CFEX Dumps CFEX Braindumps CFEX Real Questions CFEX Practice Test CFEX Actual Questions ACFE CFEX Certified Fraud Examiner (CFEX) https://killexams.com/pass4sure/exam-detail/CFEX QUESTION: 167 Bank statement are diligently reviewed to ensure that amounts and signature have not been altered, is an activity for: A. Account analysis B. Bank reconciliation C. Check disbursement controls D. Check tampering Answer: C QUESTION: 168 Physical tampering prevention is a check tampering technique that is used to secure bank- assisted controls. A. True B. False Answer: B QUESTION: 169 A technique by which checks are numbered using a new technique that is revealed by a colored highlighter pen or by a bright light held behind the check is called: A. Microline numbering B. Holographic safety border C. Embossed pearlescent numbering D. None of the above Answer: B QUESTION: 170 In physical tampering prevention technique, hidden images can be seen only when the check is held at an angle through: A. High-resolution sprays B. Holographic safety inks C. Watermark backers D. Chrome coloring Answer: C QUESTION: 171 When employee committing the fraud removes cash from the register and also the item allegedly being returned is debited back into the inventory, this refers to: A. Registry destroying records B. Register false voids C. Fraudulent register occurrences D. Concealing register disbursement Answer: D QUESTION: 172 When employees avoid detection in a refund scheme to keep the sizes of the disbursement low, is referred to: A. Small disbursements B. Very small disbursements C. Simple disbursements D. None of the above Answer: A QUESTION: 173 One final means of concealing a register scheme, as with many kinds of fraud, is to destroy all records of the transaction. A. True B. False Answer: A QUESTION: 174 ______________ can be detected by closely examining the documentation submitted with the cash receipts. A. Voided purchases B. Fictitious refunds C. Approved transaction D. None of the above Answer: B QUESTION: 175 Multiple cashiers operate from a single cash drawer without separate access codes is a red flag for: A. Fraudulent scheme B. Disbursement scheme C. Register scheme D. Force inventory scheme Answer: C QUESTION: 176 Maintain the presence of a manager or supervisor near the area of the cash register as a deterrent to theft is a prevention for: A. Fraudulent statement scheme B. Asset misappropriation scheme C. Larceny scheme D. Register disbursement scheme Answer: D QUESTION: 177 The scheme which reduces victim companies to issue fraudulent payments for goods or services that they have not received is called: A. Bogus claims B. Billing scheme C. Reliance billing D. Misappropriate claims Answer: A QUESTION: 178 The most common method for billing scheme is: A. Register B. Tips C. Accident D. None of the above Answer: B QUESTION: 179 Which of the following is NOT the type of billing scheme? A. Invoicing via shell companies B. Invoicing via non-accomplice companies C. Invoicing via accomplice companies D. Personal purchases with company funds Answer: C QUESTION: 180 In ___________ scheme, an employee creates false vouchers or submits false invoices to the employer. A. Sale requisition B. Purchase requisition C. Voucher handling D. Cash generating Answer: D QUESTION: 181 A voucher is: A. a file that includes the purchase order that was send to the vendor, the vendor invoice listing the cost and quantity of items purchased , and the internal receiving reports that verify the purchased items have been delivered. B. a figure that includes the sale order that was send to the dealer, the vendor invoice listing the cost and quantity of items sold , and the internal receiving reports that verify the purchased items have been delivered. C. a report that includes the purchase order that was send to the vendor, the vendor invoice listing the quality and quantity of items purchased , and the external receiving reports that verify the items have been sold. D. a mammogram that includes the purchase order that was send to the purchaser, the purchaser invoice listing the benefits and quantity of items purchased , and the internal receiving reports that verify the purchased items have been sold. Answer: A QUESTION: 182 A fabricated name and the post office box that an employee uses to collect disbursements from false billings is called: A. Accomplice residence B. Shell company C. Perpetrator check D. Cash generator Answer: B QUESTION: 183 One reason employees might be hesitant to use PO boxes in shell company schemes is that some businesses are specially vary of sending checks to vendors that have street addresses only. A. True B. False Answer: B QUESTION: 184 What is sometimes used to overcome well-designed internal controls of a victim company? A. Shell company B. Fraudulent invoices C. Collusion D. Rubber stamp supervisors Answer: C QUESTION: 185 Most of the shell company schemes involve the purchase of goods rather than services. A. True B. False Answer: B QUESTION: 186 A shell company scheme in which actual goods or services are sold to the victim company is known as: A. Maintenance scheme B. Allocation scheme C. Distribution scheme D. Pass-through scheme Answer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