later, Black applies the payment to Customer A's account. When Customer C's payment arrives a few days after that, Black applies it to Customer B's account. Black's method of crediting one account with money taken from another account is known as:

Options:

A.

Padding

B.

Lapping

C.

Substitution

D.

Daisy chain

Question 12

Which of the following scenarios is the MOST ACCURATE example of insurer health care fraud?

Options:

A.

While acting as an intermediary for a government health care program, the insurance company verifies provider claims before billing the government for them.

B.

To obtain regulatory approval for increasing its rates, the insurance company submits inflated cost data for review.

C.

After negotiating discounts with its medical providers, the insurance company provides the negotiated rate to its consumers instead of the original amount.

D.

Upon identifying that a claimant has provided incomplete information, the insurance company refuses to pay a claim.

Question 13

A __________ is a day-by-day, or chronological, record of transactions.

Options:

A.

Asset

B.

Journal

C.

Checkbook

D.

Ledger

Question 14

Persuasive evidence of an arrangement does not exist when:

Options:

A.

Revenue and corresponding expenses don’t match each other.

B.

No written or verbal agreement exists.

C.

Timings not meet properly.

D.

Capitalized expenses and Liabilities will not be up to satisfied level.

Question 15

Any expenses that are incurred but not paid by the end of the year are counted in our records of profit and loss, and are called:

Options:

A.

Accruals

B.

Depreciations

C.

Expenses

D.

Financial record

Question 16

Which of the following is an insurance fraud detection tool used for identifying funds fraudulently sent to fictitious payees by using computer-generated reports to compare payments sent to the same location?

Options:

A.

Duplicate payment lists

B.

Address similarity reports

C.

Exception reports

D.

Electronic confirmations

Question 17

Which of the following is NOT a red flag of register disbursement schemes?

Options:

A.

There are gaps in the transaction numbers on the register log.

B.

Personal checks from cashiers are found in the cash register.

C.

Voids just over the review limit have been approved by a supervisor.

D.

Cashiers are authorized to void their own transactions.

Question 18

A running count that records how much inventory should be on hand is referred to:

Options:

A.

Altered inventory

B.

Perpetual inventory

C.

Shrinking inventory

D.

Fictitious inventory

Question 19

The essential elements of a ________ are an actual or constructive taking away of the goods or property of another without the consent and against the will of the owner and with a felonious intent.

Options:

A.

Larceny

B.

Abuse

C.

Fiduciary

D.

None of the above

Question 20

Which of the following is one of the sections on the statement of cash flows?

Options:

A.

Cash flows from purchasing activities

B.

Cash flows from financing activities

C.

Cash flows from earnings activities

D.

Cash flows from strategic activities

Question 21

Which of the following is NOT the aspect of inventory purchase?

Options:

A.

Inventory purchases purposely increase in year 1 only to be liquidated in year 2.

B.

Inventory for year 2 will be much greater than year 1.

C.

Increased sales in year 2 are unexpected and purchase of inventory does not keep pace with the sales.

D.

Might be some fraud scheme in inventory.

Question 22

Which of the following is NOT an example of bribery prevention policies?

Options:

A.

Reporting gifts

B.

Discounts

C.

Business meetings

D.

Resource diversions

Question 23

__________ are the amounts which are owed to other entities:

Options:

A.

Supplies

B.

Expenses

C.

Assets

D.

Liabilities

Question 24

Jonathan, a Certified Fraud Examiner (CFE), is tasked with identifying potential indicators of intrusion into his employer's computer network. Which of the following might indicate that the organization's network has been compromised or accessed without authorization?

Options:

A.

When logging into the computer network, employees receive a reminder to change their log-in passwords before they expire.

B.

Network users are prompted to install unfamiliar software onto their computers.

C.

The network is receiving data from a country where one of the organization's suppliers is located.

D.

Users are denied access to network files they do not typically use in their organizational role.

Question 25

Placing any restriction in the solicitation documents that tend to restrict competition is called prebid solicitation.

Options:

A.

True

B.

False

Question 26

Which of the following is an example of a technical security control that organizations can use to secure computer systems and communication networks?

Options:

A.

Application security

B.

Human audits

C.

Penetration testing

D.

Data security

Question 27

Which of the following is an example of a corruption scheme?

Options:

A.

Two coworkers steal confidential information from their employer and use the stolen data to start a competing business.

B.

A vendor offers the use of a beach house to a government procurement agent for free after the agent awards a contract to the vendor.

C.

A warehouse manager receives twenty laptops in a shipment but excludes five of the laptops from the records so that they can be sold to third parties.

D.

A public company omits recurring costs from its financial statements to make the company appear more profitable than it is.

Question 28

Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?

Options:

A.

Pharming is the practice of changing a victim's email or mailing address so that the identity thief receives the victim's mail.

B.

Dumpster diving involves searching for sensitive personal information on used computers that have been purchased from a reseller.

C.

Shoulder surfing is the practice of exploiting another person's access capability to gain access to restricted areas.

D.

Baiting involves leaving flash drives or similar items that have been infected with malware in places where people are likely to find them.

Question 29

Which of the following is the criterion for bid solicitation?

Options:

A.

Containing false statements

B.

Allowing the purchaser to discuss possible employment with the contractor

C.

To withdraw low bids

D.

To falsify the bid log

Question 30

Joe's automobile insurance policy expired in June. In August, Joe was involved in an automobile accident, and his vehicle was severely damaged. After the accident, Joe contacted his insurance company and reinstated the policy. In September, Joe then submitted a claim with a September accident date for the damages that occurred to his vehicle in August. Joe has engaged in which of the following insurance schemes?

Options:

A.

Staged accident

B.

Inflated damages

C.

Past posting

D.

Vehicle repair

Question 31

A method for gaining unauthorized access to a computer system whereby the attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme is known as:

Options:

A.

IP spoofing

B.

Electronic piggybacking

C.

Packet sniffing

D.

Social engineering

Question 32

Which of the following situations describes a red flag that might be indicative of loan fraud?

Options:

A.

A loan file contains missing documents that are later found in another file.

B.

There is low turnover in a real estate developer's personnel.

C.

A change order is submitted at the same time as a draw request.

D.

The number of change orders for a small project continues to increase.

Question 33

___________ allows the fraud examiner to inspect key attributes on a smaller portion (or sample) of those documents.

Options:

Question 34

Accounting records are designed to be kept on subjective rather than objective evidence.

Options:

A.

True

B.

False

Question 35

__________ may be defined as the offering, giving, receiving, or soliciting anything of value to influence an official act.

Options:

A.

Corruption

B.

Diverting business to vendors

C.

Bribery

D.

Lacking approval authority

Question 36

Which of the following is a method that a fraudster might use to conceal inventory shrinkage?

Options:

A.

Selling merchandise without recording the sale

B.

Writing off stolen inventory as scrap

C.

Falsely increasing the perpetual inventory record

D.

All of the above

Question 37

Which of the following is NOT a justifiable reason to depart from generally accepted accounting principles (GAAP)?

Options:

A.

The expected costs associated with following GAAP would exceed the expected benefits of compliance.

B.

It is likely that assets would be understated and liabilities would be overstated.

C.

A transaction is considered immaterial and therefore irrelevant to the accurate interpretation of financial statements.

D.

The application of GAAP could produce misleading financial statements.

Question 38

Employees steal an incoming payment and then place the incoming funds in an interest-bearing account for:

Options:

A.

Converting stolen checks

B.

Concealing the fraud

C.

Short-term skimming

D.

All of the above

Question 39

Which of the four basic measures, if properly installed and implemented, may help prevent inventory fraud?

Options:

A.

Proper documentation, segregation of duties, independent checks, and physical safeguards

B.

Proper documentation, segregation of duties, independent checks, and inventory control

C.

Proper documentation, physical padding, independent checks, and physical safeguards

D.

Prenumbered affiliations, segregation of duties, independent checks, and physical safeguards

Question 40

According to SAB 104, for revenue to be considered realized or realizable and earned, which of the following criteria is NOT met?

Options:

A.

Persuasive evidence of an arrangement exists

B.

Services have been rendered

C.

Timings have been met

D.

Collectability is reasonably assured

Question 41

Larceny by fraud or deception means that:

Options:

A.

Creates or reinforces a false impression

B.

Fails to correct a false impression

C.

Fails to disclose a known lien, adverse claim, or other legal impediment

D.

All of the above

Question 42

Which of the following statements is MOST ACCURATE regarding the methods used for making corrupt payments in corruption schemes?

Options:

A.

Payers often make corrupt payments by providing loans to recipients on favorable terms.

B.

Payers cannot use their credit cards to make corrupt payments because of anti-money laundering rules.

C.

Payers often make corrupt payments by selling property to recipients at prices that are higher than the property's market value.

D.

Payers' promises of favorable treatment are not considered corrupt payments under bribery laws.

Question 43

If the assets are intentionally purchased by the company but simply misappropriated by the fraudster, this is referred to as:

Options:

A.

Inventory larceny scheme

B.

Asset receiving scheme

C.

Fraudulent purchase

D.

Falsify shipping

Question 44

Larceny is the scheme in which an employee simply takes inventory from the company premises without attempting to conceal it in the books and records.

Options:

A.

True

B.

False

Question 45

________ decrease assets and expenses and/or increase liabilities and/or equity.

Options:

A.

Journal Entries

B.

Debit

C.

Credit

D.

None of all

Question 46

Jorge, a Certified Fraud Examiner (CFE), is investigating a tip involving an accountant at a bank who allegedly adjusted the bank’s general ledger to conceal the theft of funds from a customer’s account. If Jorge finds evidence that proves the allegation, which of the following BEST describes the accountant’s scheme?

Options:

A.

Unauthorized withdrawal

B.

False accounting entry

C.

Moving money from inactive accounts

D.

Unauthorized disbursement of funds

Question 47

The person or persons who have access to __________ are often the targets of unethical vendors seeking an advantage in the process.

Options:

A.

Bid-splitting

B.

Sealed bids

C.

General purchasing

D.

Tailor specifications

Question 48

Which of the following is NOT a medium that commonly causes an organization's proprietary information to be compromised?

Options:

A.

Reports to company shareholders

B.

Documents that were shredded using a cross-cut shredder

C.

Speeches made by executives

D.

Information displayed at an employee's workstation

Question 49

_________ assumes the business will go on indefinitely in the future.

Options:

A.

Materiality

B.

Going concern

C.

Cost

D.

Fair value

Question 50

Delivery has not occurred or services have not been rendered when:

Options:

A.

Until installation and customer testing and acceptance has occurred.

B.

A written order exists but contains a right of return.

C.

Both A & B

D.

Neither A nor B

Question 51

Which of the following actions would balance the accounting equation to conceal the misappropriation of cash?

Options:

A.

Increasing another asset

B.

Increasing owners' equity

C.

Increasing a liability

D.

Creating fictitious revenue

Question 52

When expenses used to produce income—all of them—should be matched in a consistent manner against that income, this is referred to:

Options:

A.

Equity

B.

Accrual basis accounting

C.

Expense

D.

Financial record

Question 53

Ada uses her mother’s government identification card to impersonate her mother and obtain health care for herself under her mother’s insurance benefits. Which type of patient health care fraud scheme is Ada MOST LIKELY committing?

Options:

A.

Misrepresentations fraud

B.

Fictitious claims fraud

C.

Third-party fraud

D.

Multiple claims fraud

Question 54

________, one of the synonyms for fraud, implies deceiving so thoroughly as to obscure the truth.

Options:

A.

Deceive

B.

Delude

C.

Mislead

D.

Beguile

Question 55

Which of the following is a TRUE statement about counterfeit payment cards?

Options:

A.

The hologram on payment cards is relatively simple to reproduce.

B.

The production of counterfeit payment cards is too complicated for the use of high-speed printers.

C.

Counterfeit payment cards can be created with blank plastic cards.

D.

All of the above are true statements about counterfeit payment cards.

Question 56

Which of the following would be helpful in detecting a cash larceny scheme?

Options:

A.

Having the accounts receivable clerk prepare the bank deposit

B.

Prohibiting employees from performing the duties of an absent employee

C.

Reconciling cash register totals to the amount of cash in the register drawer

D.

Requiring cashiers to perform cash counts of their own cash registers at the end of each shift

Question 57

A variation between the physical inventory and the perpetual inventory totals is called:

Options:

A.

Altered inventory

B.

Account receivable

C.

Shrinkage

D.

Write-offs

Question 58

Which of the following is true for red flags associated with fictitious revenues?

Options:

A.

Slow growth or unusual profitability, when not compared to other companies in the same industry.

B.

Unusual growth in the number of days’ purchases in receivables.

C.

A significant volume of sales to entities whose substance and ownership is not known.

D.

An unusual surge in purchases by a majority of units within a company, or of purchases recorded by corporate headquarters.

Question 59

Several people who work in real estate collude to obtain a loan for the construction of a residential building on a property that does not exist. The co-conspirators divide the proceeds among themselves and leave the lender with no collateral to seize when loan payments are not made. Which of the following BEST describes this scheme?

Options:

A.

Property flopping

B.

Air loan

C.

Phantom lien

D.

Daisy chain

Question 60

Assets that are long-lived and that differ from property, plant, and equipment that has been purchased outright or acquired under a capital lease are:

Options:

A.

Tangible Assets

B.

Intangible Assets

C.

Forced Assets

D.

None of the above

Question 61

Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?

Options:

A.

Restricting other employees from performing the duties of an absent employee

B.

Assigning the duties of depositing cash receipts and performing bank reconciliations to different employees

C.

Having all employees use the same cash register for their transactions

D.

Keeping employees unaware that the company performs surprise cash counts

Question 62

____________ is a summary of the account balances carried in a ledger.

Options:

A.

Balance sheet

B.

Income statement

C.

Financial statement

D.

General journal

Question 63

Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?

Options:

A.

Kickback scheme

B.

Illegal gratuity scheme

C.

Diversion scheme

D.

Economic extortion scheme

Question 64

Which of the following are the classifications for Corruption?

Options:

A.

Bribery, economic extortion, illegal gratuities, and conflicts of interest

B.

Corruption, bribery, economic extortion, conflicts of interest

C.

Overbilling, bribery, bid-rigging, and illegal gratuities

D.

Economic extortion, bribery, illegal gratuities, and corruption

Question 65

A ____________ can be very costly for an organization to undertake, both in terms of money and time spent.

Options:

Question 66

People commit financial statement fraud to:

Options:

A.

Conceal false business performances

B.

Preserve personal status/control

C.

Maintain personal income

D.

Stand outside the accounting system

Question 67

A fraudster poses as ABC Organization's chief executive officer (CEO) and sends an email to an employee requesting that company funds be transferred to an account that the fraudster owns. This is an example of which of the following types of fraud schemes?

Options:

A.

Reverse social engineering

B.

Executive email attack

C.

Electronic piggybacking

D.

Business email compromise

Question 68

Physical assets including _________ and ________ are the most commonly misappropriated noncash assets in our study.

Options:

A.

Interest & Collusion

B.

Inventory & Equipment

C.

Inventory & Purchase

D.

Sales & Equipment

Question 69

Cynthia receives a fraudulent text message that appears to be from her credit card company. The message claims that the company has detected suspicious card transactions and provides a link for her to click to sign into her account for more information. Cynthia is MOST LIKELY being targeted by which of the following types of social engineering schemes?

Options:

A.

Vishing

B.

Smishing

C.

Catfishing

D.

Pharming

Question 70

_____________ involves purposeful misreporting of financial information about the organization that is intended to mislead those who read it.

Options:

A.

Fraudulent statement

B.

Corruption

C.

Asset misappropriations

D.

None of the above