Exam Code : CFEX
Exam Name : Certified Fraud Examiner (CFEX)
Vendor Name :
"ACFE"
CFEX Dumps CFEX Braindumps
CFEX Real Questions CFEX Practice Test CFEX Actual Questions
killexams.com
Certified Fraud Examiner (CFEX)
https://killexams.com/pass4sure/exam-detail/CFEX
Bank statement are diligently reviewed to ensure that amounts and signature have not
been altered, is an activity for:
Account analysis
Bank reconciliation
Check disbursement controls
Check tampering
Physical tampering prevention is a check tampering technique that is used to secure bank-
assisted controls.
True
False
A technique by which checks are numbered using a new technique that is revealed by a
colored highlighter pen or by a bright light held behind the check is called:
Microline numbering
Holographic safety border
Embossed pearlescent numbering
None of the above
In physical tampering prevention technique, hidden images can be seen only when the
check is held at an angle through:
High-resolution sprays
Holographic safety inks
Watermark backers
Chrome coloring
When employee committing the fraud removes cash from the register and also the item allegedly being returned is debited back into the inventory, this refers to:
Registry destroying records
Register false voids
Fraudulent register occurrences
Concealing register disbursement
| |||
When employees avoid detection disbursement low, is referred to: | in a | refund scheme to keep the | sizes of the |
A. Small disbursements | |||
| |||
D. None of the above |
One final means of concealing a register scheme, as with many kinds of fraud, is to destroy all records of the transaction.
True
False
can be detected by closely examining the documentation submitted with the cash receipts.
Voided purchases
Fictitious refunds
Approved transaction
None of the above
Multiple cashiers operate from a single cash drawer without separate access codes is a red
flag for:
Fraudulent scheme
Disbursement scheme
Register scheme
Force inventory scheme
Maintain the presence of a manager or supervisor near the area of the cash register as a
deterrent to theft is a prevention for:
Fraudulent statement scheme
Asset misappropriation scheme
Larceny scheme
Register disbursement scheme
The scheme which reduces victim companies to issue fraudulent payments for goods or
services that they have not received is called:
Bogus claims
Billing scheme
Reliance billing
Misappropriate claims
The most common method for billing scheme is:
Register
Tips
Accident
Which of the following is NOT the type of billing scheme?
Invoicing via shell companies
Invoicing via non-accomplice companies
Invoicing via accomplice companies
Personal purchases with company funds
In scheme, an employee creates false vouchers or submits false invoices to the employer.
Sale requisition
Purchase requisition
Voucher handling
Cash generating
A voucher is:
a file that includes the purchase order that was send to the vendor, the vendor invoice listing the cost and quantity of items purchased , and the internal receiving reports that verify the purchased items have been delivered.
a figure that includes the sale order that was send to the dealer, the vendor invoice
listing the cost and quantity of items sold , and the internal receiving reports that verify the purchased items have been delivered.
a report that includes the purchase order that was send to the vendor, the vendor invoice listing the quality and quantity of items purchased , and the external receiving
reports that verify the items have been sold.
a mammogram that includes the purchase order that was send to the purchaser, the
purchaser invoice listing the benefits and quantity of items purchased , and the internal receiving reports that verify the purchased items have been sold.
A fabricated name and the post office box that an employee uses to collect disbursements
from false billings is called:
Accomplice residence
Shell company
Perpetrator check
Cash generator
One reason employees might be hesitant to use PO boxes in shell company schemes is
that some businesses are specially vary of sending checks to vendors that have street addresses only.
True
False
What is sometimes used to overcome well-designed internal controls of a victim company?
Shell company
Fraudulent invoices
Collusion
Rubber stamp supervisors
Most of the shell company schemes involve the purchase of goods rather than services.
True
False
A shell company scheme in which actual goods or services are sold to the victim company is known as:
Maintenance scheme
Allocation scheme
Distribution scheme
Pass-through scheme