ACFE CFEX. Certified Fraud Examiner (CFEX)

Similar documents
FRAUD AWARENESS & PREVENTION

Asset Misappropriation. Peter N. Munachewa, CICA, CFIP, CFE

Types of Fraud, Detection and Mitigation Presentation by: Isaac Mutembei Murugu CIA, CISA 23 rd November Uphold public interest

Financial Transactions and Fraud Schemes

1/3/2013. Months. Other $75,000. Government $81,000. Non-Profit $100,000. Dollars. Public Company $127,000. Private Company $200,000

Chapter 2 Skimming 1

FRAUD: A Web Of Deceit

Chapter 2 Skimming. 2. To a fraudster, the principle advantage of skimming is the difficulty with which the scheme is detected. a. True b.

MMAAA Annual Meeting. Conducting an Investigative Audit June 13, Presented by: John J. Sullivan, CFE Melanson Heath

Table 1: Historical Summary of Revenue Lost to Fraud. Estimate of Revenue Lost to Fraud

OAPT June 9, Deterring Fraud and the Latest Fraud Schemes in Public Entities TAKE AWAY #1

Financial CFE. Certified Financial iner (CFE) Download Full Version :

Fraud prevention for credit unions

INTERNAL FRAUD PREVENTION:

Financial Statement Fraud

11/9/15. Fraud in Non-profit Organizations: What You Need to Know NOW!

Reduce Your Risk: Understanding Internal Controls and Fraud Risks and Prevention

Chapter 06 - Cash and Internal Controls. Chapter Outline

Ball State University

FRAUD TRENDS TO WATCH FOR IN Presented by: Daniel J. Mahalak

Fraud Prevention & Detection. Eric Conforti, CPA, CFE April 17, 2018

What do they investigate

OCCUPATIONAL FRAUD 9/20/2018

EXERCISES. The complete AICPA summary of Section 404 of Sarbanes-Oxley is as follows: Section 404: Management Assessment of Internal Controls.

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2016 SOUTHERN ASIA EDITION

Fraud Prevention and Detection. Lisa dewit, Sr Project Manager (3-5631) Formation Review 20 Oct 17 Prepared for: IIA Annual Fraud Seminar

Finacial Statement Fraud. Peter N Munachewa, CFE Risk Management Consultant

HOW TO SPOT AND MITIGATE FRAUDULENT ACTIVITIES

Fraud & Forensic Accounting Update for CPAs

2. COVERAGE REQUESTED DESIRED COVERAGE: (PLEASE CHECK THE COVERAGE REQUESTED) LIMITS REQUESTED Employee Theft Forgery or Alteration Theft Inside Premi

Analyzing a Potpourri of Fraud in Higher Education. Calvin Wendelboe, CPA, CIA, CFE

Mitigating Fraud. June 22, Sept. 21, 2014

Fraud Prevention for Nonprofits

(No., Street) Present Crime Insurance Program: (Include primary AND excess, if applicable) If not applicable, please check here:

Identity Theft Prevention Program

OVERVIEW: Establish Petty Cash or Imprest Funds. Turnover Rate and Increasing or Decreasing Funds

FRAUD EXAMINERS MANUAL INTERNATIONAL EDITION

Fill-in-the-Blank Equations. Exercises

Fraud: How to Get Your District Free Publicity

Office of Budget and Finance. Cash Accountability Policy

Fraud in Government. Mike Nolan, CPA, CFE, CGMA. CCACC & CCA&RMC Conference Monterey, CA September 2014

Describe Fraud in the Context of Financial

Chapter 6. Accounting For Cash and Internal Controls

protect fraudulent against transactions your business Introduction What is a fraudulent transaction? Merchant Responsibilities Card Present

minimise card fraud in your business.

Managing Reputational Risk for Nonprofit Organizations. Best Practices for Fraud Prevention. July 14, Christopher W. Truman, CPA, Manager

Delivering Confidence PAGE 1

Agency: Bus Area: Fiscal Year

Lecture Notes for How to Steal $500 Million

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE GLObAL FrAUD STUDy

Fraud Red Flags for Life Insurance

Handling Cash. A guide for campus departments

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2016 GLOBAL FRAUD STUDY

Town of Cohasset FRAUD RISK POLICY Adopted by Board of Selectmen:

PREVENTING FRAUD IN THE HOSPITALITY INDUSTRY

FRAUD EXAMINERS MANUAL (INTERNATIONAL EDITION)

Microsoft MB Great Plains 8.0 Financials.

University of Colorado Denver

Presented by: Michael Moreau, CFE, CIA, CFSA Manager, Credit Union Group Macpage LLC

The State of the Art of Fraud. Glenn L. Helms, Ph.D., CPA, CIA, CITP, CISA, CFF

Movable and Sensitive Minor Equipment

Accounting Records: How They Are Used To Conceal Fraud

Its Not About If, Its About When! Learning how to protect your organization.

REPORT TO THE NATIONS 2018 GLOBAL STUDY ON OCCUPATIONAL FRAUD AND ABUSE

The Risk of Economic Crime

Red Flag Rule Procedures Under Princeton University s Identity Theft Prevention Program Effective: December 31, 2010

APPLICATION FOR FINANCIAL INSTITUTION BOND FOR INVESTMENT FIRMS NON-CUSTODIAL INVESTMENT ADVISORS (FIRST PARTY)

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Fraud Awareness & Prevention for Higher Education. Neil Cohen Deputy Director Audit, Oversight & Investigations

Auditing and Assurance Services, 15e

A c f e. Report to. the Nation. on Occupational Fraud & Abuse

Chapter Five: Student Services and Operations AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

REPORT TO THE NATIONS 2018 GLOBAL STUDY ON OCCUPATIONAL FRAUD AND ABUSE

Fraud in the Government Realm. Introduction. What is Fraud? My career began with a local government fraud in 1993

Peralta Community College District AP 6300

DODDRIDGE COUNTY SCHOOLS MANUAL OF FINANCIAL RECORDS FOR INDIVIDUAL SCHOOLS

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

FRAUD EXAMINERS MANUAL

FISCAL MANAGEMENT (Replaces current SBCCD AP 6300)

SOLUTIONS. Learning Goal 25

Cash Accountability Policy

Detecting and Deterring Real Property Fraud

Lecture notes for: Corporate Cons

Financial Transaction

Office of the Bursar 7/11/2018 1

Identity Theft Prevention Program. Approved by the Board of Trustees on February 20, 2009

FRAUD A MULTIFACETED PHENOMENON TYPES OF FRAUD PREVENTION AND PROTECTION

Chapter 10. Cash and Financial Investments. McGraw-Hill/Irwin. Copyright 2012 by The McGraw-Hill Companies, Inc. All rights reserved.

COVERAGE FRAUD IN EMPLOYEE BENEFIT PLANS 5/15/2014. Where employee benefit fraud is likely. Internal controls that help prevent fraud

CASH HANDLING POLICIES

Module 9 : Invoicing/Petty cash

Internal Controls: Best Practices

AP 5800 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

3/11/2016. Student Activity Funds. Basic Facts about Student Activity Funds

Figure 1: Occupational Frauds by Category Frequency

PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Fraud Risk Assessment Awareness in Employee Benefit Plans

Prevention of Identity Theft in Student Financial Transactions

LOUISIANA COMMUNITY & TECHNICAL COLLEGE SYSTEM Policy # Title: IDENTITY THEFT PREVENTION PROGRAM

Weber State University. Cash Handling Training

Transcription:

ACFE CFEX Certified Fraud Examiner (CFEX) http://killexams.com/exam-detail/cfex

QUESTION: 167 Bank statement are diligently reviewed to ensure that amounts and signature have not been altered, is an activity for: A. Account analysis B. Bank reconciliation C. Check disbursement controls D. Check tampering QUESTION: 168 Physical tampering prevention is a check tampering technique that is used to secure bankassisted controls. A. True B. False QUESTION: 169 A technique by which checks are numbered using a new technique that is revealed by a colored highlighter pen or by a bright light held behind the check is called: A. Microline numbering B. Holographic safety border C. Embossed pearlescent numbering D. None of the above QUESTION: 170 In physical tampering prevention technique, hidden images can be seen only when the check is held at an angle through: A. High-resolution sprays B. Holographic safety inks C. Watermark backers D. Chrome coloring

QUESTION: 171 When employee committing the fraud removes cash from the register and also the item allegedly being returned is debited back into the inventory, this refers to: A. Registry destroying records B. Register false voids C. Fraudulent register occurrences D. Concealing register disbursement Answer: D QUESTION: 172 When employees avoid detection in a refund scheme to keep the sizes of the disbursement low, is referred to: A. Small disbursements B. Very small disbursements C. Simple disbursements D. None of the above Answer: A QUESTION: 173 One final means of concealing a register scheme, as with many kinds of fraud, is to destroy all records of the transaction. A. True B. False Answer: A QUESTION: 174 can be detected by closely examining the documentation submitted with the cash receipts. A. Voided purchases B. Fictitious refunds C. Approved transaction D. None of the above

QUESTION: 175 Multiple cashiers operate from a single cash drawer without separate access codes is a red flag for: A. Fraudulent scheme B. Disbursement scheme C. Register scheme D. Force inventory scheme QUESTION: 176 Maintain the presence of a manager or supervisor near the area of the cash register as a deterrent to theft is a prevention for: A. Fraudulent statement scheme B. Asset misappropriation scheme C. Larceny scheme D. Register disbursement scheme Answer: D QUESTION: 177 The scheme which reduces victim companies to issue fraudulent payments for goods or services that they have not received is called: A. Bogus claims B. Billing scheme C. Reliance billing D. Misappropriate claims Answer: A QUESTION: 178 The most common method for billing scheme is: A. Register B. Tips C. Accident

D. None of the above QUESTION: 179 Which of the following is NOT the type of billing scheme? A. Invoicing via shell companies B. Invoicing via non-accomplice companies C. Invoicing via accomplice companies D. Personal purchases with company funds QUESTION: 180 In scheme, an employee creates false vouchers or submits false invoices to the employer. A. Sale requisition B. Purchase requisition C. Voucher handling D. Cash generating Answer: D QUESTION: 181 A voucher is: A. a file that includes the purchase order that was send to the vendor, the vendor invoice listing the cost and quantity of items purchased, and the internal receiving reports that verify the purchased items have been delivered. B. a figure that includes the sale order that was send to the dealer, the vendor invoice listing the cost and quantity of items sold, and the internal receiving reports that verify the purchased items have been delivered. C. a report that includes the purchase order that was send to the vendor, the vendor invoice listing the quality and quantity of items purchased, and the external receiving reports that verify the items have been sold. D. a mammogram that includes the purchase order that was send to the purchaser, the purchaser invoice listing the benefits and quantity of items purchased, and the internal receiving reports that verify the purchased items have been sold.

Answer: A QUESTION: 182 A fabricated name and the post office box that an employee uses to collect disbursements from false billings is called: A. Accomplice residence B. Shell company C. Perpetrator check D. Cash generator QUESTION: 183 One reason employees might be hesitant to use PO boxes in shell company schemes is that some businesses are specially vary of sending checks to vendors that have street addresses only. A. True B. False QUESTION: 184 What is sometimes used to overcome well-designed internal controls of a victim company? A. Shell company B. Fraudulent invoices C. Collusion D. Rubber stamp supervisors QUESTION: 185 Most of the shell company schemes involve the purchase of goods rather than services. A. True B. False

QUESTION: 186 A shell company scheme in which actual goods or services are sold to the victim company is known as: A. Maintenance scheme B. Allocation scheme C. Distribution scheme D. Pass-through scheme Answer: D

For More exams visit https://killexams.com/vendors-exam-list Kill your exam at First Attempt...Guaranteed!