New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFE-Financial-Transactions-and-Fraud-Schemes Exam Dumps - Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam

Searching for workable clues to ace the ACFE CFE-Financial-Transactions-and-Fraud-Schemes Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CFE-Financial-Transactions-and-Fraud-Schemes PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 9

Which of the following statements describes a best practice for preventing contract and procurement fraud?

A.

Companies should conduct background checks on all vendors before they are added to the vendor master file.

B.

Companies should have vendor-monitoring procedures that address the red flags of all vendor schemes.

C.

Companies should permit the person who maintains the vendor master file to also have authority to approve payments for invoices.

D.

Companies should restrict the monitoring of their procurement activities to once a year to ensure comparability from year to year.

Full Access
Question # 10

Which of the following is a condition that facilitates insider cyberfraud?

A.

Access logs are not reviewed by management.

B.

Production programs are run during the business day.

C.

Access privileges are restricted to assigned job functions.

D.

Separation of duties exists in the data center.

Full Access
Question # 11

Which of the following is an example of a technical security control that organizations can use to secure computer systems and communication networks?

A.

Application security

B.

Human audits

C.

Penetration testing

D.

Data security

Full Access
Question # 12

White used a company vehicle for unauthorized, personal purposes while working in a different city. He provided false written and oral information regarding the use of the vehicle. The vehicle was returned without damages. What type of fraud did White commit?

A.

White did not commit fraud

B.

An expense reimbursement scheme

C.

A misuse of a noncash asset

D.

A financial statement fraud scheme

Full Access
Question # 13

When an incorrect total is carried from the journal to the ledger or from the ledger to the financial statements, this method is called:

A.

Forced Balance

B.

Out-of-balance

C.

False balance

D.

None of all

Full Access
Question # 14

Which of the following statements about skimming is CORRECT?

A.

Skimming schemes involve the theft of cash sales but not accounts receivable payments.

B.

Skimming schemes involve stolen customer payments that were not recorded.

C.

Skimming schemes are considered on-book frauds because they leave an audit trail.

D.

Skimming schemes are generally less difficult to detect than cash larceny schemes.

Full Access
Question # 15

Statistical sampling enables the examiner to predict the occurrence rate for the population and therefore determine with some accuracy the error rate, or the potential for fraud.

A.

True

B.

False

Full Access
Question # 16

What type of fraud scheme would MOST LIKELY be revealed by comparing a company's personnel records with its payroll records to identify duplicate addresses and government identification numbers?

A.

A fraudulent commissions scheme

B.

A falsified hours and salary scheme

C.

An expense reimbursement scheme

D.

A ghost employee scheme

Full Access
Go to page: