This page was exported from Free valid test braindumps [ http://free.validbraindumps.com ] Export date:Sat Apr 5 1:36:01 2025 / +0000 GMT ___________________________________________________ Title: [Q17-Q34] Pass ACFE Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Exam in First Attempt Guaranteed Updated Dump from ValidBraindumps! --------------------------------------------------- Pass ACFE Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Exam in First Attempt Guaranteed Updated Dump from ValidBraindumps! Pass CFE-Financial-Transactions-and-Fraud-Schemes Exam with 100 Questions - Verified By ValidBraindumps ACFE CFE-Financial-Transactions-and-Fraud-Schemes Exam Syllabus Topics: TopicDetailsTopic 1Demonstrate knowledge of criminal and civil law, rules of evidence, rights of the accused and accuser, and expert witness mattersTopic 2Demonstrate knowledge of Fraud Prevention and DeterrenceTopic 3Demonstrate knowledge of interviewing, taking statements, obtaining information from public recordsTopic 4Tests your comprehension of the types of fraudulent financial transactions incurred in accounting recordsTopic 5Demonstrate knowledge of fraud risk assessment, and the ACFE Code of Professional Ethics.Topic 6Ensures the familiarity with the many legal ramifications of conducting fraud examinationsTopic 7Tests your understanding of why people commit fraud and ways to prevent itTopic 8Financial Transactions & Fraud Schemes Demonstrate knowledge of the basic accounting and auditing theoryTopic 9Demonstrate knowledge of the fraud schemes, internal controls to deter fraud and other auditing and accounting mattersTopic 10Demonstrate knowledge of tracing illicit transactions, evaluating deception and report writing   NO.17 A fabricated name and the post office box that an employee uses to collect disbursements from false billings is called:  Accomplice residence  Shell company  Perpetrator check  Cash generator NO.18 Which of the following is an insurance fraud detection tool that uses computer-generated reports to compare payments going to the same location and identify funds fraudulently sent to brokers?  Payroll reports  Address similarity reports  Electronic confirmations  Vendor master lists NO.19 Sinead has lost her job and can no longer afford the luxury car that she recently purchased. Instead of allowing her car to be repossessed by her bank, Sinead decides to leave her car in a high-crime area with the keys in the ignition, hoping that it will be stolen so that she can make an insurance claim for the loss. Sinead is planning to commit which of the following insurance scams?  Staged accident  Past posting  Phantom vehicle  Ditching Explanation/Reference: https://www.acfe.com/uploadedfiles/acfe_website/content/documents/insurance-fraud-handbook.pdf (15)NO.20 Which counts sometimes can give rise to inventory theft detection?  Perpetual inventory counts  Physical inventory counts  Concealment inventory counts  None of the above NO.21 ___________ should be examined to see that all are properly documented and that inappropriate payments have not been made to employees.  Payable cash  Cash advances  counterfeit checks  Payable checks NO.22 Which of the following is NOT the phase of the bidding process?  Presolicitation  Postsolicitation  Solicitation  Submission NO.23 Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail and recording the receipt of payments.  Single employee  Two employees  More then two employees  None of the above NO.24 Statistical sampling enables the examiner to predict the occurrence rate for the population and therefore determine with some accuracy the error rate, or the potential for fraud.  True  False NO.25 Green was a salesperson whose job required frequent travel. When Green went on a trip with her family that was not business related, she saved the receipts from her flight, hotel, and restaurant expenses. She turned in these receipts to her manager along with an expense report that described the expenses as business related.Green’s company reimbursed her for the expenses. This is an example of what type of expense reimbursement scheme?  A mischaracterized expense scheme  An overstated expense scheme  A multiple reimbursement scheme  A fictitious expense scheme Explanation/Reference: https://www.bakertilly.com/insights/expense-reimbursement-schemesNO.26 Larceny by Fraud or deception means that:  Creates or reinforce a false impression  Fails to correct a false impression  Fails to disclose a known lien, adverse claim or other legal impediment  All of the above NO.27 The prime targets for skimming schemes which are hard to monitor and predict such as late fees and parking fees, are:  Revenue sources  Recorded sales  Internal audits  Register manipulations NO.28 ______________ can be detected by closely examining the documentation submitted with the cash receipts.  Voided purchases  Fictitious refunds  Approved transaction  None of the above NO.29 Once the expense account is closed, it becomes a historical item and probably will never be reviewed again.  True  False NO.30 Which of the following is a recommended method for safeguarding an organization’s proprietary information?  Classifying data into categories according to value and sensitivity levels  Changing locks and reprogramming door access codes every three to five years  Mandating that all employees sign noncompetition agreements  Requiring employees to take notes and keep drafts related to confidential projects NO.31 A fraudster poses as the head of one of XYZ Company’s foreign suppliers and sends an email to an XYZ employee requesting that this month’s payments be made to an alternate account that the fraudster owns. This is an example of which of the following types of fraud schemes?  Electronic piggybacking  Reverse social engineering  Executive email attack  Business email compromise Explanation/Reference: https://whatis.techtarget.com/definition/piggybackingNO.32 The essential elements of a ________ are an actual or constructive taking away of the goods or property of another with the without the consent and against the will of the owner and with a felonious intent.  Larceny  Abuse  Fiduciary  None of the above NO.33 In ___________ scheme, an employee creates false vouchers or submits false invoices to the employer.  Sale requisition  Purchase requisition  Voucher handling  Cash generating NO.34 Natalie, a Certified Fraud Examiner (CFE), is tasked with overseeing cybersecurity protocols for her employer, including identifying potential indicators of intrusion, or unauthorized access, to the organization’s computer network. Which of the following could potentially indicate that the organization’s network has been accessed or compromised?  Updates to the operating systems of computers on the network are automatically installed to patch vulnerabilities.  Users are being denied access to network files they do not typically use in the normal course of business.  When logging into the computer network, employees are reminded to change their log-in passwords before they expire.  The network is transmitting much more data than usual to recipients outside the country in which the organization is located.  Loading … Penetration testers simulate CFE-Financial-Transactions-and-Fraud-Schemes exam: https://www.validbraindumps.com/CFE-Financial-Transactions-and-Fraud-Schemes-exam-prep.html --------------------------------------------------- Images: https://free.validbraindumps.com/wp-content/plugins/watu/loading.gif https://free.validbraindumps.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-02-15 14:40:15 Post date GMT: 2023-02-15 14:40:15 Post modified date: 2023-02-15 14:40:15 Post modified date GMT: 2023-02-15 14:40:15