Join the discussion
Question 1/101
Which of the following statements is MOST ACCURATE regarding the methods used for making corrupt payments in corruption schemes?
Correct Answer: C
Explanation/Reference: https://www.acfe.com/uploadedFiles/ACFE_Website/Content/review/cpf/03-Bribery-and-Corruption.pdf


Add Comments
- Other Question (101q)
- Q1. Which of the following statements is MOST ACCURATE regarding the methods used for making c...
- Q2. False billing scheme states that:
- Q3. Which of the following is NOT a distinguishing feature of a Ponzi scheme?...
- Q4. The most basic skimming scheme occurs when:
- Q5. Which of the four basic measures, if properly installed and implemented may help prevent i...
- Q6. Which of the following statements regarding financial statement disclosures is TRUE?...
- Q7. Which of the following is a method that a fraudster might use to conceal inventory shrinka...
- Q8. Undisclosed payments made by vendors to employees of purchasing companies are referred to ...
- Q9. Which of the following is NOT a method of identity theft prevention recommended for busine...
- Q10. Which of the following is NOT a common channel through which an organization's proprietary...
- Q11. The principal way to detect omitted credits from books of account is through:...
- Q12. Mario performs surgery on a patient to replace a bone. The surgery should be billed using ...
- Q13. Antonia, a Certified Fraud Examiner (CFE), discovers that a loan applicant misrepresented ...
- Q14. Which of the following is NOT a red flag of fraudulent register disbursements?...
- Q15. Which check tampering red flag may indicate employees have embezzled cash and charged the ...
- Q16. A process by which several bidders conspire to split contracts up and ensure that each get...
- Q17. Which of the following fraud schemes is MOST LIKELY to target members of a religious commu...
- Q18. Fraud in financial statements generally takes the form of _______ assets or revenue and __...
- Q19. When employee committing the fraud removes cash from the register and also the item allege...
- Q20. Which of the following statements is TRUE regarding income statements?...
- Q21. Entering a sales total lower than the amount actually paid by the customer is called:...
- Q22. Which of the following scenarios is an example of an economic extortion scheme?...
- Q23. Sergio receives a fraudulent text message that appears to be from his bank. The message cl...
- Q24. Forced reconciliation of the account says:
- Q25. Employees steal an incoming payment and then place the incoming funds in an interest beari...
- Q26. Which of the following is the MOST APPROPRIATE technique for detecting a cost mischarging ...
- Q27. Which of the following is a method of identity theft prevention that is recommended for in...
- Q28. Perceived certainty of detection is directly related to employee theft for respondents in ...
- Q29. According to the recommended methodology for responding to cybersecurity incidents, which ...
- Q30. An analytical review reveals that XYZ Company's cost of goods sold has increased by 75% in...
- Q31. Which of the following measures is MOST LIKELY to prevent cash larceny schemes from occurr...
- Q32. Which of the following can constitute a bribe, even if the illicit payment is never actual...
- Q33. Asset misappropriation schemes were the "middle children" of the study; they were more com...
- Q34. According to the recommended methodology for responding to cybersecurity incidents, which ...
- Q35. If an analytical review reveals that a company's cost of goods sold has increased by a dis...
- Q36. Which of the following is NOT a distinguishing characteristic of a Ponzi scheme?...
- Q37. Which of the following is the MOST APPROPRIATE technique for detecting a nonconforming goo...
- Q38. Black, an accounts receivable clerk, stole Customer A's monthly payment instead of posting...
- Q39. Ada uses her mother's government identification card to impersonate her mother and obtain ...
- Q40. __________ may be defined as the offering, giving, receiving or soliciting anything of val...
- Q41. Which of the following statements about skimming is CORRECT?...
- Q42. White used a company vehicle for unauthorized, personal purposes while working in a differ...
- Q43. Which of the following actions can make mobile payments more secure?...
- Q44. Jones is an accounts payable clerk at Smith Company. He intentionally sent the wrong vendo...
- Q45. Collusion or bid-rigging between bidders is called...
- Q46. A ___________ occurs when an employee, manager or executive has an undisclosed economic or...
- Q47. Verify supporting documentation on outstanding checks written for a material amount is a t...
- Q48. ___________ should be examined to see that all are properly documented and that inappropri...
- Q49. What type of fraud scheme would MOST LIKELY be revealed by comparing a company's personnel...
- Q50. Which of the following is TRUE regarding pyramid schemes?...
- Q51. Brenda was a cashier at a retail store. When Brenda's friend shopped at the store, she wou...
- Q52. Which of the following is NOT a measure that is commonly taken by fraudsters during accoun...
- Q53. Which of the following statements is TRUE with regard to the income statement?...
- Q54. Tram is a branch manager at a financial institution. She is responsible for putting severa...
- Q55. Which of the following is TRUE regarding accrual-basis accounting?...
- Q56. Blue borrowed her employer's snowplow for her own snow removal business, which she operate...
- Q57. Which of the following is one of the categories on the statement of cash flows?...
- Q58. Which of the following is a common red flag of procurement fraud schemes involving collusi...
- Q59. Which of the following situations MOST LIKELY constitutes health care fraud committed by a...
- Q60. Otto, a bank manager, purchases a new boat that he cannot afford. Knowing that one of the ...
- Q61. To detect fraud committed by a health care provider, a fraud examiner should look for whic...
- Q62. Which of the following is NOT the example of bribery prevention policies?...
- Q63. Which of the following is a method for gaining unauthorized access to a computer system wh...
- Q64. Which of the following scenarios is an example of an electronic extortion scheme?...
- Q65. Physical tampering prevention is a check tampering technique that is used to secure bankas...
- Q66. Which of the following statements is TRUE regarding the prevention of inventory theft?...
- Q67. Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurri...
- Q68. Which of the following is one of the sections on the statement of cash flows?...
- Q69. Which of the following is MOST ACCURATE concerning common methods that identity thieves us...
- Q70. _________ normally are carried on an organization's books as expenses because they tend to...
- Q71. Which of the following is a condition that facilitates insider cyberfraud?...
- Q72. Which of the following is the criterion for bid solicitation?...
- Q73. Which of the following statements is MOST ACCURATE regarding financial reporting practices...
- Q74. A fraudster creates a fictitious identity by combining a person's real government identifi...
- Q75. Linda, an assistant bank manager, purchases a new car that she cannot afford on her salary...
- Q76. Jonathan, a Certified Fraud Examiner (CFE), is tasked with identifying potential indicator...
- Q77. According to Hollinger and Clark for Policy development, management must pay attention to:...
- Q78. Skimming cases can more likely to be detected by:...
- Q79. The more power a person has over the bidding process, the more likely the person can influ...
- Q80. Which of the following would NOT be helpful in the prevention of expense reimbursement sch...
- Q81. Which of the following statements about competitive intelligence is CORRECT?...
- Q82. By removing a tangible asset from the business (a debit), the books will be ___________ by...
- Q83. Because sales skimming is an off-book fraud scheme, it is unlikely to be detected by recon...
- Q84. Which of the following is NOT the reason to bribe employees of the purchaser?...
- Q85. All of the following are basic methods used to prove corrupt payments in corruption scheme...
- Q86. Which of the following are used in a short term skimming scheme?...
- Q87. Which of the following statements is MOST ACCURATE regarding the methods used for making c...
- Q88. Which of the following is a recommended activity that organizations should engage in to pr...
- Q89. The behavior profile of employees who are involved in bribery schemes may include:...
- Q90. Which of the following statements is FALSE with regard to counterfeit credit and debit car...
- Q91. How many accounts are affected in fraudulent accounting entries and therefore same number ...
- Q92. Geoffrey, a homeowner, has decided to add a patio to the back of his house. Geoffrey hires...
- Q93. Theft of incoming checks usually occurs when ________ is (are) in charge of opening the ma...
- Q94. Neil, a Certified Fraud Examiner (CFE), discovers that a borrower used the same property a...
- Q95. Every bribe is a two-sided transaction, in which where a vendor bribes a purchaser, there ...
- Q96. Which of the following is a method that might be used to fraudulently overstate the accoun...
- Q97. A special scheme in which employees know their employer is seeking to purchase a certain a...
- Q98. ___________ allows the fraud examiner to inspect key attributes on a smaller portion (or s...
- Q99. Hamed works as an intelligence professional for Iriam intelligence, a competitive intellig...
- Q100. Which of the following is NOT a medium that commonly causes an organization's proprietary ...
- Q101. The difference between assets and liabilities is called:...

[×]
Download PDF File
Enter your email address to download ACFE.CFE-Financial-Transactions-and-Fraud-Schemes.v2025-09-15.q101.pdf