New Year Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CFE-Financial-Transactions-and-Fraud-Schemes Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers

Questions 4

__________ can be defined as conduct detrimental to the organization and to the employee.

Options:

A.

Employee deviance

B.

Employee theft

C.

Employee fraud

D.

All of the above

Buy Now
Questions 5

In which phase of the competitive bidding process do fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?

Options:

A.

Need recognition

B.

Solicitation

C.

False specification

D.

Submission

Buy Now
Questions 6

Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?

Options:

A.

Kickback scheme

B.

Illegal gratuity scheme

C.

Diversion scheme

D.

Economic extortion scheme

Buy Now
Questions 7

Which of the following can constitute a bribe, even if the illicit payment is never actually made?

Options:

A.

Offering a payment

B.

Corruption in payment

C.

Kickback payment

D.

Overbilling in payment

Buy Now
Questions 8

An analytical review reveals that XYZ Company's cost of goods sold has increased by 75% in the last year. However, its sales revenues only increased by 25% during the same period. This situation MOST LIKELY indicates which of the following?

Options:

A.

The company started recording warranty liabilities.

B.

There were fewer sales this year compared to last year.

C.

There were more sales returns this year than in the prior year.

D.

Inventory has been depleted by theft.

Buy Now
Questions 9

Which of the following is a TRUE statement about counterfeit payment cards?

Options:

A.

The hologram on payment cards is relatively simple to reproduce.

B.

The production of counterfeit payment cards is too complicated for the use of high-speed printers.

C.

Counterfeit payment cards can be created with blank plastic cards.

D.

All of the above are true statements about counterfeit payment cards.

Buy Now
Questions 10

Black, an accounts receivable clerk, stole Customer A's monthly payment instead of posting it to A's account. When Customer B's payment arrives a few days later, Black applies the payment to Customer A's account. When Customer C's payment arrives a few days after that, Black applies it to Customer B's account. Black's method of crediting one account with money taken from another account is known as:

Options:

A.

Padding

B.

Lapping

C.

Substitution

D.

Daisy chain

Buy Now
Questions 11

____________ is a process by which a bookkeeper records all transactions and can adjust the books.

Options:

A.

Journal Entries

B.

Accounting Cycle

C.

Financial statement

D.

None of all

Buy Now
Questions 12

Which of the following is a common red flag of a bid tailoring scheme?

Options:

A.

The procuring entity's request for bid submissions provides clear bid submission information.

B.

There are unusually narrow specifications for the type of goods being procured.

C.

The procuring entity rebids contracts because fewer than the minimum number of bids are received.

D.

Numerous bidders respond to the procuring entity's bid requests.

Buy Now
Questions 13

Which of the following is the amount of money that would be realized upon the sale of the asset at some point in the future, less the costs associated with owning, operating, and selling it?

Options:

A.

Net realizable value

B.

Going concern

C.

Cost

D.

Fair value

Buy Now
Questions 14

A typical issue involving materiality and fraud would be:

Options:

A.

Fraudulent statement

B.

Misappropriations

C.

Civil lawsuit

D.

Quality control

Buy Now
Questions 15

Another way to eliminate competition in the solicitation phase of the selection process is to:

Options:

A.

Solicit bids from fictitious suppliers

B.

Solicit transactions from fictitious vendors

C.

Solicit bid-splitting from fictitious vendors

D.

None of the above

Buy Now
Questions 16

Which of the following is TRUE regarding ghost employee schemes?

Options:

A.

The ghost employee must be a fictitious person.

B.

The ghost employee must be classified as an exempt employee.

C.

The ghost employee must be someone who has never worked for the victim company.

D.

The ghost employee must be added to the payroll.

Buy Now
Questions 17

Which of the following is not a skimming scheme?

Options:

A.

Unrecorded sales

B.

Fraud & Cost

C.

Theft of checks through the mail

D.

Understated sales and receivables

Buy Now
Questions 18

Which of the following is one of the sections on the statement of cash flows?

Options:

A.

Cash flows from purchasing activities

B.

Cash flows from financing activities

C.

Cash flows from earnings activities

D.

Cash flows from strategic activities

Buy Now
Questions 19

Physical assets including _________ and ________ are the most commonly misappropriated noncash assets in our study.

Options:

A.

Interest & Collusion

B.

Inventory & Equipment

C.

Inventory & Purchase

D.

Sales & Equipment

Buy Now
Questions 20

Which of the following would be MOST INDICATIVE of loan fraud in a draw request submitted by a construction developer?

Options:

A.

The developer's personal account statements have been omitted.

B.

Change orders have been included.

C.

Lien releases from subcontractors are not included with the request.

D.

There are several inspection reports.

Buy Now
Questions 21

When situational pressures and perceived opportunities are low and personal integrity is high, occupational fraud is much more likely to occur than when the opposite is true.

Options:

A.

True

B.

False

Buy Now
Questions 22

Which of the following is NOT the reason why senior management will overstate business statements?

Options:

A.

Comply with debt covenants

B.

Meet personal performance criteria

C.

Trigger performance-related compensation

D.

Show a pattern of growth to support sale of a business

Buy Now
Questions 23

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:

Options:

A.

Human intelligence

B.

Baiting

C.

Scavenging

D.

Open-source intelligence

Buy Now
Questions 24

The most common method of detection in corruption cases is:

Options:

A.

Internal audits

B.

Internal controls

C.

Tips

D.

By accident

Buy Now
Questions 25

Antonia, a Certified Fraud Examiner (CFE), discovers that a loan applicant misrepresented their creditworthiness and income to qualify for a mortgage on a new house. Which type of loan fraud BEST describes the scheme that Antonia uncovered?

Options:

A.

Residential loan fraud

B.

Credit data blocking

C.

Double-pledging collateral

D.

Linked financing

Buy Now
Questions 26

_________ assumes the business will go on indefinitely in the future.

Options:

A.

Materiality

B.

Going concern

C.

Cost

D.

Fair value

Buy Now
Questions 27

A running count that records how much inventory should be on hand is referred to:

Options:

A.

Altered inventory

B.

Perpetual inventory

C.

Shrinking inventory

D.

Fictitious inventory

Buy Now
Questions 28

All the following are basic methods used to prove corrupt payments in corruption schemes EXCEPT:

Options:

A.

Making inquiries to the relevant Administration of Taxation

B.

Secretly infiltrating ongoing transactions

C.

Using an inside witness

D.

Identifying and tracing payments through audit steps

Buy Now
Questions 29

Which of the following would NOT be considered a conflict of interest?

Options:

A.

Harriet owns a significant amount of stock in a company she regularly buys her employer's office supplies from, but her employer is unaware of this fact.

B.

Robert works for Muir's Printing Services on weekdays and Winsted Café on weekends, but he does not tell either employer about the other job.

C.

Jennifer is on the board of directors of two companies that compete in the retail market, but she does not tell either company about her role at the other.

D.

Ernest hires his brother, John, to provide vending services to his employer's lunch areas, but he does not disclose their relationship.

Buy Now
Questions 30

Pilar had to purchase computer equipment for ABC Corporation, her employer. Pilar created a shell company, used the shell company to purchase used computer equipment, and then resold that equipment to ABC Corporation at an increased price. This is an example of a:

Options:

A.

Need recognition scheme

B.

Pay and return scheme

C.

Pass-through scheme

D.

Cash larceny scheme

Buy Now
Questions 31

Collusion or bid-rigging between bidders is called

Options:

A.

Bribery receipt

B.

Bid solicitation

C.

To withdraw low bids

D.

Contract acceptance

Buy Now
Questions 32

Which of the following is a method that a fraudster might use to conceal inventory shrinkage?

Options:

A.

Selling merchandise without recording the sale

B.

Writing off stolen inventory as scrap

C.

Falsely increasing the perpetual inventory record

D.

All of the above

Buy Now
Questions 33

Every bribe is a two-sided transaction, in which where a vendor bribes a purchaser, there is someone on the vendor’s side of the transaction who is not making an illicit payment.

Options:

A.

True

B.

False

Buy Now
Questions 34

Employees steal an incoming payment and then place the incoming funds in an interest-bearing account for:

Options:

A.

Converting stolen checks

B.

Concealing the fraud

C.

Short-term skimming

D.

All of the above

Buy Now
Questions 35

Which of the following methods is NOT used to detect conflicts of interest?

Options:

A.

Tips & Complaints

B.

Review of vendor ownership files

C.

Underbillings of assets

D.

Interviews with purchasing personnel

Buy Now
Questions 36

The most basic skimming scheme occurs when:

Options:

A.

An employee sells goods or services to a customer, collects the customer’s payment, but makes no record of the sale.

B.

An employee buys goods or services from a customer, drops the customer’s payment, but makes no record of the purchase.

C.

An employee sells goods or services to a stakeholder, collects the stakeholder’s payment and makes record of the sale too.

D.

An employee buys goods or services from a stakeholder, drops the stakeholder’s payment and makes record of the purchase too.

Buy Now
Questions 37

Depreciation is especially applicable when companies try to overvalue their assets and net worth; the lower their depreciation expense, the higher the company’s profits.

Options:

A.

True

B.

False

Buy Now
Questions 38

__________ may be defined as the offering, giving, receiving, or soliciting anything of value to influence an official act.

Options:

A.

Corruption

B.

Diverting business to vendors

C.

Bribery

D.

Lacking approval authority

Buy Now
Questions 39

Baker, an employee of ABC Corporation, was the only employee who had control of the purchasing function for his department. Baker authorized the purchase of supplies that ABC did not need and used these supplies to make improvements to his house. This is an example of what kind of fraud?

Options:

A.

Pay and return scheme

B.

Personal purchases with company funds

C.

Pass-through scheme

D.

Theft of inventory

Buy Now
Questions 40

A scheme is classified as a Conflict of Interest:

Options:

A.

when an employee must have some kind of ownership or employment interest in the vendor submitting the invoice.

B.

when a salesman must have some kind of ownership or employment interest in the vendor submitting the sales.

C.

when a purchaser must have some kind of ownership or employment interest in the vendor submitting the purchase.

D.

when a dealer must have some kind of dealership interest in the vendor submitting the stock.

Buy Now
Questions 41

Which of the four basic measures, if properly installed and implemented, may help prevent inventory fraud?

Options:

A.

Proper documentation, segregation of duties, independent checks, and physical safeguards

B.

Proper documentation, segregation of duties, independent checks, and inventory control

C.

Proper documentation, physical padding, independent checks, and physical safeguards

D.

Prenumbered affiliations, segregation of duties, independent checks, and physical safeguards

Buy Now
Questions 42

Which of the following are the classifications for Corruption?

Options:

A.

Bribery, economic extortion, illegal gratuities, and conflicts of interest

B.

Corruption, bribery, economic extortion, conflicts of interest

C.

Overbilling, bribery, bid-rigging, and illegal gratuities

D.

Economic extortion, bribery, illegal gratuities, and corruption

Buy Now
Questions 43

A tangible asset is one which is:

Options:

A.

Capable of being perceived

B.

Capable of being appraised

C.

Both A & B

D.

Neither A nor B

Buy Now
Questions 44

Which of the following situations describes a red flag that might be indicative of loan fraud?

Options:

A.

A loan file contains missing documents that are later found in another file.

B.

There is low turnover in a real estate developer's personnel.

C.

A change order is submitted at the same time as a draw request.

D.

The number of change orders for a small project continues to increase.

Buy Now
Questions 45

Which of the following is NOT one of the information security goals that should be achieved to secure an e-commerce system for users and account holders?

Options:

A.

Availability of data

B.

Accuracy of data

C.

Authentication

D.

Non-repudiation

Buy Now
Questions 46

Which of the following scenarios is the MOST ACCURATE example of insurer health care fraud?

Options:

A.

While acting as an intermediary for a government health care program, the insurance company verifies provider claims before billing the government for them.

B.

To obtain regulatory approval for increasing its rates, the insurance company submits inflated cost data for review.

C.

After negotiating discounts with its medical providers, the insurance company provides the negotiated rate to its consumers instead of the original amount.

D.

Upon identifying that a claimant has provided incomplete information, the insurance company refuses to pay a claim.

Buy Now
Questions 47

Which of the following is an insurance fraud detection tool used for identifying funds fraudulently sent to fictitious payees by using computer-generated reports to compare payments sent to the same location?

Options:

A.

Duplicate payment lists

B.

Address similarity reports

C.

Exception reports

D.

Electronic confirmations

Buy Now
Questions 48

Which of the following is a method of identity theft prevention that is recommended for individuals?

Options:

A.

Do not reuse passwords for more than two accounts.

B.

Install security updates and patches for personal computers annually.

C.

Only use email to send personal information when contacting reputable organizations.

D.

Use biometric authentication when it is available.

Buy Now
Questions 49

Conflict of interest cases are more easily prevented than detected.

Options:

A.

True

B.

False

Buy Now
Questions 50

Which of the following methods would NOT be helpful in detecting a skimming scheme?

Options:

A.

Confirming customers' unpaid account balances

B.

Examining journal entries for false credits made to the inventory

C.

Performing physical inventory counts

D.

Comparing cash register totals to the cash count

Buy Now
Questions 51

___________ allows the fraud examiner to inspect key attributes on a smaller portion (or sample) of those documents.

Options:

Buy Now
Questions 52

Undisclosed payments made by vendors to employees of purchasing companies are referred to as:

Options:

A.

Bid-rigging

B.

Kickbacks

C.

Presolicitation

D.

None of the above

Buy Now
Questions 53

The fraudster’s interest lies with an employer other than the company.

Options:

A.

True

B.

False

Buy Now
Questions 54

In what type of fraud scheme does an employee steal cash after it has appeared on the company’s books?

Options:

A.

Cash larceny scheme

B.

Unrecorded sales (skimming) scheme

C.

Kickback scheme

D.

Understated sales (skimming) scheme

Buy Now
Questions 55

The heart of the bookkeeping system is the ___________.

Options:

A.

Asset

B.

Liability

C.

Checkbook

D.

Journal

Buy Now
Questions 56

Statistical sampling enables the examiner to predict the occurrence rate for the population and therefore determine with some accuracy the error rate, or the potential for fraud.

Options:

A.

True

B.

False

Buy Now
Questions 57

How many accounts are affected in fraudulent accounting entries and therefore the same number of categories on the financial statement?

Options:

A.

One

B.

At least two

C.

More than two

D.

None of above

Buy Now
Questions 58

Entering a sales total lower than the amount actually paid by the customer is called:

Options:

A.

Underrings a sale

B.

Recording a sale procedure

C.

Internal sales audits

D.

All of the above

Buy Now
Questions 59

Which of the following scenarios BEST describes an electronic funds transfer (EFT) fraud scheme?

Options:

A.

An individual uses another person's personal identifying information to fill out a credit card application in their name and plans to make online purchases using the new card.

B.

A hacker obtains the account and password information of consumers and uses them to direct funds from their accounts.

C.

A restaurant server secretly scans a customer's credit card information into a small device for fraudulent use at a later time.

D.

An employee of a person-to-person (P2P) provider misrepresents the number of hours that they worked to increase the amount of money earned on their paycheck.

Buy Now
Questions 60

Which of the following is a condition that facilitates insider cyberfraud?

Options:

A.

Access logs are not reviewed by management.

B.

Production programs are run during the business day.

C.

Access privileges are restricted to assigned job functions.

D.

Separation of duties exists in the data center.

Buy Now
Questions 61

Financial statement fraud is committed by:

Options:

A.

Organized criminals

B.

Mid and lower-level employees

C.

Senior Management

D.

All of the above

Buy Now
Questions 62

John is a salesperson whose job requires him to entertain potential clients frequently. When John and another salesperson from a different company take a potential client to dinner, the other salesperson pays for the meal. John creates his own receipt for the meal and submits the expense for reimbursement from his company. John's scheme can BEST be characterized as:

Options:

A.

A mischaracterized expense reimbursement scheme

B.

A fictitious expense reimbursement scheme

C.

A multiple reimbursement scheme

D.

An overstated expense reimbursement scheme

Buy Now
Questions 63

Which of the following is NOT a method for stealing inventory and other assets?

Options:

A.

Larceny schemes

B.

Asset requisition and transfer

C.

Purchasing and receiving schemes

D.

Sales & Equipment handling

Buy Now
Questions 64

Which of the following fraud schemes is MOST LIKELY to target members of a religious community?

Options:

A.

Affinity fraud

B.

Social control fraud

C.

Bait and switch scheme

D.

Advance-fee scheme

Buy Now
Questions 65

By what accountant means that the financial figures presented by the company are at least as much as reflected in the statements, if not more.

Options:

A.

Fraudulent statement

B.

Misappropriations

C.

Conservatism

D.

Matching

Buy Now
Questions 66

Joe's automobile insurance policy expired in June. In August, Joe was involved in an automobile accident, and his vehicle was severely damaged. After the accident, Joe contacted his insurance company and reinstated the policy. In September, Joe then submitted a claim with a September accident date for the damages that occurred to his vehicle in August. Joe has engaged in which of the following insurance schemes?

Options:

A.

Staged accident

B.

Inflated damages

C.

Past posting

D.

Vehicle repair

Buy Now
Questions 67

Hannah is a manager at a financial institution. To safeguard the bank and its customers from electronic funds transfer (EFT) fraud, Hannah is implementing several preventive measures. Which of the following is NOT a measure Hannah should take to prevent EFT fraud?

Options:

A.

If a customer reports the loss or theft of an access device, then cancel the existing card, PIN, or other form of access and issue a new one.

B.

Send a welcome letter to new customers to determine if the address submitted on the account application is valid.

C.

Separate the duties of bank employees so that the responsibilities for the issuance of access devices are separate from the issuance of PINs.

D.

Mail PINs and other associated account information together to reduce the chance of those items being lost during transit.

Buy Now
Questions 68

Which counts sometimes can give rise to inventory theft detection?

Options:

A.

Perpetual inventory counts

B.

Physical inventory counts

C.

Concealment inventory counts

D.

None of the above

Buy Now
Questions 69

Which of the following is a TRUE statement regarding check fraud?

Options:

A.

Most perpetrators of check fraud are caught and prosecuted.

B.

The equipment required to commit check fraud is relatively inexpensive.

C.

The penalties for committing check fraud are relatively severe.

D.

None of the above statements are true.

Buy Now
Questions 70

The _______________ cost method of pricing would carry an asset’s value on the financial statements as what it would currently cost, considering inflation.

Options:

Buy Now
Exam Name: Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam
Last Update: Jan 1, 2026
Questions: 235
CFE-Financial-Transactions-and-Fraud-Schemes pdf

CFE-Financial-Transactions-and-Fraud-Schemes PDF

$25.5  $84.99
CFE-Financial-Transactions-and-Fraud-Schemes Engine

CFE-Financial-Transactions-and-Fraud-Schemes Testing Engine

$30  $99.99
CFE-Financial-Transactions-and-Fraud-Schemes PDF + Engine

CFE-Financial-Transactions-and-Fraud-Schemes PDF + Testing Engine

$40.5  $134.99