New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CFE-Financial-Transactions-and-Fraud-Schemes Exam Dumps - Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam

Searching for workable clues to ace the ACFE CFE-Financial-Transactions-and-Fraud-Schemes Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CFE-Financial-Transactions-and-Fraud-Schemes PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 17

A special scheme in which employees know their employer is seeking to purchase a certain asset and take advantage of the situation by purchasing the asset themselves is:

A.

Conflict of interest in sale

B.

Turnaround sale or flip

C.

Unauthorized sale

D.

Written sale of unique assets

Full Access
Question # 18

Mario performs surgery on a patient to replace a bone. The surgery should be billed using one code, but Mario bills the surgery using three codes (one for the entire surgery, one for the removal of the bone, and another for the insertion of the artificial bone), which increases the cost. Which of the following BEST describes Mario's scheme?

A.

Fictitious services

B.

False diagnosis

C.

Upcoding

D.

Unbundling

Full Access
Question # 19

According to the recommended methodology for responding to cybersecurity incidents, which of the following activities should occur during the detection and analysis step?

A.

Limiting the damage caused by the attack

B.

Creating an incident response plan

C.

Restoring control of the systems that were affected

D.

Identifying all breaches that occurred

Full Access
Question # 20

Bob, a purchasing agent for Gallenkamp, directed a portion of Gallenkamp's business to Oak Company. In exchange for receiving additional business, Oak Company's sales manager agreed to pay Bob a percentage of the extra profits. Which of the following BEST describes the type of corruption scheme in which Bob engaged?

A.

Kickback scheme

B.

Illegal gratuity scheme

C.

Diversion scheme

D.

Economic extortion scheme

Full Access
Question # 21

When an employee processes a fictitious refund of goods, the amount of cash in the register does not balance with the register log.

A.

True

B.

False

Full Access
Question # 22

Which of the following is NOT a standard of generally accepted accounting principles (GAAP)?

A.

Conservatism

B.

Cost

C.

Full disclosure

D.

Quality control

Full Access
Question # 23

Which of the following is a reason why prepaid debit and gift card fraud schemes are appealing to fraudsters?

A.

Prepaid cards can be purchased with stolen credit cards and used to quickly convert illicit credit card funds into legitimate cash.

B.

Prepaid cards can only be purchased from financial institutions.

C.

Prepaid cards are often not accepted by online retailers and can only be used in transactions in which the cards must be physically present.

D.

All of the above are reasons why prepaid cards are appealing to fraudsters.

Full Access
Question # 24

Which of the following is a red flag that might indicate that someone is attempting to commit insurance fraud?

A.

A claim is made soon after an insurance policy commences.

B.

The insured made one other insurance claim within the past five years.

C.

A burglary loss claim includes small electronic items and jewelry.

D.

A theft claim includes items that were purchased recently and the receipts.

Full Access
Go to page: