Join the discussion
Question 1/93
__________ means that traditional bribery statutes proscribe only payments made to influence the decisions of government agents or employees.
Correct Answer:
Official act
Add Comments
- Other Question (93q)
- Q1. __________ means that traditional bribery statutes proscribe only payments made to influen...
- Q2. Which of the following offender types in which people who take the money and run away?...
- Q3. What type of fraud scheme would an analysis of payroll withholdings be MOST LIKELY to reve...
- Q4. The act of an official or fiduciary person who unlawfully and wrongfully uses his station ...
- Q5. In which phase of competitive bidding process, fraudsters attempt to influence the selecti...
- Q6. Which of the following is MOST ACCURATE concerning common methods that identity thieves us...
- Q7. By what accountant means that the financial figures presented by the company are at least ...
- Q8. Asset misappropriation schemes were the "middle children" of the study; they were more com...
- Q9. Most of the shell company schemes involve the purchase of goods rather than services....
- Q10. Which of the following is NOT the method for stealing inventory and other assets?...
- Q11. Which of the following is NOT a measure commonly taken by fraudsters during account takeov...
- Q12. A special scheme in which employees know their employer is seeking to purchase a certain a...
- Q13. Which of the following statements is TRUE with regard to the income statement?...
- Q14. Which of the following is NOT the phase of the bidding process?...
- Q15. Which of the following is a red flag that might indicate that someone is attempting to com...
- Q16. __________ can be defined as conduct detrimental to the organization and to the employee....
- Q17. Which of the following is a method that might be used to fraudulently overstate the accoun...
- Q18. Which of the following scenarios is an example of an electronic extortion scheme?...
- Q19. When an incorrect total is carried from the journal to the ledger or from ledger to the fi...
- Q20. The excess credits (or debits) on the income statement are used to decrease (or increase) ...
- Q21. By removing a tangible asset from the business (a debit), the books will be ___________ by...
- Q22. Which of the following are not of Basic types of non-sharable problems?...
- Q23. ________ decrease assets and expenses and/or increase liabilities and/or equity...
- Q24. Asset misappropriations have an effect on the liabilities and do also have an indirect eff...
- Q25. __________ is required if and when officers, executives or other persons in trusted positi...
- Q26. Which of the following statements regarding financial statement disclosures is FALSE?...
- Q27. Which of the following is FALSE concerning methods corporate spies generally use to steal ...
- Q28. The most common method of detection in corruption cases is:...
- Q29. Which of the following is NOT the reason why senior management will overstate business sta...
- Q30. ____________ corrupt employees can cause inventory to be fraudulently delivered to themsel...
- Q31. ___________ and __________ are used to increase (or decrease) the equity account....
- Q32. Green was a salesperson whose job required frequent travel. When Green went on a trip with...
- Q33. One final means of concealing a register scheme, as with many kinds of fraud, is to destro...
- Q34. Employees with the authority to grant discounts in order to skim revenues may use which au...
- Q35. When expenses used to produce income- all of them- should be matched in a consistent manne...
- Q36. A travel agency offered to provide free travel and entertainment to Rosa, the purchasing a...
- Q37. Which of the following is a method for gaining unauthorized access to a computer system wh...
- Q38. Which of the following is true for Red flags associated with fictitious revenues?...
- Q39. ___________ allows the fraud examiner to inspect key attributes on a smaller portion (or s...
- Q40. Which of the following fraud schemes is MOST LIKELY to target a neighborhood of immigrants...
- Q41. According to the recommended methodology for responding to cybersecurity incidents, which ...
- Q42. One of the simplest ways to justify unacceptable conduct and avoid guilt feelings is to in...
- Q43. According to a survey, in principal perpetrator, males in a majority of cases, accounting ...
- Q44. Maintain the presence of a manager or supervisor near the area of the cash register as a d...
- Q45. Which of the following is NOT the type of billing scheme?...
- Q46. A scheme is classified as a Conflict of interest:...
- Q47. Which of the following are used in a short term skimming scheme?...
- Q48. According to Marshall, ______ are probable future economic benefits obtained or controlled...
- Q49. Entering a sales total lower than the amount actually paid by the customer is called:...
- Q50. According to Hollinger and Clark for Policy development, management must pay attention to:...
- Q51. Which of the following must be present for a fraud to exist?...
- Q52. Undisclosed payments made by vendors to employees of purchasing companies are referred to ...
- Q53. Which of the following search is used for unusually high incidence of returns and allowanc...
- Q54. If an analytical review reveals that a company's cost of goods sold has increased by a dis...
- Q55. Which of the following is not the skimming scheme?...
- Q56. Financial statement fraud is committed by:
- Q57. Which of the following statements describes a best practice for preventing contract and pr...
- Q58. When an employee processes a fictitious refund of goods, the victim company's inventory is...
- Q59. Which of the following is a reason why prepaid debit and gift card fraud schemes are attra...
- Q60. Delivery has not occurred or services have not been rendered when:...
- Q61. Bayan finds a residential property with an owner who lives far away. She forges the owner'...
- Q62. Which of the following actions could management take to make a company appear more profita...
- Q63. Collusion or bid-rigging between bidders is called...
- Q64. Which of the following is the MOST ACCURATE statement about the different types of malware...
- Q65. The prime targets for skimming schemes which are hard to monitor and predict such as late ...
- Q66. The person or persons who have access to __________ are often the targets of unethical ven...
- Q67. Which counts sometimes can give rise to inventory theft detection?...
- Q68. The scheme which reduces victim companies to issue fraudulent payments for goods or servic...
- Q69. Multiple cashiers operate from a single cash drawer without separate access codes is a red...
- Q70. The most basic skimming scheme occurs when:
- Q71. ___________ should be examined to see that all are properly documented and that inappropri...
- Q72. Which of the following measures is MOST LIKELY to prevent cash larceny schemes from occurr...
- Q73. Which of the following is NOT the aspect of inventory purchase?...
- Q74. Which of the following is an example of a technical security control that organizations ca...
- Q75. The fraudsters' interest lies with an employer other than a company....
- Q76. Which of the following scenarios is an example of upcoding?...
- Q77. If a construction developer submitted a draw request to a bank, which of the following wou...
- Q78. Bank cut-off statements should be requested for 10-15 days after the closing date of the b...
- Q79. A typical issue involving material and fraud would be:...
- Q80. __________ may be defined as the offering, giving, receiving or soliciting anything of val...
- Q81. A ___________ occurs when an employee, manager or executive has an undisclosed economic or...
- Q82. Neil, a Certified Fraud Examiner (CFE), discovers that a borrower used the same property a...
- Q83. Organizations can employ ___________ to provide protection for computing resources by incr...
- Q84. Perceived certainty of detection is directly related to employee theft for respondents in ...
- Q85. Every bribe is a two-sided transaction, in which where a vendor bribes a purchaser, there ...
- Q86. Larceny by Fraud or deception means that:
- Q87. Occupational fraud and abuse is a (an) __________ of doing business, in much the same way ...
- Q88. The more power a person has over the bidding process, the more likely the person can influ...
- Q89. Geoffrey, a homeowner, has decided to add a patio to the back of his house. Geoffrey hires...
- Q90. __________ inventory and other assets is relatively common way for fraudsters to remove as...
- Q91. Which of the following is NOT one of the information security goals that should be achieve...
- Q92. Organizations that had external audits actually had higher median losses and longer lastin...
- Q93. To keep the accounting equation in balance, which of the following actions will need to be...

[×]
Download PDF File
Enter your email address to download ACFE.CFE-Financial-Transactions-and-Fraud-Schemes.v2023-12-20.q93.pdf