Spring Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

CFE-Financial-Transactions-and-Fraud-Schemes Sample Questions Answers

Questions 4

Which of the following scenarios BEST describes an electronic funds transfer (EFT) fraud scheme?

Options:

A.

An individual uses another person's personal identifying information to fill out a credit card application in their name and plans to make online purchases using the new card.

B.

A hacker obtains the account and password information of consumers and uses them to direct funds from their accounts.

C.

A restaurant server secretly scans a customer's credit card information into a small device for fraudulent use at a later time.

D.

An employee of a person-to-person (P2P) provider misrepresents the number of hours that they worked to increase the amount of money earned on their paycheck.

Buy Now
Questions 5

A special scheme in which employees know their employer is seeking to purchase a certain asset and take advantage of the situation by purchasing the asset themselves is:

Options:

A.

Conflict of interest in sale

B.

Turnaround sale or flip

C.

Unauthorized sale

D.

Written sale of unique assets

Buy Now
Questions 6

A client contacts Emma, a Certified Fraud Examiner (CFE), and explains that they prepaid a commission to a broker for help with obtaining a loan. However, after sending the payment for services, the client did not receive a response from the broker and is unable to contact them. This type of fraud is known as a(n):

Options:

A.

Bait and switch scheme

B.

Advance-fee scheme

C.

Split deposit scheme

D.

Scavenger scheme

Buy Now
Questions 7

According to a survey, in principal perpetrator cases, males were the primary culprit in a majority of cases, accounting for ___ percent of frauds versus ___ percent for females.

Options:

A.

62 versus 36

B.

61 versus 39

C.

62 versus 37

D.

None of the above

Buy Now
Questions 8

Collusion or bid-rigging between bidders is called

Options:

A.

Bribery receipt

B.

Bid solicitation

C.

To withdraw low bids

D.

Contract acceptance

Buy Now
Questions 9

Which of the following statements about competitive intelligence is CORRECT?

Options:

A.

Competitive intelligence is considered a legitimate business function.

B.

Competitive intelligence refers to government-sanctioned activities conducted to collect protected information from a foreign government.

C.

Competitive intelligence and corporate espionage describe identical practices.

D.

Competitive intelligence involves the use of illegal, covert means to acquire information for commercial purposes.

Buy Now
Questions 10

Which of the following statements is MOST ACCURATE regarding financial reporting practices and accounting frameworks, such as U.S. generally accepted accounting principles (GAAP) and International Financial Reporting Standards (IFRS)?

Options:

A.

The financial reporting practices that a publicly traded company must follow are determined by the company's jurisdiction.

B.

All publicly traded companies are required to adopt either U.S. GAAP or IFRS as their accounting framework.

C.

Organizations that conduct business internationally must adopt IFRS as their accounting framework for financial reporting.

D.

U.S. GAAP is a principle-based accounting framework, and IFRS is a rules-based accounting framework.

Buy Now
Questions 11

Jorge, a Certified Fraud Examiner (CFE), is investigating a tip involving an accountant at a bank who allegedly adjusted the bank’s general ledger to conceal the theft of funds from a customer’s account. If Jorge finds evidence that proves the allegation, which of the following BEST describes the accountant’s scheme?

Options:

A.

Unauthorized withdrawal

B.

False accounting entry

C.

Moving money from inactive accounts

D.

Unauthorized disbursement of funds

Buy Now
Questions 12

Which of the following is NOT a phase of the bidding process?

Options:

A.

Presolicitation

B.

Postsolicitation

C.

Solicitation

D.

Submission

Buy Now
Questions 13

Which of the following is NOT a justifiable reason to depart from generally accepted accounting principles (GAAP)?

Options:

A.

The expected costs associated with following GAAP would exceed the expected benefits of compliance.

B.

It is likely that assets would be understated and liabilities would be overstated.

C.

A transaction is considered immaterial and therefore irrelevant to the accurate interpretation of financial statements.

D.

The application of GAAP could produce misleading financial statements.

Buy Now
Questions 14

Which of the following offender types are people who take the money and run away?

Options:

A.

Absconders

B.

Long-term violators

C.

Offender types

D.

None of the above

Buy Now
Questions 15

What can make it easy for an employee to skim sales or receivables?

Options:

A.

Revenue sources and recording procedures

B.

Poor collection and recording procedures

C.

Internal audits and recording procedures

D.

Register manipulations and recording procedures

Buy Now
Questions 16

__________ means that traditional bribery statutes proscribe only payments made to influence the decisions of government agents or employees.

Options:

Buy Now
Questions 17

Which of the following is NOT a medium that commonly causes an organization's proprietary information to be compromised?

Options:

A.

Reports to company shareholders

B.

Documents that were shredded using a cross-cut shredder

C.

Speeches made by executives

D.

Information displayed at an employee's workstation

Buy Now
Questions 18

Which of the following statements is TRUE regarding income statements?

Options:

A.

Gross revenue is the total amount of sales after deductions are applied.

B.

Net profit is a company's earnings before operating expenses have been deducted.

C.

Gross profit is the difference between net sales and cost of goods sold.

D.

A company's operating expenses are usually listed as the first line item.

Buy Now
Questions 19

The act of an official or fiduciary person who unlawfully and wrongfully uses his station or character to procure some benefit, contrary to duty and rights of others, is called:

Options:

A.

Conflict of interest

B.

Corruption

C.

Bribery

D.

Overbilling

Buy Now
Questions 20

Which of the following search is used for unusually high incidence of returns and allowances scheme?

Options:

A.

Allowances by vendors

B.

Disposals of allowances than reorders

C.

Returns and allowances

D.

None of the above

Buy Now
Questions 21

Which of the following is an example of a technical security control that organizations can use to secure computer systems and communication networks?

Options:

A.

Application security

B.

Human audits

C.

Penetration testing

D.

Data security

Buy Now
Questions 22

According to accounting principles, ________ and ________ should be recorded or matched in the same accounting period; failing to do so violates the matching principle of GAAP.

Options:

A.

Revenue and corresponding expenses

B.

Revenue and Income statement

C.

Income statement and Long-term contracts

D.

Capitalized expenses and Liabilities

Buy Now
Questions 23

Conflict of interest cases are more easily prevented than detected.

Options:

A.

True

B.

False

Buy Now
Questions 24

Which of the following is a TRUE statement about counterfeit payment cards?

Options:

A.

The hologram on payment cards is relatively simple to reproduce.

B.

The production of counterfeit payment cards is too complicated for the use of high-speed printers.

C.

Counterfeit payment cards can be created with blank plastic cards.

D.

All of the above are true statements about counterfeit payment cards.

Buy Now
Questions 25

Which of the following is not a skimming scheme?

Options:

A.

Unrecorded sales

B.

Fraud & Cost

C.

Theft of checks through the mail

D.

Understated sales and receivables

Buy Now
Questions 26

Which of the following is an example of a cash larceny scheme?

Options:

A.

Paul sold insurance policies to individuals but never filed the policies with the insurance company. He then stole the customers' payments, which he was able to do because the insurance company did not know the policies existed.

B.

Emily is an accounts receivable clerk. She stole Customer A's monthly payment. When Customer B's payment arrived, she applied it to Customer A's account. When Customer C's payment arrived, she applied it to Customer B's account.

C.

Sarah returned a $250 mirror to the store. Jenna, the cashier, recorded a $350 return on the cash register and kept the remaining $100.

D.

Mark, a cashier, knew the access code for Joe's cash register. He logged in as Joe and processed transactions as usual. He then took $50 from the register at the end of his shift.

Buy Now
Questions 27

Which of the following is NOT the reason why senior management will overstate business statements?

Options:

A.

Comply with debt covenants

B.

Meet personal performance criteria

C.

Trigger performance-related compensation

D.

Show a pattern of growth to support sale of a business

Buy Now
Questions 28

Which of the following is a method that might be used to fraudulently overstate the inventory balance?

Options:

A.

Recording an allowance for sales returns

B.

Failing to record bad debt expense

C.

Applying the lower of cost or net realizable value

D.

Failing to write off obsolete inventory

Buy Now
Questions 29

Occupational fraud and abuse is a (an) __________ of doing business, in much the same way that we pay expenses for electricity, taxes, and wages.

Options:

A.

Equity

B.

Balance sheet

C.

Expense

D.

Financial record

Buy Now
Questions 30

A ____________ can be very costly for an organization to undertake, both in terms of money and time spent.

Options:

Buy Now
Questions 31

A fraudster creates a fictitious identity by combining a person's real government identification number with a fabricated name and birthdate. This scheme can BEST be described as:

Options:

A.

Synthetic identity theft

B.

Simulated identity theft

C.

Traditional identity theft

D.

Criminal identity theft

Buy Now
Questions 32

To detect fraud committed by a health care provider, a fraud examiner should look for which of the following red flags?

Options:

A.

The number of claims made by the provider for reimbursement are lower than average.

B.

There is a high percentage of coding outliers in the provider's documentation.

C.

The details in the provider's supporting documentation match the health care claim.

D.

The provider has unusually low profits compared to similar businesses in the same region.

Buy Now
Questions 33

How many accounts are affected in fraudulent accounting entries and therefore the same number of categories on the financial statement?

Options:

A.

One

B.

At least two

C.

More than two

D.

None of above

Buy Now
Questions 34

____________ is a summary of the account balances carried in a ledger.

Options:

A.

Balance sheet

B.

Income statement

C.

Financial statement

D.

General journal

Buy Now
Questions 35

Skimming cases can more likely be detected by:

Options:

A.

Internal audits

B.

Accidents

C.

Internal controls

D.

Occupational frauds

Buy Now
Questions 36

Which of the following is a red flag of a Ponzi scheme?

Options:

A.

There is pressure to take payouts rather than reinvest profits.

B.

The financial manager manages, administers, and retains custody of investment funds.

C.

The investment strategy is very easy to understand.

D.

A firm has a history of returns on investments that fluctuate based on market conditions.

Buy Now
Questions 37

Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?

Options:

A.

Kickback scheme

B.

Illegal gratuity scheme

C.

Diversion scheme

D.

Economic extortion scheme

Buy Now
Questions 38

Organizations that had external audits actually had higher median losses and longer-lasting fraud schemes than those organizations that were not audited.

Options:

A.

True

B.

False

Buy Now
Questions 39

According to SAB 104, for revenue to be considered realized or realizable and earned, which of the following criteria is NOT met?

Options:

A.

Persuasive evidence of an arrangement exists

B.

Services have been rendered

C.

Timings have been met

D.

Collectability is reasonably assured

Buy Now
Questions 40

Which of the following scenarios is an example of upcoding?

Options:

A.

Cindy receives payment in exchange for allowing an unnecessary surgical procedure to be completed on her that is then billed to her health care program

B.

Dr. Loomis uses three procedure codes when submitting a claim for a surgery that she performed that is supposed to be billed using one procedure code

C.

Landon inflates a medical bill that he wants to receive reimbursement for by misrepresenting the amount of the bill

D.

Dr. Raul advises a patient with a small fracture in her leg to use crutches, but he submits the claim using a code to indicate that he placed a cast on the patient

Buy Now
Questions 41

Which of the following is TRUE regarding ghost employee schemes?

Options:

A.

The ghost employee must be a fictitious person.

B.

The ghost employee must be classified as an exempt employee.

C.

The ghost employee must be someone who has never worked for the victim company.

D.

The ghost employee must be added to the payroll.

Buy Now
Questions 42

Which of the following would NOT be considered a conflict of interest?

Options:

A.

Harriet owns a significant amount of stock in a company she regularly buys her employer's office supplies from, but her employer is unaware of this fact.

B.

Robert works for Muir's Printing Services on weekdays and Winsted Café on weekends, but he does not tell either employer about the other job.

C.

Jennifer is on the board of directors of two companies that compete in the retail market, but she does not tell either company about her role at the other.

D.

Ernest hires his brother, John, to provide vending services to his employer's lunch areas, but he does not disclose their relationship.

Buy Now
Questions 43

Larceny by fraud or deception means that:

Options:

A.

Creates or reinforces a false impression

B.

Fails to correct a false impression

C.

Fails to disclose a known lien, adverse claim, or other legal impediment

D.

All of the above

Buy Now
Questions 44

In ____________ scheme, a supplier pays an employee of the purchasing company to write specifications that will require amendments at a later date.

Options:

A.

Deliberate writing of vague specifications

B.

Need recognition

C.

False specification

D.

Bid-splitting

Buy Now
Questions 45

When situational pressures and perceived opportunities are low and personal integrity is high, occupational fraud is much more likely to occur than when the opposite is true.

Options:

A.

True

B.

False

Buy Now
Questions 46

Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?

Options:

A.

Restricting other employees from performing the duties of an absent employee

B.

Assigning the duties of depositing cash receipts and performing bank reconciliations to different employees

C.

Having all employees use the same cash register for their transactions

D.

Keeping employees unaware that the company performs surprise cash counts

Buy Now
Questions 47

Which of the following is NOT a red flag of register disbursement schemes?

Options:

A.

There are gaps in the transaction numbers on the register log.

B.

Personal checks from cashiers are found in the cash register.

C.

Voids just over the review limit have been approved by a supervisor.

D.

Cashiers are authorized to void their own transactions.

Buy Now
Questions 48

By removing a tangible asset from the business (a debit), the books will be ___________ by the exact amount of the tangible asset misappropriated.

Options:

A.

Journal Entries

B.

Out-of-balance

C.

False debits

D.

None of all

Buy Now
Questions 49

Which of the following would be MOST INDICATIVE of loan fraud in a draw request submitted by a construction developer?

Options:

A.

The developer's personal account statements have been omitted.

B.

Change orders have been included.

C.

Lien releases from subcontractors are not included with the request.

D.

There are several inspection reports.

Buy Now
Questions 50

Which of the following is a method of identity theft prevention that is recommended for individuals?

Options:

A.

Do not reuse passwords for more than two accounts.

B.

Install security updates and patches for personal computers annually.

C.

Only use email to send personal information when contacting reputable organizations.

D.

Use biometric authentication when it is available.

Buy Now
Questions 51

Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?

Options:

A.

Pharming is the practice of changing a victim's email or mailing address so that the identity thief receives the victim's mail.

B.

Dumpster diving involves searching for sensitive personal information on used computers that have been purchased from a reseller.

C.

Shoulder surfing is the practice of exploiting another person's access capability to gain access to restricted areas.

D.

Baiting involves leaving flash drives or similar items that have been infected with malware in places where people are likely to find them.

Buy Now
Questions 52

The price of an asset on which the asset is selling at on the open market in a transaction between a willing buyer and a willing seller is called:

Options:

A.

Absolute value

B.

Fair value

C.

Cost value

D.

Material value

Buy Now
Questions 53

Perceived certainty of detection is directly related to employee theft for respondents in all industry sectors, that is, the stronger the perception that theft would be detected, the more the likelihood that the employee would engage in deviant behavior.

Options:

A.

True

B.

False

Buy Now
Questions 54

An analytical review reveals that XYZ Company's cost of goods sold has increased by 75% in the last year. However, its sales revenues only increased by 25% during the same period. This situation MOST LIKELY indicates which of the following?

Options:

A.

The company started recording warranty liabilities.

B.

There were fewer sales this year compared to last year.

C.

There were more sales returns this year than in the prior year.

D.

Inventory has been depleted by theft.

Buy Now
Questions 55

A person is said to be in ________ act, when the business which he transacts, or the money or property which he handles, is not for his own benefit, but for another person:

Options:

A.

Fiduciary Capacity

B.

Embezzlement

C.

Conversion

D.

None of the above

Buy Now
Questions 56

________ increase assets and expenses and/or decrease liabilities and/or equity.

Options:

A.

Journal Entries

B.

Debit

C.

Credit

D.

None of all

Buy Now
Questions 57

Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?

Options:

A.

Requiring all fraud tips to be reported to employees' direct supervisors

B.

Combining the purchasing and payment functions within a single department

C.

Enforcing competitive bidding from potential vendors

D.

Using an external vendor to negotiate procurement contracts

Buy Now
Questions 58

Employees with the authority to grant discounts in order to skim revenues may use which authority?

Options:

A.

False discounts

B.

Recording a discount on sale procedure

C.

Internal discount sales audits

D.

None of the above

Buy Now
Questions 59

Which of the following is TRUE regarding accrual-basis accounting?

Options:

A.

Expenses are recorded in the accounting system when they are paid.

B.

Accrual-basis accounting is simpler to use than cash-basis accounting.

C.

The accrual-basis method focuses on tracking a company's current cash flow.

D.

Revenues are generally recognized when goods are delivered to a customer.

Buy Now
Questions 60

A fraudster uses a victim’s name, government identification number, and birthdate to impersonate the victim and open a credit card account in the victim’s name. This scheme can BEST be described as:

Options:

A.

New account identity theft

B.

Traditional identity theft

C.

Synthetic identity theft

D.

Criminal identity theft

Buy Now
Questions 61

Which of the following is a red flag that might indicate that someone is attempting to commit insurance fraud?

Options:

A.

A claim is made soon after an insurance policy commences.

B.

The insured made one other insurance claim within the past five years.

C.

A burglary loss claim includes small electronic items and jewelry.

D.

A theft claim includes items that were purchased recently and the receipts.

Buy Now
Questions 62

Jonathan, a Certified Fraud Examiner (CFE), is tasked with identifying potential indicators of intrusion into his employer's computer network. Which of the following might indicate that the organization's network has been compromised or accessed without authorization?

Options:

A.

When logging into the computer network, employees receive a reminder to change their log-in passwords before they expire.

B.

Network users are prompted to install unfamiliar software onto their computers.

C.

The network is receiving data from a country where one of the organization's suppliers is located.

D.

Users are denied access to network files they do not typically use in their organizational role.

Buy Now
Questions 63

Financial statement fraud is committed by:

Options:

A.

Organized criminals

B.

Mid and lower-level employees

C.

Senior Management

D.

All of the above

Buy Now
Questions 64

Which of the following is a recommended method for safeguarding an organization's proprietary information?

Options:

A.

Changing locks and reprogramming door access codes every three to five years

B.

Classifying data into security access levels based on the number of years that employees have worked for the company

C.

Educating employees about nondisclosure agreements when they are hired and during exit interviews

D.

Requiring employees to make notes and keep drafts related to confidential projects

Buy Now
Questions 65

Cynthia receives a fraudulent text message that appears to be from her credit card company. The message claims that the company has detected suspicious card transactions and provides a link for her to click to sign into her account for more information. Cynthia is MOST LIKELY being targeted by which of the following types of social engineering schemes?

Options:

A.

Vishing

B.

Smishing

C.

Catfishing

D.

Pharming

Buy Now
Questions 66

Inventory shrinkage is the unaccounted-for reduction in the company’s inventory that does not result from theft.

Options:

A.

True

B.

False

Buy Now
Questions 67

A variation between the physical inventory and the perpetual inventory totals is called:

Options:

A.

Altered inventory

B.

Account receivable

C.

Shrinkage

D.

Write-offs

Buy Now
Questions 68

Another way to eliminate competition in the solicitation phase of the selection process is to:

Options:

A.

Solicit bids from fictitious suppliers

B.

Solicit transactions from fictitious vendors

C.

Solicit bid-splitting from fictitious vendors

D.

None of the above

Buy Now
Questions 69

___________ and __________ are used to increase (or decrease) the equity account.

Options:

A.

Journal Entries & Debit

B.

Journal Entries & Transactions

C.

Journal Entries & Credit

D.

None of all

Buy Now
Questions 70

Persuasive evidence of an arrangement does not exist when:

Options:

A.

Revenue and corresponding expenses don’t match each other.

B.

No written or verbal agreement exists.

C.

Timings not meet properly.

D.

Capitalized expenses and Liabilities will not be up to satisfied level.

Buy Now
Exam Code: CFE-Financial-Transactions-and-Fraud-Schemes
Exam Name: Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam
Last Update: Apr 2, 2026
Questions: 235
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now CFE-Financial-Transactions-and-Fraud-Schemes