Brenda was a cashier at a retail store. When Brenda's friend shopped at the store, she would take her merchandise to Brenda's cash register. Instead of charging her friend, Brenda would record a No-Sale transaction on the register, and her friend would pretend to pay for the merchandise. Brenda's friend would leave the store without paying for the merchandise, and the two would later divide the merchandise between themselves. This scheme can BEST be described as:
In what type of fraud scheme does an employee steal cash after it has appeared on the company’s books?
Which of the following is FALSE concerning methods that corporate spies generally use to steal information from other organizations?
Accounting records are designed to be kept on subjective rather than objective evidence.
Physical assets including _________ and ________ are the most commonly misappropriated noncash assets in our study.
According to Marshall, ______ are probable future economic benefits obtained or controlled by a particular entity as a result of past transactions or events.
White used a company vehicle for unauthorized, personal purposes while working in a different city. He provided false written and oral information regarding the use of the vehicle. The vehicle was returned without damages. What type of fraud did White commit?
Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail and recording the receipt of payments.
The scheme in which the same vendor is receiving favorable treatment can be found in purchases by vendor searches.
________, one of the synonyms for fraud, implies deceiving so thoroughly as to obscure the truth.
Which of the following is NOT a method for stealing inventory and other assets?
Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:
Which of the following scenarios BEST describes an electronic funds transfer (EFT) fraud scheme?
To prevent expense reimbursement fraud, it is recommended that companies require employees to submit receipts electronically.
A fraudster poses as ABC Organization's chief executive officer (CEO) and sends an email to an employee requesting that company funds be transferred to an account that the fraudster owns. This is an example of which of the following types of fraud schemes?
Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?
Antonia, a Certified Fraud Examiner (CFE), discovers that a loan applicant misrepresented their creditworthiness and income to qualify for a mortgage on a new house. Which type of loan fraud BEST describes the scheme that Antonia uncovered?
By removing a tangible asset from the business (a debit), the books will be ___________ by the exact amount of the tangible asset misappropriated.
Which of the following is NOT a measure that is commonly taken by fraudsters during account takeover schemes?
Which of the following is NOT the reason why senior management will overstate business statements?
Which of the following actions would balance the accounting equation to conceal the misappropriation of cash?
The behavior profile of employees who are involved in bribery schemes may include:
Which of the following is NOT a common way that a procuring employee might engage in a bid manipulation scheme?
Jorge, a Certified Fraud Examiner (CFE), is investigating a tip involving an accountant at a bank who allegedly adjusted the bank’s general ledger to conceal the theft of funds from a customer’s account. If Jorge finds evidence that proves the allegation, which of the following BEST describes the accountant’s scheme?
A fraudster creates a fictitious identity by combining a person's real government identification number with a fabricated name and birthdate. This scheme can BEST be described as:
_________ revenues involve the recording of sales of goods or services that did not occur.
Which of the following scenarios is an example of an economic extortion scheme?
Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?
The more power a person has over the bidding process, the more likely the person can influence the selection of a supplier.
John is a salesperson whose job requires him to entertain potential clients frequently. When John and another salesperson from a different company take a potential client to dinner, the other salesperson pays for the meal. John creates his own receipt for the meal and submits the expense for reimbursement from his company. John's scheme can BEST be characterized as:
George, a 71-year-old man, receives a fraudulent message on his computer stating that his computer has been infected by a virus. When George calls the phone number listed on the message, he speaks with a fraudster who charges him for computer repair services that are unnecessary. George has MOST LIKELY been victimized by which of the following schemes?
Which of the following is a method that a fraudster might use to conceal inventory shrinkage?
Which of the following statements regarding financial statement disclosures is TRUE?
In which of the following process, all bidders are legally supposed to be placed on the same plane of equality, bidding on the same terms and conditions?
In which phase of the competitive bidding process do fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?
Occupational fraud and abuse is a (an) __________ of doing business, in much the same way that we pay expenses for electricity, taxes, and wages.
Depreciation is especially applicable when companies try to overvalue their assets and net worth; the lower their depreciation expense, the higher the company’s profits.
How many accounts are affected in fraudulent accounting entries and therefore the same number of categories on the financial statement?
_________ is defined as a person who works for the victim organization and who is the primary culprit.
Which of the following is the amount of money that would be realized upon the sale of the asset at some point in the future, less the costs associated with owning, operating, and selling it?
Which of the following methods would NOT be helpful in detecting a skimming scheme?
Inventory shrinkage is the unaccounted-for reduction in the company’s inventory that does not result from theft.
Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?
Which of the following situations describes a red flag that might be indicative of loan fraud?
Jonathan, a Certified Fraud Examiner (CFE), is tasked with identifying potential indicators of intrusion into his employer's computer network. Which of the following might indicate that the organization's network has been compromised or accessed without authorization?
According to accounting principles, ________ and ________ should be recorded or matched in the same accounting period; failing to do so violates the matching principle of GAAP.
A ___________ occurs when an employee, manager, or executive has an undisclosed economic or personal interest in a transaction that adversely affects the organization.
Not having any accounts receivable that are overdue is a common red flag of fictitious revenue schemes.
Black, an accounts receivable clerk, stole Customer A's monthly payment instead of posting it to A's account. When Customer B's payment arrives a few days later, Black applies the payment to Customer A's account. When Customer C's payment arrives a few days after that, Black applies it to Customer B's account. Black's method of crediting one account with money taken from another account is known as:
Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:
The person or persons who have access to __________ are often the targets of unethical vendors seeking an advantage in the process.