New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

CFE-Financial-Transactions-and-Fraud-Schemes Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers

Questions 4

Brenda was a cashier at a retail store. When Brenda's friend shopped at the store, she would take her merchandise to Brenda's cash register. Instead of charging her friend, Brenda would record a No-Sale transaction on the register, and her friend would pretend to pay for the merchandise. Brenda's friend would leave the store without paying for the merchandise, and the two would later divide the merchandise between themselves. This scheme can BEST be described as:

Options:

A.

A register disbursement scheme

B.

A false sale scheme

C.

A purchasing and receiving scheme

D.

A skimming scheme

Buy Now
Questions 5

In what type of fraud scheme does an employee steal cash after it has appeared on the company’s books?

Options:

A.

Cash larceny scheme

B.

Unrecorded sales (skimming) scheme

C.

Kickback scheme

D.

Understated sales (skimming) scheme

Buy Now
Questions 6

What can make it easy for an employee to skim sales or receivables?

Options:

A.

Revenue sources and recording procedures

B.

Poor collection and recording procedures

C.

Internal audits and recording procedures

D.

Register manipulations and recording procedures

Buy Now
Questions 7

Which of the following is FALSE concerning methods that corporate spies generally use to steal information from other organizations?

Options:

A.

Spies often create counterfeit employee badges to gain entry into a target company.

B.

Spies often gain direct access to a target company by obtaining employment as a security officer or a member of the maintenance staff.

C.

Spies primarily use social engineering to search for confidential information on employee desks or workstations at the target company.

D.

Spies use technical surveillance to obtain nondocumentary information about target companies that cannot be found through open sources.

Buy Now
Questions 8

Accounting records are designed to be kept on subjective rather than objective evidence.

Options:

A.

True

B.

False

Buy Now
Questions 9

Physical assets including _________ and ________ are the most commonly misappropriated noncash assets in our study.

Options:

A.

Interest & Collusion

B.

Inventory & Equipment

C.

Inventory & Purchase

D.

Sales & Equipment

Buy Now
Questions 10

According to Marshall, ______ are probable future economic benefits obtained or controlled by a particular entity as a result of past transactions or events.

Options:

A.

Assets

B.

Liabilities

C.

Credentials

D.

None of the above

Buy Now
Questions 11

White used a company vehicle for unauthorized, personal purposes while working in a different city. He provided false written and oral information regarding the use of the vehicle. The vehicle was returned without damages. What type of fraud did White commit?

Options:

A.

White did not commit fraud

B.

An expense reimbursement scheme

C.

A misuse of a noncash asset

D.

A financial statement fraud scheme

Buy Now
Questions 12

A scheme is classified as a Conflict of Interest:

Options:

A.

when an employee must have some kind of ownership or employment interest in the vendor submitting the invoice.

B.

when a salesman must have some kind of ownership or employment interest in the vendor submitting the sales.

C.

when a purchaser must have some kind of ownership or employment interest in the vendor submitting the purchase.

D.

when a dealer must have some kind of dealership interest in the vendor submitting the stock.

Buy Now
Questions 13

Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail and recording the receipt of payments.

Options:

A.

Single employee

B.

Two employees

C.

More than two employees

D.

None of the above

Buy Now
Questions 14

The scheme in which the same vendor is receiving favorable treatment can be found in purchases by vendor searches.

Options:

A.

True

B.

False

Buy Now
Questions 15

________, one of the synonyms for fraud, implies deceiving so thoroughly as to obscure the truth.

Options:

A.

Deceive

B.

Delude

C.

Mislead

D.

Beguile

Buy Now
Questions 16

Persuasive evidence of an arrangement does not exist when:

Options:

A.

Revenue and corresponding expenses don’t match each other.

B.

No written or verbal agreement exists.

C.

Timings not meet properly.

D.

Capitalized expenses and Liabilities will not be up to satisfied level.

Buy Now
Questions 17

Which of the following is a red flag of a Ponzi scheme?

Options:

A.

There is pressure to take payouts rather than reinvest profits.

B.

The financial manager manages, administers, and retains custody of investment funds.

C.

The investment strategy is very easy to understand.

D.

A firm has a history of returns on investments that fluctuate based on market conditions.

Buy Now
Questions 18

Which of the following is NOT a method for stealing inventory and other assets?

Options:

A.

Larceny schemes

B.

Asset requisition and transfer

C.

Purchasing and receiving schemes

D.

Sales & Equipment handling

Buy Now
Questions 19

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:

Options:

A.

Human intelligence

B.

Scavenging

C.

Baiting

D.

Open-source intelligence

Buy Now
Questions 20

Which of the following scenarios describes a card skimming or shimming scheme?

Options:

A.

After processing a customer's payment, a server returns with the receipt but keeps the payment card hoping that the customer does not notice.

B.

An imitation website is created to deceive users into providing their payment card information.

C.

While processing a payment concealed from the customer's view, a retail employee uses a small device to scan and record the customer's payment card information.

D.

None of the above.

Buy Now
Questions 21

Which of the following scenarios BEST describes an electronic funds transfer (EFT) fraud scheme?

Options:

A.

An individual uses another person's personal identifying information to fill out a credit card application in their name and plans to make online purchases using the new card.

B.

A hacker obtains the account and password information of consumers and uses them to direct funds from their accounts.

C.

A restaurant server secretly scans a customer's credit card information into a small device for fraudulent use at a later time.

D.

An employee of a person-to-person (P2P) provider misrepresents the number of hours that they worked to increase the amount of money earned on their paycheck.

Buy Now
Questions 22

To prevent expense reimbursement fraud, it is recommended that companies require employees to submit receipts electronically.

Options:

A.

True

B.

False

Buy Now
Questions 23

A fraudster poses as ABC Organization's chief executive officer (CEO) and sends an email to an employee requesting that company funds be transferred to an account that the fraudster owns. This is an example of which of the following types of fraud schemes?

Options:

A.

Reverse social engineering

B.

Executive email attack

C.

Electronic piggybacking

D.

Business email compromise

Buy Now
Questions 24

Which of the following methods is NOT used to detect conflicts of interest?

Options:

A.

Tips & Complaints

B.

Review of vendor ownership files

C.

Underbillings of assets

D.

Interviews with purchasing personnel

Buy Now
Questions 25

Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?

Options:

A.

Requiring all fraud tips to be reported to employees' direct supervisors

B.

Combining the purchasing and payment functions within a single department

C.

Enforcing competitive bidding from potential vendors

D.

Using an external vendor to negotiate procurement contracts

Buy Now
Questions 26

Antonia, a Certified Fraud Examiner (CFE), discovers that a loan applicant misrepresented their creditworthiness and income to qualify for a mortgage on a new house. Which type of loan fraud BEST describes the scheme that Antonia uncovered?

Options:

A.

Residential loan fraud

B.

Credit data blocking

C.

Double-pledging collateral

D.

Linked financing

Buy Now
Questions 27

By removing a tangible asset from the business (a debit), the books will be ___________ by the exact amount of the tangible asset misappropriated.

Options:

A.

Journal Entries

B.

Out-of-balance

C.

False debits

D.

None of all

Buy Now
Questions 28

Which of the following is NOT a measure that is commonly taken by fraudsters during account takeover schemes?

Options:

A.

Placing orders for products or transferring funds from the overtaken accounts

B.

Ensuring that the contact information for the overtaken account remains the same to avoid alerting the true account holder

C.

Using log-in credentials that have been stolen from one account to attempt to gain access to other payment accounts

D.

Obtaining email addresses and other account log-in information by sending phishing emails

Buy Now
Questions 29

Which of the following is NOT the reason why senior management will overstate business statements?

Options:

A.

Comply with debt covenants

B.

Meet personal performance criteria

C.

Trigger performance-related compensation

D.

Show a pattern of growth to support sale of a business

Buy Now
Questions 30

Which of the following actions would balance the accounting equation to conceal the misappropriation of cash?

Options:

A.

Increasing another asset

B.

Increasing owners' equity

C.

Increasing a liability

D.

Creating fictitious revenue

Buy Now
Questions 31

The behavior profile of employees who are involved in bribery schemes may include:

Options:

A.

Gambling habit

B.

Extravagant lifestyle

C.

Drug and/or alcohol addiction

D.

All of the above

Buy Now
Questions 32

Which of the following is NOT a common way that a procuring employee might engage in a bid manipulation scheme?

Options:

A.

Extending bid opening dates without justification

B.

Using low-quality materials

C.

Altering bids

D.

Opening bids prematurely

Buy Now
Questions 33

Skimming cases can more likely be detected by:

Options:

A.

Internal audits

B.

Accidents

C.

Internal controls

D.

Occupational frauds

Buy Now
Questions 34

Jorge, a Certified Fraud Examiner (CFE), is investigating a tip involving an accountant at a bank who allegedly adjusted the bank’s general ledger to conceal the theft of funds from a customer’s account. If Jorge finds evidence that proves the allegation, which of the following BEST describes the accountant’s scheme?

Options:

A.

Unauthorized withdrawal

B.

False accounting entry

C.

Moving money from inactive accounts

D.

Unauthorized disbursement of funds

Buy Now
Questions 35

A fraudster creates a fictitious identity by combining a person's real government identification number with a fabricated name and birthdate. This scheme can BEST be described as:

Options:

A.

Synthetic identity theft

B.

Simulated identity theft

C.

Traditional identity theft

D.

Criminal identity theft

Buy Now
Questions 36

_________ revenues involve the recording of sales of goods or services that did not occur.

Options:

A.

Fictitious or fabricated revenues

B.

Financial revenues

C.

Red flag revenues

D.

Concealed revenues

Buy Now
Questions 37

Which of the following scenarios is an example of an economic extortion scheme?

Options:

A.

A purchasing employee and vendor agree to bill the company for services that were not provided.

B.

A government official demands money in exchange for awarding a contract to a vendor.

C.

An employee receives a payment for directing excess business to a vendor.

D.

A vendor rewards a purchasing employee with a free trip after the employee directs business to the vendor.

Buy Now
Questions 38

A tangible asset is one which is:

Options:

A.

Capable of being perceived

B.

Capable of being appraised

C.

Both A & B

D.

Neither A nor B

Buy Now
Questions 39

Which of the following items do NOT appear on the balance sheet?

Options:

A.

Owners' equity

B.

Liabilities

C.

Expenses

D.

Assets

Buy Now
Questions 40

Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?

Options:

A.

Restricting other employees from performing the duties of an absent employee

B.

Assigning the duties of depositing cash receipts and performing bank reconciliations to different employees

C.

Having all employees use the same cash register for their transactions

D.

Keeping employees unaware that the company performs surprise cash counts

Buy Now
Questions 41

The more power a person has over the bidding process, the more likely the person can influence the selection of a supplier.

Options:

A.

True

B.

False

Buy Now
Questions 42

John is a salesperson whose job requires him to entertain potential clients frequently. When John and another salesperson from a different company take a potential client to dinner, the other salesperson pays for the meal. John creates his own receipt for the meal and submits the expense for reimbursement from his company. John's scheme can BEST be characterized as:

Options:

A.

A mischaracterized expense reimbursement scheme

B.

A fictitious expense reimbursement scheme

C.

A multiple reimbursement scheme

D.

An overstated expense reimbursement scheme

Buy Now
Questions 43

George, a 71-year-old man, receives a fraudulent message on his computer stating that his computer has been infected by a virus. When George calls the phone number listed on the message, he speaks with a fraudster who charges him for computer repair services that are unnecessary. George has MOST LIKELY been victimized by which of the following schemes?

Options:

A.

Pharming

B.

Bait and switch scheme

C.

Tech-support scheme

D.

Smishing

Buy Now
Questions 44

Which of the following is a method that a fraudster might use to conceal inventory shrinkage?

Options:

A.

Selling merchandise without recording the sale

B.

Writing off stolen inventory as scrap

C.

Falsely increasing the perpetual inventory record

D.

All of the above

Buy Now
Questions 45

Which of the following is TRUE regarding pyramid schemes?

Options:

A.

All pyramid organizational structures are illegal

B.

An illegal pyramid scheme is modeled to pay off its earliest investors but not its later investors

C.

The goal that participants of pyramid schemes have is to sell worthless products to friends and family

D.

None of the above

Buy Now
Questions 46

Which of the following statements regarding financial statement disclosures is TRUE?

Options:

A.

Events occurring after the close of the reporting period that might significantly affect the financial statements do not need to be disclosed.

B.

Management must disclose potential losses from ongoing litigation even when it is unlikely that the related liability will result in a future obligation.

C.

All information relating to the company must be disclosed in the financial statements, regardless of materiality.

D.

Changes in accounting principles must be disclosed in the financial statements.

Buy Now
Questions 47

In which of the following process, all bidders are legally supposed to be placed on the same plane of equality, bidding on the same terms and conditions?

Options:

A.

Bid-rigging

B.

Kickbacks

C.

Competitive bidding

D.

Bid solicitation

Buy Now
Questions 48

In which phase of the competitive bidding process do fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?

Options:

A.

Need recognition

B.

Solicitation

C.

False specification

D.

Submission

Buy Now
Questions 49

Occupational fraud and abuse is a (an) __________ of doing business, in much the same way that we pay expenses for electricity, taxes, and wages.

Options:

A.

Equity

B.

Balance sheet

C.

Expense

D.

Financial record

Buy Now
Questions 50

Depreciation is especially applicable when companies try to overvalue their assets and net worth; the lower their depreciation expense, the higher the company’s profits.

Options:

A.

True

B.

False

Buy Now
Questions 51

How many accounts are affected in fraudulent accounting entries and therefore the same number of categories on the financial statement?

Options:

A.

One

B.

At least two

C.

More than two

D.

None of above

Buy Now
Questions 52

Revenue is recognized when it is:

Options:

A.

Realized and Earned

B.

Fictitious and Earned

C.

Realized and Evidenced

D.

All of the above

Buy Now
Questions 53

_________ is defined as a person who works for the victim organization and who is the primary culprit.

Options:

Buy Now
Questions 54

Financial statement fraud is committed by:

Options:

A.

Organized criminals

B.

Mid and lower-level employees

C.

Senior Management

D.

All of the above

Buy Now
Questions 55

The principal way to detect omitted credits from books of account is through:

Options:

A.

Forced Balance

B.

Trend analysis

C.

Expense account

D.

None of all

Buy Now
Questions 56

Which of the following is the amount of money that would be realized upon the sale of the asset at some point in the future, less the costs associated with owning, operating, and selling it?

Options:

A.

Net realizable value

B.

Going concern

C.

Cost

D.

Fair value

Buy Now
Questions 57

Which of the following is TRUE regarding ghost employee schemes?

Options:

A.

The ghost employee must be a fictitious person.

B.

The ghost employee must be classified as an exempt employee.

C.

The ghost employee must be someone who has never worked for the victim company.

D.

The ghost employee must be added to the payroll.

Buy Now
Questions 58

Which of the following methods would NOT be helpful in detecting a skimming scheme?

Options:

A.

Confirming customers' unpaid account balances

B.

Examining journal entries for false credits made to the inventory

C.

Performing physical inventory counts

D.

Comparing cash register totals to the cash count

Buy Now
Questions 59

Inventory shrinkage is the unaccounted-for reduction in the company’s inventory that does not result from theft.

Options:

A.

True

B.

False

Buy Now
Questions 60

Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?

Options:

A.

Pharming is the practice of changing a victim's email or mailing address so that the identity thief receives the victim's mail.

B.

Dumpster diving involves searching for sensitive personal information on used computers that have been purchased from a reseller.

C.

Shoulder surfing is the practice of exploiting another person's access capability to gain access to restricted areas.

D.

Baiting involves leaving flash drives or similar items that have been infected with malware in places where people are likely to find them.

Buy Now
Questions 61

Which of the following situations describes a red flag that might be indicative of loan fraud?

Options:

A.

A loan file contains missing documents that are later found in another file.

B.

There is low turnover in a real estate developer's personnel.

C.

A change order is submitted at the same time as a draw request.

D.

The number of change orders for a small project continues to increase.

Buy Now
Questions 62

Jonathan, a Certified Fraud Examiner (CFE), is tasked with identifying potential indicators of intrusion into his employer's computer network. Which of the following might indicate that the organization's network has been compromised or accessed without authorization?

Options:

A.

When logging into the computer network, employees receive a reminder to change their log-in passwords before they expire.

B.

Network users are prompted to install unfamiliar software onto their computers.

C.

The network is receiving data from a country where one of the organization's suppliers is located.

D.

Users are denied access to network files they do not typically use in their organizational role.

Buy Now
Questions 63

According to accounting principles, ________ and ________ should be recorded or matched in the same accounting period; failing to do so violates the matching principle of GAAP.

Options:

A.

Revenue and corresponding expenses

B.

Revenue and Income statement

C.

Income statement and Long-term contracts

D.

Capitalized expenses and Liabilities

Buy Now
Questions 64

A ___________ occurs when an employee, manager, or executive has an undisclosed economic or personal interest in a transaction that adversely affects the organization.

Options:

A.

Conflict of interest

B.

Illegal sale

C.

Unauthorized purchase

D.

Financial disclosure

Buy Now
Questions 65

Which of the following scenarios is an example of upcoding?

Options:

A.

Hope is diagnosed with an ear infection. Hope's doctor writes her a prescription for a name brand medication instead of prescribing a less expensive generic medication.

B.

Dr. Smith performed a hysterectomy on Roberta. Dr. Smith submits an insurance claim using three procedure codes instead of the single code normally used for a hysterectomy.

C.

Dr. Catz spends 15 minutes with a patient. She later submits a bill to the patient's insurance company using a code that corresponds to an office visit lasting 60 minutes.

D.

Steven receives medical services prior to his new insurance going into effect. Before submitting the claim, he changes the service date on his bill so that it will be covered by insurance.

Buy Now
Questions 66

Not having any accounts receivable that are overdue is a common red flag of fictitious revenue schemes.

Options:

A.

True

B.

False

Buy Now
Questions 67

Black, an accounts receivable clerk, stole Customer A's monthly payment instead of posting it to A's account. When Customer B's payment arrives a few days later, Black applies the payment to Customer A's account. When Customer C's payment arrives a few days after that, Black applies it to Customer B's account. Black's method of crediting one account with money taken from another account is known as:

Options:

A.

Padding

B.

Lapping

C.

Substitution

D.

Daisy chain

Buy Now
Questions 68

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:

Options:

A.

Human intelligence

B.

Baiting

C.

Scavenging

D.

Open-source intelligence

Buy Now
Questions 69

The person or persons who have access to __________ are often the targets of unethical vendors seeking an advantage in the process.

Options:

A.

Bid-splitting

B.

Sealed bids

C.

General purchasing

D.

Tailor specifications

Buy Now
Questions 70

A typical issue involving materiality and fraud would be:

Options:

A.

Fraudulent statement

B.

Misappropriations

C.

Civil lawsuit

D.

Quality control

Buy Now
Exam Name: Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam
Last Update: Jan 5, 2026
Questions: 235
CFE-Financial-Transactions-and-Fraud-Schemes pdf

CFE-Financial-Transactions-and-Fraud-Schemes PDF

$25.5  $84.99
CFE-Financial-Transactions-and-Fraud-Schemes Engine

CFE-Financial-Transactions-and-Fraud-Schemes Testing Engine

$30  $99.99
CFE-Financial-Transactions-and-Fraud-Schemes PDF + Engine

CFE-Financial-Transactions-and-Fraud-Schemes PDF + Testing Engine

$40.5  $134.99