New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ACFE Certified Fraud Examiner CFE-Financial-Transactions-and-Fraud-Schemes Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

Several people who work in real estate collude to obtain a loan for the construction of a residential building on a property that does not exist. The co-conspirators divide the proceeds among themselves and leave the lender with no collateral to seize when loan payments are not made. Which of the following BEST describes this scheme?

Options:

A.

Property flopping


B.

Air loan


C.

Phantom lien


D.

Daisy chain


Expert Solution
Questions # 2:

Accounting records are designed to be kept on subjective rather than objective evidence.

Options:

A.

True


B.

False


Expert Solution
Questions # 3:

What type of fraud scheme would MOST LIKELY be revealed by comparing a company's personnel records with its payroll records to identify duplicate addresses and government identification numbers?

Options:

A.

A fraudulent commissions scheme


B.

A falsified hours and salary scheme


C.

An expense reimbursement scheme


D.

A ghost employee scheme


Expert Solution
Questions # 4:

In the fraud scale, pressure, opportunity, and integrity variables all result in a list of ___ possible red flags or indicators of occupational fraud and abuse.

Options:

A.

81


B.

82


C.

83


D.

84


Expert Solution
Questions # 5:

Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?

Options:

A.

Kickback scheme


B.

Illegal gratuity scheme


C.

Diversion scheme


D.

Economic extortion scheme


Expert Solution
Questions # 6:

Which of the following actions can make mobile payments more secure?

Options:

A.

Using the same log-in credentials for all payment applications


B.

Activating biometric authentication to verify the user's identity


C.

Disabling the biometric features on a newer mobile device


D.

None of the above


Expert Solution
Questions # 7:

A method for gaining unauthorized access to a computer system whereby the attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme is known as:

Options:

A.

IP spoofing


B.

Electronic piggybacking


C.

Packet sniffing


D.

Social engineering


Expert Solution
Questions # 8:

Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?

Options:

A.

Pharming is the practice of changing a victim's email or mailing address so that the identity thief receives the victim's mail.


B.

Dumpster diving involves searching for sensitive personal information on used computers that have been purchased from a reseller.


C.

Shoulder surfing is the practice of exploiting another person's access capability to gain access to restricted areas.


D.

Baiting involves leaving flash drives or similar items that have been infected with malware in places where people are likely to find them.


Expert Solution
Questions # 9:

The most basic skimming scheme occurs when:

Options:

A.

An employee sells goods or services to a customer, collects the customer’s payment, but makes no record of the sale.


B.

An employee buys goods or services from a customer, drops the customer’s payment, but makes no record of the purchase.


C.

An employee sells goods or services to a stakeholder, collects the stakeholder’s payment and makes record of the sale too.


D.

An employee buys goods or services from a stakeholder, drops the stakeholder’s payment and makes record of the purchase too.


Expert Solution
Questions # 10:

Forced reconciliation of the account says:

Options:

A.

To conceal shrinkage is to alter inventory record so that it matches the physical inventory count.


B.

To conceal inventory is to alter shrinkage record so that it matches the physical inventory count.


C.

To conceal shrinkage is to change the perpetual inventory record so that it matches the physical inventory count.


D.

To conceal write-offs is to change the perpetual inventory record so that it matches the physical inventory count.


Expert Solution
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions