New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the ACFE Certified Fraud Examiner CFE-Financial-Transactions-and-Fraud-Schemes Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

Perceived certainty of detection is directly related to employee theft for respondents in all industry sectors, that is, the stronger the perception that theft would be detected, the more the likelihood that the employee would engage in deviant behavior.

Options:

A.

True


B.

False


Expert Solution
Questions # 42:

A fraudster uses a victim’s name, government identification number, and birthdate to impersonate the victim and open a credit card account in the victim’s name. This scheme can BEST be described as:

Options:

A.

New account identity theft


B.

Traditional identity theft


C.

Synthetic identity theft


D.

Criminal identity theft


Expert Solution
Questions # 43:

Which of the following is NOT one of the information security goals that should be achieved to secure an e-commerce system for users and account holders?

Options:

A.

Confidentiality of data


B.

Availability of data


C.

Penetrability of data


D.

Integrity of data


Expert Solution
Questions # 44:

All the following are basic methods used to prove corrupt payments in corruption schemes EXCEPT:

Options:

A.

Making inquiries to the relevant Administration of Taxation


B.

Secretly infiltrating ongoing transactions


C.

Using an inside witness


D.

Identifying and tracing payments through audit steps


Expert Solution
Questions # 45:

When an incorrect total is carried from the journal to the ledger or from the ledger to the financial statements, this method is called:

Options:

A.

Forced Balance


B.

Out-of-balance


C.

False balance


D.

None of all


Expert Solution
Questions # 46:

Which of the following is NOT the reason to bribe employees of the purchaser?

Options:

A.

To ensure receipt of a late bid


B.

To extend the bid opening date


C.

To ensure bid-splitting


D.

To falsify the bid log


Expert Solution
Questions # 47:

Which of the following situations describes a red flag that might be indicative of loan fraud?

Options:

A.

A loan file contains missing documents that are later found in another file.


B.

There is low turnover in a real estate developer's personnel.


C.

A change order is submitted at the same time as a draw request.


D.

The number of change orders for a small project continues to increase.


Expert Solution
Questions # 48:

A fraudster poses as ABC Organization's chief executive officer (CEO) and sends an email to an employee requesting that company funds be transferred to an account that the fraudster owns. This is an example of which of the following types of fraud schemes?

Options:

A.

Reverse social engineering


B.

Executive email attack


C.

Electronic piggybacking


D.

Business email compromise


Expert Solution
Questions # 49:

In what type of fraud scheme does an employee steal cash after it has appeared on the company’s books?

Options:

A.

Cash larceny scheme


B.

Unrecorded sales (skimming) scheme


C.

Kickback scheme


D.

Understated sales (skimming) scheme


Expert Solution
Questions # 50:

Which of the following scenarios is an example of upcoding?

Options:

A.

Cindy receives payment in exchange for allowing an unnecessary surgical procedure to be completed on her that is then billed to her health care program


B.

Dr. Loomis uses three procedure codes when submitting a claim for a surgery that she performed that is supposed to be billed using one procedure code


C.

Landon inflates a medical bill that he wants to receive reimbursement for by misrepresenting the amount of the bill


D.

Dr. Raul advises a patient with a small fracture in her leg to use crutches, but he submits the claim using a code to indicate that he placed a cast on the patient


Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions