CFE-Financial-Transactions-and-Fraud-Schemes 無料問題集「ACFE Certified Fraud Examiner - Financial Transactions and Fraud Schemes」

____________ is a process by which a bookkeeper records all transactions and can adjust the books.

Which of the following is a common red flag of a bid tailoring scheme?

"Anticipate possible losses and omit potential profits", this results in:

Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?

Which of the following is a method that a fraudster might use to conceal inventory shrinkage?

Cynthia receives a fraudulent text message that appears to be from her credit card company. The message claims that the company has detected suspicious card transactions and provides a link for her to click to sign into her account for more information. Cynthia is MOST LIKELY being targeted by which of the following types of social engineering schemes?

Which of the following is NOT a distinguishing characteristic of a Ponzi scheme?

Hannah is a manager at a financial institution. To safeguard the bank and its customers from electronic funds transfer (EFT) fraud, Hannah is implementing several preventive measures. Which of the following is NOT a measure Hannah should take to prevent EFT fraud?

Which of the following would be MOST INDICATIVE of loan fraud in a draw request submitted by a construction developer?

Black, an accounts receivable clerk, stole Customer A's monthly payment instead of posting it to A's account.
When Customer B's payment arrives a few days later, Black applies the payment to Customer A's account.
When Customer C's payment arrives a few days after that, Black applies it to Customer B's account. Black's method of crediting one account with money taken from another account is known as:

When an incorrect total is carried from the journal to the ledger or from ledger to the financial statements, this method is called:

Which of the following would be helpful in detecting a cash larceny scheme?

Which of the following is a common way that dishonest contractors collude to evade the competitive bidding process?

Which of the following is NOT a measure that is commonly taken by fraudsters during account takeover schemes?

Which of the following is an insurance fraud detection tool used for identifying funds fraudulently sent to fictitious payees by using computer-generated reports to compare payments sent to the same location?

Which of the following is a condition that facilitates insider cyberfraud?

Which of the following items do NOT appear on the balance sheet?

Inventory shrinkage is the unaccounted-for reduction in the company's inventory that does not results from theft.

Which of the following statements is TRUE regarding income statements?

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡