New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free ACFE CFE-Financial-Transactions-and-Fraud-Schemes Practice Exam with Questions & Answers | Set: 6

Questions 51

Which of the following scenarios is an example of an economic extortion scheme?

Options:
A.

A purchasing employee and vendor agree to bill the company for services that were not provided.

B.

A government official demands money in exchange for awarding a contract to a vendor.

C.

An employee receives a payment for directing excess business to a vendor.

D.

A vendor rewards a purchasing employee with a free trip after the employee directs business to the vendor.

ACFE CFE-Financial-Transactions-and-Fraud-Schemes Premium Access
Questions 52

Which of the following is an insurance fraud detection tool used for identifying funds fraudulently sent to fictitious payees by using computer-generated reports to compare payments sent to the same location?

Options:
A.

Duplicate payment lists

B.

Address similarity reports

C.

Exception reports

D.

Electronic confirmations

Questions 53

The difference between assets and liabilities is called:

Options:
A.

Equity

B.

Expense

C.

Revenue

D.

Income statement

Questions 54

Which of the following is NOT the reason to bribe employees of the purchaser?

Options:
A.

To ensure receipt of a late bid

B.

To extend the bid opening date

C.

To ensure bid-splitting

D.

To falsify the bid log

Questions 55

Which of the following measures will MOST LIKELY prevent cash larceny schemes from occurring?

Options:
A.

Restricting other employees from performing the duties of an absent employee

B.

Assigning the duties of depositing cash receipts and performing bank reconciliations to different employees

C.

Having all employees use the same cash register for their transactions

D.

Keeping employees unaware that the company performs surprise cash counts

Questions 56

By removing a tangible asset from the business (a debit), the books will be ___________ by the exact amount of the tangible asset misappropriated.

Options:
A.

Journal Entries

B.

Out-of-balance

C.

False debits

D.

None of all

Questions 57

Which of the following scenarios BEST describes an electronic funds transfer (EFT) fraud scheme?

Options:
A.

An individual uses another person's personal identifying information to fill out a credit card application in their name and plans to make online purchases using the new card.

B.

A hacker obtains the account and password information of consumers and uses them to direct funds from their accounts.

C.

A restaurant server secretly scans a customer's credit card information into a small device for fraudulent use at a later time.

D.

An employee of a person-to-person (P2P) provider misrepresents the number of hours that they worked to increase the amount of money earned on their paycheck.

Questions 58

A fraudster uses a victim’s name, government identification number, and birthdate to impersonate the victim and open a credit card account in the victim’s name. This scheme can BEST be described as:

Options:
A.

New account identity theft

B.

Traditional identity theft

C.

Synthetic identity theft

D.

Criminal identity theft

Questions 59

Which of the following statements is MOST ACCURATE regarding financial reporting practices and accounting frameworks, such as U.S. generally accepted accounting principles (GAAP) and International Financial Reporting Standards (IFRS)?

Options:
A.

The financial reporting practices that a publicly traded company must follow are determined by the company's jurisdiction.

B.

All publicly traded companies are required to adopt either U.S. GAAP or IFRS as their accounting framework.

C.

Organizations that conduct business internationally must adopt IFRS as their accounting framework for financial reporting.

D.

U.S. GAAP is a principle-based accounting framework, and IFRS is a rules-based accounting framework.

Questions 60

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:

Options:
A.

Human intelligence

B.

Baiting

C.

Scavenging

D.

Open-source intelligence

ACFE Related Exams

How to pass ACFE CFE-Fraud-Prevention-and-Deterrence - Certified Fraud Examiner - Fraud Prevention and Deterrence Exam Exam
How to pass ACFE CFE-Investigation - Certified Fraud Examiner (CFE) - Investigation Exam
How to pass ACFE CFE-Law - Certified Fraud Examiner (CFE) - Law Exam
How to pass ACFE CFE - Certified Fraud Examiner Exam

ACFE Free Exams

ACFE Free Exams
Prepare effectively for ACFE certification exams with free study resources and practice tests from Examstrack.