One reason employees might be hesitant to use PO boxes in shell company schemes is that some businesses are specially vary of sending checks to vendors that have street addresses only.
- A . True
- B . False
Another way to eliminate competition in the solicitation phase of the selection process is to:
- A . Solicit bid from fictitious suppliers
- B . Solicit transaction from fictitious vendors
- C . Solicit bid-splitting from fictitious vendors
- D . None of the above
_________ assumes the business will go on indefinitely in the future.
- A . Materiality
- B . Going concern
- C . Cost
- D . Fair value
According to SAB 104, for the revenue to be typically considered realized or realizable and earned, which of the following criteria is NOT met:
- A . Persuasive evidence of an arrangement exists
- B . Services has been rendered
- C . Timings have been met
- D . Collectability is reasonably assured
The person or persons who have access to __________ are often the targets of unethical
vendors seeking an advantage in the process.
- A . Bid-splitting
- B . Sealed bids
- C . General purchasing
- D . Tailor specifications
A typical issue involving material and fraud would be:
- A . Fraudulent statement
- B . Misappropriations
- C . Civil lawsuit
- D . Quality control
A technique by which checks are numbered using a new technique that is revealed by a colored highlighter pen or by a bright light held behind the check is called:
- A . Microline numbering
- B . Holographic safety border
- C . Embossed pearlescent numbering
- D . None of the above
___________ is to allow the owner, investors, creditors and others with an interest to know
the appropriate book worth of the business at a particular date.
- A . Equity
- B . Balance sheet
- C . Income statement
- D . Financial record
Which of the following search is used for unusually high incidence of returns and allowances scheme?
- A . Allowances by vendors
- B . Disposals of allowances than reorders
- C . Returns and allowances
- D . None of the above
The amount of cash on hand in a register may be compared to the amount showing in the register tape in order to detect _______.
- A . Employee theft
- B . Recorded sales
- C . Internal audits
- D . Occupational frauds
CORRECT TEXT
_________ is defined as a person who works for the victim organization and who is primary
culprit
One final means of concealing a register scheme, as with many kinds of fraud, is to destroy all records of the transaction.
- A . True
- B . False
According to Marshall, ______ are probable future economic benefits obtained or
controlled by a particular entity as a result of past transactions or events.
- A . Assets
- B . Liabilities
- C . Credentials
- D . None of above
When situational pressures and perceived opportunities are low and personal integrity is high, occupational fraud is much more likely to occur than when the opposite is true.
- A . True
- B . False
Larceny is the scheme in which an employee simply takes inventory from the company premises without attempting to conceal it in the books and records.
- A . True
- B . False
Physical tampering prevention is a check tampering technique that is used to secure bank assisted controls.
- A . True
- B . False
Maintain the presence of a manager or supervisor near the area of the cash register as a deterrent to theft is a prevention for:
- A . Fraudulent statement scheme
- B . Asset misappropriation scheme
- C . Larceny scheme
- D . Register disbursement scheme
People commit financial statement fraud to:
- A . Conceal false business performances
- B . Preserve personal status/control
- C . Maintain personal income
- D . Stand outside the accounting system
Delivery has not occurred or services have not been rendered when:
- A . Until installation and customer testing and acceptance has occurred.
- B . A written order exists but contains a right of return.
- C . Both A & B
- D . Neither A nor B
_____________ involves purposeful misreporting of financial information about the
organization that is intended to mislead those who read it.
- A . Fraudulent statement
- B . Corruption
- C . Asset misappropriations
- D . None of above
A process by which several bidders conspire to split contracts up and ensure that each gets a certain amount of work is called:
- A . Bid opening
- B . Fictitious Bidding
- C . Bid pooling
- D . Bid log
Depreciation is especially applicable when companies try to overvalue their assets and net worth; the lower their depreciation expense, the higher the company’s profits.
- A . True
- B . False
Verify supporting documentation on outstanding checks written for a material amount is a test used to conduct for:
- A . Check disbursement
- B . Bank confirmation
- C . Bank confirmation
- D . Cut-off statements
____________ is a process by which a bookkeeper records all transactions and can adjust
the books.
- A . Journal Entries
- B . Accounting Cycle
- C . Financial statement
- D . None of all
The act of an official or fiduciary person who unlawfully and wrongfully uses his station or character to procure some benefit, contrary to duty and rights of others is called:
- A . Conflict of interest
- B . Corruption
- C . Bribery
- D . Overbilling
A shell company scheme in which actual goods or services are sold to the victim company is known as:
- A . Maintenance scheme
- B . Allocation scheme
- C . Distribution scheme
- D . Pass-through scheme
How many accounts are affected in fraudulent accounting entries and therefore same
number of categories on the financial statement?
- A . One
- B . At least two
- C . More than two
- D . None of above
Which of the following is NOT the method for stealing inventory and other assets?
- A . Larceny schemes
- B . Asset requisition and transfer
- C . Purchasing and receiving schemes
- D . Sales & Equipment handling
Assets that are long-lived and that differ from property, plant and equipment hat has been purchased outright or acquired under a capital lease are:
- A . Tangible Assets
- B . Intangible Assets
- C . Forced Assets
- D . None of above
Bank statement are diligently reviewed to ensure that amounts and signature have not been altered, is an activity for:
- A . Account analysis
- B . Bank reconciliation
- C . Check disbursement controls
- D . Check tampering
The behavior profile of employees who are involved in bribery schemes may include:
- A . Gambling habit
- B . Extravagant lifestyle
- C . Drug and/or alcohol addiction
- D . All of the above
________ increase assets and expenses and/or decrease liabilities and/or equity
- A . Journal Entries
- B . Debit
- C . Credit
- D . None of all
A voucher is:
- A . a file that includes the purchase order that was send to the vendor, the vendor invoice listing the cost and quantity of items purchased, and the internal receiving reports that verify the purchased items have been delivered.
- B . a figure that includes the sale order that was send to the dealer, the vendor invoice
listing the cost and quantity of items sold, and the internal receiving reports that verify the
purchased items have been delivered. - C . a report that includes the purchase order that was send to the vendor, the vendor invoice listing the quality and quantity of items purchased, and the external receiving reports that verify the items have been sold.
- D . a mammogram that includes the purchase order that was send to the purchaser, the purchaser invoice listing the benefits and quantity of items purchased, and the internal receiving reports that verify the purchased items have been sold.
If the assets are intentionally purchased by the company but simply misappropriated by the fraudster, this is referring to as:
- A . Inventory larceny scheme
- B . Asset receiving scheme
- C . Fraudulent purchase
- D . Falsify shipping
Which are check tempering frauds in which an employee prepares a fraudulent check and submits it usually along with legitimate checks to an authorized maker who signs it without a proper review?
- A . Endorse check scheme
- B . Legitimate check scheme
- C . Payable check scheme
- D . Concealed check scheme
Employees with the authority to grant discounts in order to skim revenues may use which authority?
- A . False discounts
- B . Recording a discount on sale procedure
- C . Internal discount sales audits
- D . None of the above
Skimming is:
- A . The removal of cash from a victim entity prior to its entry in an accounting system.
- B . The addition of cash from a victim entity prior to its entry in an accounting system.
- C . The removal of cash from a victim entity after its entry in an accounting system.
- D . None of above
The principal way to detect omitted credits from books of account is through:
- A . Forced Balance
- B . Trend analysis
- C . Expense account
- D . None of all
CORRECT TEXT
___________ allows the fraud examiner to inspect key attributes on a smaller portion (or
sample) of those documents.
Which of the following offender types in which people who take the money and run away?
- A . Absconders
- B . Long-term violators
- C . Offender types
- D . None of the above
CORRECT TEXT
The _______________ cost method of pricing would carry an asset’s value on the financial
statements as what it would currently cost, considering inflation.
The scheme which reduces victim companies to issue fraudulent payments for goods or services that they have not received is called:
- A . Bogus claims
- B . Billing scheme
- C . Reliance billing
- D . Misappropriate claims
The most common method for billing scheme is:
- A . Register
- B . Tips
- C . Accident
- D . None of the above
CORRECT TEXT
One of the simplest ways to justify unacceptable conduct and avoid guilt feelings is to invent a good reason for ________.
Which of the following method is NOT used to detect conflicts of interest?
- A . Tips & Complaints
- B . Review of vendor ownership files
- C . Underbillings of assets
- D . Interviews with purchasing personnel
Which check tampering red flag may indicate employees have embezzled cash and charged the embezzlement to expense accounts?
- A . Voided checks
- B . Payable checks
- C . Missing checks
- D . Duplicate checks
In physical tampering prevention technique, hidden images can be seen only when the check is held at an angle through:
- A . High-resolution sprays
- B . Holographic safety inks
- C . Watermark backers
- D . Chrome coloring
Physical assets including _________ and ________ are the most commonly
misappropriated noncash asset in our study.
- A . Interest & Collusion
- B . Inventory & Equipment
- C . Inventory & Purchase
- D . Sales & Equipment
One final means of concealing a register scheme, as with many kinds of fraud, is to destroy all records of the transaction.
- A . True
- B . False
__________ can be defined as conduct detrimental to the organization and to the
employee.
- A . Employee deviance
- B . Employee theft
- C . Employee fraud
- D . All of the above
The most common method for billing scheme is:
- A . Register
- B . Tips
- C . Accident
- D . None of the above
Which check tampering red flag may indicate employees have embezzled cash and charged the embezzlement to expense accounts?
- A . Voided checks
- B . Payable checks
- C . Missing checks
- D . Duplicate checks
_________ revenues involve the recording sales of goods or services hat did not occur.
- A . Fictitious or fabricated revenues
- B . Financial revenues
- C . Red flag revenues
- D . Concealed revenues
In which phase of competitive bidding process, fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?
- A . Need recognition
- B . Solicitation
- C . False specification
- D . Submission
When an incorrect total is carried from the journal to the ledger or from ledger to the financial statements, this method is called:
- A . Forced Balance
- B . Out-of-balance
- C . False balance
- D . None of all
The excess credits (or debits) on the income statement are used to decrease (or increase) the equity account.
- A . True
- B . False
__________ may be defined as the offering, giving, receiving or soliciting anything of value
to influence an official act.
- A . Corruption
- B . Diverting business to vendors
- C . Bribery
- D . Lacking approval authority
The forms that allow noncash assets to be moved from one location in a company to another can be used to facilitate the misappropriation of those assets are called:
- A . Inventory usages
- B . Fake sales
- C . Asset requisition
- D . All of the above
Which of the following are used in a short term skimming scheme?
- A . Unrecorded sales, understated sales and theft of incoming checks
- B . Unrecorded sales, understated sales and dual endorsements
- C . False company accounts, understated sales and theft of incoming checks
- D . Understated sales, theft of incoming checks and check-for-currency substitutions
A special scheme in which employees know their employer is seeking to purchase a certain asset and take advantage of the situation by purchasing the asset themselves is:
- A . Conflict of interest in sale
- B . Turnaround sale or flip
- C . Unauthorized sale
- D . Written sale of unique assets