Which of the following is NOT the method for stealing inventory and other assets?

Which of the following is NOT the method for stealing inventory and other assets?A . Larceny schemesB . Asset requisition and transferC . Purchasing and receiving schemesD . Sales & Equipment handlingView AnswerAnswer: D

February 7, 2021 No Comments READ MORE +

In which phase of competitive bidding process, fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?

In which phase of competitive bidding process, fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?A . Need recognitionB . SolicitationC . False specificationD . SubmissionView AnswerAnswer: B

February 6, 2021 No Comments READ MORE +

Which check tampering red flag may indicate employees have embezzled cash and charged the embezzlement to expense accounts?

Which check tampering red flag may indicate employees have embezzled cash and charged the embezzlement to expense accounts?A . Voided checksB . Payable checksC . Missing checksD . Duplicate checksView AnswerAnswer: C

February 6, 2021 No Comments READ MORE +

Bank statement are diligently reviewed to ensure that amounts and signature have not been altered, is an activity for:

Bank statement are diligently reviewed to ensure that amounts and signature have not been altered, is an activity for:A . Account analysisB . Bank reconciliationC . Check disbursement controlsD . Check tamperingView AnswerAnswer: C

February 5, 2021 No Comments READ MORE +

When situational pressures and perceived opportunities are low and personal integrity is high, occupational fraud is much more likely to occur than when the opposite is true.

When situational pressures and perceived opportunities are low and personal integrity is high, occupational fraud is much more likely to occur than when the opposite is true.A . TrueB . FalseView AnswerAnswer: B

February 5, 2021 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT _________ is defined as a person who works for the victim organization and who is primary culpritView AnswerAnswer: Principal perpetrator

February 5, 2021 No Comments READ MORE +

The most common method for billing scheme is:

The most common method for billing scheme is:A . RegisterB . TipsC . AccidentD . None of the aboveView AnswerAnswer: B

February 5, 2021 No Comments READ MORE +

According to Marshall, ______ are probable future economic benefits obtained or

According to Marshall, ______ are probable future economic benefits obtained or controlled by a particular entity as a result of past transactions or events.A . AssetsB . LiabilitiesC . CredentialsD . None of aboveView AnswerAnswer: A

February 5, 2021 No Comments READ MORE +

The principal way to detect omitted credits from books of account is through:

The principal way to detect omitted credits from books of account is through:A . Forced BalanceB . Trend analysisC . Expense accountD . None of allView AnswerAnswer: B

February 4, 2021 No Comments READ MORE +

One final means of concealing a register scheme, as with many kinds of fraud, is to destroy all records of the transaction.

One final means of concealing a register scheme, as with many kinds of fraud, is to destroy all records of the transaction.A . TrueB . FalseView AnswerAnswer: A

February 4, 2021 No Comments READ MORE +