DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ACFE
  3. Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam
  4. ACFE.CFE-Financial-Transactions-and-Fraud-Schemes.v2023-12-20.q93
  5. Question 1

Join the discussion

Question 1/93

__________ means that traditional bribery statutes proscribe only payments made to influence the decisions of government agents or employees.
Correct Answer:
Official act

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (93q)
Q1. __________ means that traditional bribery statutes proscribe only payments made to influen...
Q2. Which of the following offender types in which people who take the money and run away?...
Q3. What type of fraud scheme would an analysis of payroll withholdings be MOST LIKELY to reve...
Q4. The act of an official or fiduciary person who unlawfully and wrongfully uses his station ...
Q5. In which phase of competitive bidding process, fraudsters attempt to influence the selecti...
Q6. Which of the following is MOST ACCURATE concerning common methods that identity thieves us...
Q7. By what accountant means that the financial figures presented by the company are at least ...
Q8. Asset misappropriation schemes were the "middle children" of the study; they were more com...
Q9. Most of the shell company schemes involve the purchase of goods rather than services....
Q10. Which of the following is NOT the method for stealing inventory and other assets?...
Q11. Which of the following is NOT a measure commonly taken by fraudsters during account takeov...
Q12. A special scheme in which employees know their employer is seeking to purchase a certain a...
Q13. Which of the following statements is TRUE with regard to the income statement?...
Q14. Which of the following is NOT the phase of the bidding process?...
Q15. Which of the following is a red flag that might indicate that someone is attempting to com...
Q16. __________ can be defined as conduct detrimental to the organization and to the employee....
Q17. Which of the following is a method that might be used to fraudulently overstate the accoun...
Q18. Which of the following scenarios is an example of an electronic extortion scheme?...
Q19. When an incorrect total is carried from the journal to the ledger or from ledger to the fi...
Q20. The excess credits (or debits) on the income statement are used to decrease (or increase) ...
Q21. By removing a tangible asset from the business (a debit), the books will be ___________ by...
Q22. Which of the following are not of Basic types of non-sharable problems?...
Q23. ________ decrease assets and expenses and/or increase liabilities and/or equity...
Q24. Asset misappropriations have an effect on the liabilities and do also have an indirect eff...
Q25. __________ is required if and when officers, executives or other persons in trusted positi...
Q26. Which of the following statements regarding financial statement disclosures is FALSE?...
Q27. Which of the following is FALSE concerning methods corporate spies generally use to steal ...
Q28. The most common method of detection in corruption cases is:...
Q29. Which of the following is NOT the reason why senior management will overstate business sta...
Q30. ____________ corrupt employees can cause inventory to be fraudulently delivered to themsel...
Q31. ___________ and __________ are used to increase (or decrease) the equity account....
Q32. Green was a salesperson whose job required frequent travel. When Green went on a trip with...
Q33. One final means of concealing a register scheme, as with many kinds of fraud, is to destro...
Q34. Employees with the authority to grant discounts in order to skim revenues may use which au...
Q35. When expenses used to produce income- all of them- should be matched in a consistent manne...
Q36. A travel agency offered to provide free travel and entertainment to Rosa, the purchasing a...
Q37. Which of the following is a method for gaining unauthorized access to a computer system wh...
Q38. Which of the following is true for Red flags associated with fictitious revenues?...
Q39. ___________ allows the fraud examiner to inspect key attributes on a smaller portion (or s...
Q40. Which of the following fraud schemes is MOST LIKELY to target a neighborhood of immigrants...
Q41. According to the recommended methodology for responding to cybersecurity incidents, which ...
Q42. One of the simplest ways to justify unacceptable conduct and avoid guilt feelings is to in...
Q43. According to a survey, in principal perpetrator, males in a majority of cases, accounting ...
Q44. Maintain the presence of a manager or supervisor near the area of the cash register as a d...
Q45. Which of the following is NOT the type of billing scheme?...
Q46. A scheme is classified as a Conflict of interest:...
Q47. Which of the following are used in a short term skimming scheme?...
Q48. According to Marshall, ______ are probable future economic benefits obtained or controlled...
Q49. Entering a sales total lower than the amount actually paid by the customer is called:...
Q50. According to Hollinger and Clark for Policy development, management must pay attention to:...
Q51. Which of the following must be present for a fraud to exist?...
Q52. Undisclosed payments made by vendors to employees of purchasing companies are referred to ...
Q53. Which of the following search is used for unusually high incidence of returns and allowanc...
Q54. If an analytical review reveals that a company's cost of goods sold has increased by a dis...
Q55. Which of the following is not the skimming scheme?...
Q56. Financial statement fraud is committed by:
Q57. Which of the following statements describes a best practice for preventing contract and pr...
Q58. When an employee processes a fictitious refund of goods, the victim company's inventory is...
Q59. Which of the following is a reason why prepaid debit and gift card fraud schemes are attra...
Q60. Delivery has not occurred or services have not been rendered when:...
Q61. Bayan finds a residential property with an owner who lives far away. She forges the owner'...
Q62. Which of the following actions could management take to make a company appear more profita...
Q63. Collusion or bid-rigging between bidders is called...
Q64. Which of the following is the MOST ACCURATE statement about the different types of malware...
Q65. The prime targets for skimming schemes which are hard to monitor and predict such as late ...
Q66. The person or persons who have access to __________ are often the targets of unethical ven...
Q67. Which counts sometimes can give rise to inventory theft detection?...
Q68. The scheme which reduces victim companies to issue fraudulent payments for goods or servic...
Q69. Multiple cashiers operate from a single cash drawer without separate access codes is a red...
Q70. The most basic skimming scheme occurs when:
Q71. ___________ should be examined to see that all are properly documented and that inappropri...
Q72. Which of the following measures is MOST LIKELY to prevent cash larceny schemes from occurr...
Q73. Which of the following is NOT the aspect of inventory purchase?...
Q74. Which of the following is an example of a technical security control that organizations ca...
Q75. The fraudsters' interest lies with an employer other than a company....
Q76. Which of the following scenarios is an example of upcoding?...
Q77. If a construction developer submitted a draw request to a bank, which of the following wou...
Q78. Bank cut-off statements should be requested for 10-15 days after the closing date of the b...
Q79. A typical issue involving material and fraud would be:...
Q80. __________ may be defined as the offering, giving, receiving or soliciting anything of val...
Q81. A ___________ occurs when an employee, manager or executive has an undisclosed economic or...
Q82. Neil, a Certified Fraud Examiner (CFE), discovers that a borrower used the same property a...
Q83. Organizations can employ ___________ to provide protection for computing resources by incr...
Q84. Perceived certainty of detection is directly related to employee theft for respondents in ...
Q85. Every bribe is a two-sided transaction, in which where a vendor bribes a purchaser, there ...
Q86. Larceny by Fraud or deception means that:
Q87. Occupational fraud and abuse is a (an) __________ of doing business, in much the same way ...
Q88. The more power a person has over the bidding process, the more likely the person can influ...
Q89. Geoffrey, a homeowner, has decided to add a patio to the back of his house. Geoffrey hires...
Q90. __________ inventory and other assets is relatively common way for fraudsters to remove as...
Q91. Which of the following is NOT one of the information security goals that should be achieve...
Q92. Organizations that had external audits actually had higher median losses and longer lastin...
Q93. To keep the accounting equation in balance, which of the following actions will need to be...
[×]

Download PDF File

Enter your email address to download ACFE.CFE-Financial-Transactions-and-Fraud-Schemes.v2023-12-20.q93.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.