DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ACFE
  3. Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam
  4. ACFE.CFE-Financial-Transactions-and-Fraud-Schemes.v2025-09-15.q101
  5. Question 1

Join the discussion

Question 1/101

Which of the following statements is MOST ACCURATE regarding the methods used for making corrupt payments in corruption schemes?

Correct Answer: C
Explanation/Reference: https://www.acfe.com/uploadedFiles/ACFE_Website/Content/review/cpf/03-Bribery-and-Corruption.pdf

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (101q)
Q1. Which of the following statements is MOST ACCURATE regarding the methods used for making c...
Q2. False billing scheme states that:
Q3. Which of the following is NOT a distinguishing feature of a Ponzi scheme?...
Q4. The most basic skimming scheme occurs when:
Q5. Which of the four basic measures, if properly installed and implemented may help prevent i...
Q6. Which of the following statements regarding financial statement disclosures is TRUE?...
Q7. Which of the following is a method that a fraudster might use to conceal inventory shrinka...
Q8. Undisclosed payments made by vendors to employees of purchasing companies are referred to ...
Q9. Which of the following is NOT a method of identity theft prevention recommended for busine...
Q10. Which of the following is NOT a common channel through which an organization's proprietary...
Q11. The principal way to detect omitted credits from books of account is through:...
Q12. Mario performs surgery on a patient to replace a bone. The surgery should be billed using ...
Q13. Antonia, a Certified Fraud Examiner (CFE), discovers that a loan applicant misrepresented ...
Q14. Which of the following is NOT a red flag of fraudulent register disbursements?...
Q15. Which check tampering red flag may indicate employees have embezzled cash and charged the ...
Q16. A process by which several bidders conspire to split contracts up and ensure that each get...
Q17. Which of the following fraud schemes is MOST LIKELY to target members of a religious commu...
Q18. Fraud in financial statements generally takes the form of _______ assets or revenue and __...
Q19. When employee committing the fraud removes cash from the register and also the item allege...
Q20. Which of the following statements is TRUE regarding income statements?...
Q21. Entering a sales total lower than the amount actually paid by the customer is called:...
Q22. Which of the following scenarios is an example of an economic extortion scheme?...
Q23. Sergio receives a fraudulent text message that appears to be from his bank. The message cl...
Q24. Forced reconciliation of the account says:
Q25. Employees steal an incoming payment and then place the incoming funds in an interest beari...
Q26. Which of the following is the MOST APPROPRIATE technique for detecting a cost mischarging ...
Q27. Which of the following is a method of identity theft prevention that is recommended for in...
Q28. Perceived certainty of detection is directly related to employee theft for respondents in ...
Q29. According to the recommended methodology for responding to cybersecurity incidents, which ...
Q30. An analytical review reveals that XYZ Company's cost of goods sold has increased by 75% in...
Q31. Which of the following measures is MOST LIKELY to prevent cash larceny schemes from occurr...
Q32. Which of the following can constitute a bribe, even if the illicit payment is never actual...
Q33. Asset misappropriation schemes were the "middle children" of the study; they were more com...
Q34. According to the recommended methodology for responding to cybersecurity incidents, which ...
Q35. If an analytical review reveals that a company's cost of goods sold has increased by a dis...
Q36. Which of the following is NOT a distinguishing characteristic of a Ponzi scheme?...
Q37. Which of the following is the MOST APPROPRIATE technique for detecting a nonconforming goo...
Q38. Black, an accounts receivable clerk, stole Customer A's monthly payment instead of posting...
Q39. Ada uses her mother's government identification card to impersonate her mother and obtain ...
Q40. __________ may be defined as the offering, giving, receiving or soliciting anything of val...
Q41. Which of the following statements about skimming is CORRECT?...
Q42. White used a company vehicle for unauthorized, personal purposes while working in a differ...
Q43. Which of the following actions can make mobile payments more secure?...
Q44. Jones is an accounts payable clerk at Smith Company. He intentionally sent the wrong vendo...
Q45. Collusion or bid-rigging between bidders is called...
Q46. A ___________ occurs when an employee, manager or executive has an undisclosed economic or...
Q47. Verify supporting documentation on outstanding checks written for a material amount is a t...
Q48. ___________ should be examined to see that all are properly documented and that inappropri...
Q49. What type of fraud scheme would MOST LIKELY be revealed by comparing a company's personnel...
Q50. Which of the following is TRUE regarding pyramid schemes?...
Q51. Brenda was a cashier at a retail store. When Brenda's friend shopped at the store, she wou...
Q52. Which of the following is NOT a measure that is commonly taken by fraudsters during accoun...
Q53. Which of the following statements is TRUE with regard to the income statement?...
Q54. Tram is a branch manager at a financial institution. She is responsible for putting severa...
Q55. Which of the following is TRUE regarding accrual-basis accounting?...
Q56. Blue borrowed her employer's snowplow for her own snow removal business, which she operate...
Q57. Which of the following is one of the categories on the statement of cash flows?...
Q58. Which of the following is a common red flag of procurement fraud schemes involving collusi...
Q59. Which of the following situations MOST LIKELY constitutes health care fraud committed by a...
Q60. Otto, a bank manager, purchases a new boat that he cannot afford. Knowing that one of the ...
Q61. To detect fraud committed by a health care provider, a fraud examiner should look for whic...
Q62. Which of the following is NOT the example of bribery prevention policies?...
Q63. Which of the following is a method for gaining unauthorized access to a computer system wh...
Q64. Which of the following scenarios is an example of an electronic extortion scheme?...
Q65. Physical tampering prevention is a check tampering technique that is used to secure bankas...
Q66. Which of the following statements is TRUE regarding the prevention of inventory theft?...
Q67. Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurri...
Q68. Which of the following is one of the sections on the statement of cash flows?...
Q69. Which of the following is MOST ACCURATE concerning common methods that identity thieves us...
Q70. _________ normally are carried on an organization's books as expenses because they tend to...
Q71. Which of the following is a condition that facilitates insider cyberfraud?...
Q72. Which of the following is the criterion for bid solicitation?...
Q73. Which of the following statements is MOST ACCURATE regarding financial reporting practices...
Q74. A fraudster creates a fictitious identity by combining a person's real government identifi...
Q75. Linda, an assistant bank manager, purchases a new car that she cannot afford on her salary...
Q76. Jonathan, a Certified Fraud Examiner (CFE), is tasked with identifying potential indicator...
Q77. According to Hollinger and Clark for Policy development, management must pay attention to:...
Q78. Skimming cases can more likely to be detected by:...
Q79. The more power a person has over the bidding process, the more likely the person can influ...
Q80. Which of the following would NOT be helpful in the prevention of expense reimbursement sch...
Q81. Which of the following statements about competitive intelligence is CORRECT?...
Q82. By removing a tangible asset from the business (a debit), the books will be ___________ by...
Q83. Because sales skimming is an off-book fraud scheme, it is unlikely to be detected by recon...
Q84. Which of the following is NOT the reason to bribe employees of the purchaser?...
Q85. All of the following are basic methods used to prove corrupt payments in corruption scheme...
Q86. Which of the following are used in a short term skimming scheme?...
Q87. Which of the following statements is MOST ACCURATE regarding the methods used for making c...
Q88. Which of the following is a recommended activity that organizations should engage in to pr...
Q89. The behavior profile of employees who are involved in bribery schemes may include:...
Q90. Which of the following statements is FALSE with regard to counterfeit credit and debit car...
Q91. How many accounts are affected in fraudulent accounting entries and therefore same number ...
Q92. Geoffrey, a homeowner, has decided to add a patio to the back of his house. Geoffrey hires...
Q93. Theft of incoming checks usually occurs when ________ is (are) in charge of opening the ma...
Q94. Neil, a Certified Fraud Examiner (CFE), discovers that a borrower used the same property a...
Q95. Every bribe is a two-sided transaction, in which where a vendor bribes a purchaser, there ...
Q96. Which of the following is a method that might be used to fraudulently overstate the accoun...
Q97. A special scheme in which employees know their employer is seeking to purchase a certain a...
Q98. ___________ allows the fraud examiner to inspect key attributes on a smaller portion (or s...
Q99. Hamed works as an intelligence professional for Iriam intelligence, a competitive intellig...
Q100. Which of the following is NOT a medium that commonly causes an organization's proprietary ...
Q101. The difference between assets and liabilities is called:...
[×]

Download PDF File

Enter your email address to download ACFE.CFE-Financial-Transactions-and-Fraud-Schemes.v2025-09-15.q101.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.