Which of the following scenarios BEST describes an electronic funds transfer (EFT) fraud scheme?
A special scheme in which employees know their employer is seeking to purchase a certain asset and take advantage of the situation by purchasing the asset themselves is:
A client contacts Emma, a Certified Fraud Examiner (CFE), and explains that they prepaid a commission to a broker for help with obtaining a loan. However, after sending the payment for services, the client did not receive a response from the broker and is unable to contact them. This type of fraud is known as a(n):
According to a survey, in principal perpetrator cases, males were the primary culprit in a majority of cases, accounting for ___ percent of frauds versus ___ percent for females.
Which of the following statements is MOST ACCURATE regarding financial reporting practices and accounting frameworks, such as U.S. generally accepted accounting principles (GAAP) and International Financial Reporting Standards (IFRS)?
Jorge, a Certified Fraud Examiner (CFE), is investigating a tip involving an accountant at a bank who allegedly adjusted the bank’s general ledger to conceal the theft of funds from a customer’s account. If Jorge finds evidence that proves the allegation, which of the following BEST describes the accountant’s scheme?
Which of the following is NOT a justifiable reason to depart from generally accepted accounting principles (GAAP)?
Which of the following offender types are people who take the money and run away?
__________ means that traditional bribery statutes proscribe only payments made to influence the decisions of government agents or employees.
Which of the following is NOT a medium that commonly causes an organization's proprietary information to be compromised?
The act of an official or fiduciary person who unlawfully and wrongfully uses his station or character to procure some benefit, contrary to duty and rights of others, is called:
Which of the following search is used for unusually high incidence of returns and allowances scheme?
Which of the following is an example of a technical security control that organizations can use to secure computer systems and communication networks?
According to accounting principles, ________ and ________ should be recorded or matched in the same accounting period; failing to do so violates the matching principle of GAAP.
Which of the following is NOT the reason why senior management will overstate business statements?
Which of the following is a method that might be used to fraudulently overstate the inventory balance?
Occupational fraud and abuse is a (an) __________ of doing business, in much the same way that we pay expenses for electricity, taxes, and wages.
A ____________ can be very costly for an organization to undertake, both in terms of money and time spent.
A fraudster creates a fictitious identity by combining a person's real government identification number with a fabricated name and birthdate. This scheme can BEST be described as:
To detect fraud committed by a health care provider, a fraud examiner should look for which of the following red flags?
How many accounts are affected in fraudulent accounting entries and therefore the same number of categories on the financial statement?
Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?
Organizations that had external audits actually had higher median losses and longer-lasting fraud schemes than those organizations that were not audited.
According to SAB 104, for revenue to be considered realized or realizable and earned, which of the following criteria is NOT met?
In ____________ scheme, a supplier pays an employee of the purchasing company to write specifications that will require amendments at a later date.
When situational pressures and perceived opportunities are low and personal integrity is high, occupational fraud is much more likely to occur than when the opposite is true.
Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?
By removing a tangible asset from the business (a debit), the books will be ___________ by the exact amount of the tangible asset misappropriated.
Which of the following would be MOST INDICATIVE of loan fraud in a draw request submitted by a construction developer?
Which of the following is a method of identity theft prevention that is recommended for individuals?
Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?
The price of an asset on which the asset is selling at on the open market in a transaction between a willing buyer and a willing seller is called:
Perceived certainty of detection is directly related to employee theft for respondents in all industry sectors, that is, the stronger the perception that theft would be detected, the more the likelihood that the employee would engage in deviant behavior.
An analytical review reveals that XYZ Company's cost of goods sold has increased by 75% in the last year. However, its sales revenues only increased by 25% during the same period. This situation MOST LIKELY indicates which of the following?
A person is said to be in ________ act, when the business which he transacts, or the money or property which he handles, is not for his own benefit, but for another person:
________ increase assets and expenses and/or decrease liabilities and/or equity.
Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?
Employees with the authority to grant discounts in order to skim revenues may use which authority?
A fraudster uses a victim’s name, government identification number, and birthdate to impersonate the victim and open a credit card account in the victim’s name. This scheme can BEST be described as:
Which of the following is a red flag that might indicate that someone is attempting to commit insurance fraud?
Jonathan, a Certified Fraud Examiner (CFE), is tasked with identifying potential indicators of intrusion into his employer's computer network. Which of the following might indicate that the organization's network has been compromised or accessed without authorization?
Which of the following is a recommended method for safeguarding an organization's proprietary information?
Cynthia receives a fraudulent text message that appears to be from her credit card company. The message claims that the company has detected suspicious card transactions and provides a link for her to click to sign into her account for more information. Cynthia is MOST LIKELY being targeted by which of the following types of social engineering schemes?
Inventory shrinkage is the unaccounted-for reduction in the company’s inventory that does not result from theft.
A variation between the physical inventory and the perpetual inventory totals is called:
Another way to eliminate competition in the solicitation phase of the selection process is to:
___________ and __________ are used to increase (or decrease) the equity account.