Financial Accounting > QUESTIONS & ANSWERS > Foothill College - ACTG 59All Chapter Quizzes. 100 Questions Aswers. Most comprehensive Content for  (All)

Foothill College - ACTG 59All Chapter Quizzes. 100 Questions Aswers. Most comprehensive Content for the course.

Document Content and Description Below

Chapter 01 Quiz Total Grade: 30 (of possible 30 points) Question 1 of 25 Score: 1.2 (of possible 1.2 points) Predication, although important, is not required in a fraud examination. True False ... Question 2 of 25 Score: 1.2 (of possible 1.2 points) In a study by Steve Albrecht, Marshall Romney, and Keith Howe, participants were asked to rank characteristics of the organizational environment that contributed to fraud. The highest ranked factor was: A. Lack of clear lines of authority B. Inadequate attention to detail C. Lack of an internal audit function D. Placing too much trust in key employees Question 3 of 25 Score: 1.2 (of possible 1.2 points) In a fraud examination, evidence is usually gathered in a manner that moves from general to specific. True False Question 4 of 25 Score: 1.2 (of possible 1.2 points) Which of the following is not one of the legs of the Fraud Triangle? A. Situational environment B. Perceived non-sharable financial need C. Perceived opportunity D. Rationalization Question 5 of 25 Score: 1.2 (of possible 1.2 points) Alice Durant works in the accounts payable department for the BC Group. She recently found out that Della Granger, another A/P clerk, received a bigger raise than she did, even though Durant has been with the company longer and frequently has to correct Granger’s errors. Which leg of the Fraud Triangle best applies to Durant’s situation? A. Motive B. Perceived opportunity C. Rationalization D. Non-sharable financial need Question 6 of 25 Score: 1.2 (of possible 1.2 points) When Jill Michaels, an assistant to the director of procurement, moved into her new home, she used the company’s flat bed truck to move her furnishings on an afternoon when her boss was out of town. Which of the following best describes Michael’s act? A. Fraud B. Abuse C. Embezzlement D. Larceny Answer Key: B Question 7 of 25 Score: 1.2 (of possible 1.2 points) Which of the following is the correct order for a fraud examiner to interview witnesses? A. Corroborative witnesses, neutral third-parties, co-conspirators, suspect B. Suspect, co-conspirators, corroborative witnesses, neutral third-parties C. Neutral third-parties, corroborative witnesses, co-conspirators, suspect D. Suspect, corroborative witnesses, co-conspirators, neutral third-parties Question 8 of 25 Score: 1.2 (of possible 1.2 points) In the 2012 Report to the Nations on Occupational Fraud and Abuse, the median loss in schemes committed by males was higher than the median loss in schemes committed by females. True False Question 9 of 25 Score: 1.2 (of possible 1.2 points) Joel Baker, a customer of ABC Electronics, stole a box containing computer games while the sales associate waited on another customer. Which of the following could Joel be charged with? A. Larceny B. Embezzlement C. Fraud D. All of the above Question 10 of 25 Score: 1.2 (of possible 1.2 points) Fraud examination differs from auditing in that fraud examination is: A. Recurring B. Adversarial C. General in scope D. All of the above Answer Key: B Question 11 of 25 Score: 1.2 (of possible 1.2 points) In the 2012 Report to the Nations on Occupational Fraud and Abuse, the category that committed the smallest percentage of occupational fraud was: A. Managers B. Employees C. Owners/Executives D. External parties Question 12 of 25 Score: 1.2 (of possible 1.2 points) In the 2012 Report to the Nations on Occupational Fraud and Abuse, most perpetrators of fraud had been previously charged with or convicted of a fraud-related offense. True False Question 13 of 25 Score: 1.2 (of possible 1.2 points) According to the results of the Hollinger-Clark study, employees steal primarily because of: A. Job dissatisfaction B. Greed C. Informal organizational structures D. Economic pressures Question 14 of 25 Score: 1.2 (of possible 1.2 points) Once sufficient predication has been established, what is the first step a fraud examiner following the fraud theory approach should take? A. Create a hypothesis. B. Analyze data. C. Interview witnesses. D. Interview the suspect. Answer Key: B Question 15 of 25 Score: 1.2 (of possible 1.2 points) The basic tenet of Edwin Sutherland’s theory of differential association is that crime is passed on genetically; that is, the offspring of criminals commit crimes because their parents did. True False Question 16 of 25 Score: 1.2 (of possible 1.2 points) Which of the following is not a part of the fraud theory approach? A. Analyze available data. B. Develop “what-if” scenarios. C. Identify who committed the fraud. D. Refine the hypothesis. Question 17 of 25 Score: 1.2 (of possible 1.2 points) The discipline of fraud examination includes all of the following except: A. Writing investigative reports B. Determining the guilt of the suspect C. Testifying to findings D. Interviewing witnesses Answer Key: B Question 18 of 25 Score: 1.2 (of possible 1.2 points) Arthur Baxter, a manager in records retention for SWC Company, has ordered seven laptop computers for his department, even though he only has five employees. In addition to each laptop, he ordered extra copies of several software programs. When the equipment arrives, Baxter sends one of the extra laptops to his son who is a freshman at Eastern University and sells three of the original software packages to friends. Which of the following offenses could Baxter be charged with? A. Larceny B. Embezzlement C. Conversion D. All of the above Question 19 of 25 Score: 1.2 (of possible 1.2 points) In the 2012 Report to the Nations on Occupational Fraud and Abuse, most frauds were initially detected during an external audit. True False Question 20 of 25 Score: 1.2 (of possible 1.2 points) Richard Moore is the controller for Ajax Company. Recently, he suffered several large losses at the race track, causing him to incur enormous personal debts. Which type of non-sharable financial problem best describes Richard’s situation? A. Business reversal B. Physical isolation C. Violation of ascribed obligations D. Status gaining Question 21 of 25 Score: 1.2 (of possible 1.2 points) In a study by Steve Albrecht, Marshall Romney, and Keith Howe, participants were asked to rank personal characteristics as motivating factors that contributed to fraud. The highest ranked factor was: A. Undue family or peer pressure B. Lack of recognition of job performance C. Living beyond one’s means D. Lack of appreciation by management Question 22 of 25 Score: 1.2 (of possible 1.2 points) In order to prove that fraud occurred, four elements must be present. Which of the following is not one of those elements? A. A material false statement B. Knowledge that the statement was false C. Reliance on the false statement by the victim D. Intent to cause the victim damages Question 23 of 25 Score: 1.2 (of possible 1.2 points) In the 2012 Report to the Nations on Occupational Fraud and Abuse, financial statement fraud had a higher median loss than asset misappropriation and corruption schemes. True False Question 24 of 25 Score: 1.2 (of possible 1.2 points) While conducting a routine internal audit, Sally Franks overheard one of the company’s purchasing agents bragging about receiving a substantial discount on a new SUV from the company’s supplier of fleet cars. Is there sufficient predication to initiate a fraud examination? A. Yes B. No Question 25 of 25 Score: 1.2 (of possible 1.2 points) Research in the Hollinger-Clark study suggests that the best way to deter employee theft is by: A. Increasing sanctions imposed on occupational fraudsters B. Increasing the perception of detection C. Strengthening internal controls D. Communicating the organization’s fraud policies to employees Answer Key: B Chapter 02 Quiz Total Grade: 30 (of possible 30 points) Question 1 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Stefan Winkler was the controller for a beverage company in south Florida. Money was collected by either the delivery drivers who brought in the cash and checks from their route customers (route deposits), or by credit customers who mailed in their payments (office deposits). Winkler stole cash from the route deposits and made up for it by using checks from the office deposits. How did Winkler conceal his crime? A. He altered electronic files B. He stole cash receipt journals, copies of customer checks, and deposit slips C. He removed his personnel file D. All of the above Question 2 of 25 Score: 1.2 (of possible 1.2 points) Which of the following techniques is not used to conceal sales skimming schemes? A. Lapping B. Inventory padding C. Destroying records of transaction D. Recording false voids Question 3 of 25 Score: 1.2 (of possible 1.2 points) Procedures that can be used to prevent and/or detect receivables skimming include which of the following? A. Reconciling the bank statement regularly B. Mandating that employees take annual vacations C. Performing a trend analysis on the aging of customer accounts D. All of the above Question 4 of 25 Score: 1.2 (of possible 1.2 points) Which of the following procedures would not be useful in preventing and detecting sales skimming schemes? A. Comparing register tapes to the cash drawer and investigating discrepancies B. Summarizing the net sales by employee and extracting the top employees with low sales C. Installing video cameras at cash entry points D. Offering discounts to customers who do not get receipts for their purchases Question 5 of 25 Score: 1.2 (of possible 1.2 points) Which of the following computer audit tests can be used to detect skimming schemes? A. Summarizing by employee the difference between the cash receipt report and the sales register system B. Identifying unique journal entries to the cash account C. Joining the customer statement report file to the accounts receivable and reviewing for balance differences D. Extracting invoices paid by cash Question 6 of 25 Score: 1.2 (of possible 1.2 points) Jason Herman works part-time as a retail clerk at a local bookstore. One night while his manager was out of town, Jason decided to keep the store open for a few extra hours. He reset the cash registers at the normal closing time, but continued making sales. Two hours later, when he closed for the night, he reset the registers again, removing all evidence that any extra transactions had been made, and pocketed the money from the after-hours sales. What kind of scheme did Jason commit? A. Register disbursement B. Force balancing C. Receivables skimming D. Unrecorded sales Question 7 of 25 Score: 1.2 (of possible 1.2 points) Anne Mullens is the bookkeeper for DWG Refrigeration Repair. One afternoon while she was preparing the bank deposit, a customer came in to the office and paid his account in full with a $57 check. Rather than adding the check to the deposit, Anne pocketed $57 cash from the previously recorded amount and included the customer’s check in the money to be taken to the bank. What type of scheme did Anne commit? A. Larceny B. Kiting C. Skimming D. Currency balancing Question 8 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Stefan Winkler was the controller for a beverage company in south Florida. Money was collected by either the delivery drivers who brought in the cash and checks from their route customers (route deposits), or by credit customers who mailed in their payments (office deposits). Winkler stole cash from the route deposits and made up for it by using checks from the office deposits. Which of the following red flags were present that could have alerted the company to the fraud? A. Missing deposit slips B. Customer complaints C. Winkler never took vacations D. All of the above Question 9 of 25 Score: 1.2 (of possible 1.2 points) Peggy Booth is the bookkeeper for an equipment rental company. After recording the cash sales and preparing the bank deposit, she takes $200 dollars from the total. This is an example of a skimming scheme. True False Question 10 of 25 Score: 1.2 (of possible 1.2 points) Skimming receivables is generally more difficult to conceal than skimming sales. True False Question 11 of 25 Score: 1.2 (of possible 1.2 points) Asset misappropriations are broken down into two categories: cash schemes and non-cash schemes. According to the 2012 Report to the Nations on Occupational Fraud and Abuse, cash schemes are much more common than non-cash schemes. True False Question 12 of 25 Score: 1.2 (of possible 1.2 points) Receivables skimming can be concealed through: A. Lapping B. Force balancing C. Document destruction D. All of the above Question 13 of 25 Score: 1.2 (of possible 1.2 points) Computing the percentage of assigned time to unassigned time for employees is one method to detect an employee skimming scheme. True False Question 14 of 25 Score: 1.2 (of possible 1.2 points) Skimming can be either an on-book scheme or an off-book scheme, depending on whether cash or a check is stolen. True False Question 15 of 25 Score: 1.2 (of possible 1.2 points) ____________________ is the theft of cash from a victim entity prior to its entry in an accounting system. A. A fictitious disbursement B. Skimming C. Larceny D. Conversion Answer Key: B Question 16 of 25 Score: 1.2 (of possible 1.2 points) Sue Meyers was an accounts receivable clerk for an insurance broker. When premium payments were received, she would steal the check of every tenth customer and cash it at a liquor store. To conceal her scheme, she would credit the account of the customer that she stole from with a payment that was received from another customer’s account. This is an example of: A. Force balancing B. Lapping C. Understating sales D. A forged endorsement scheme Answer Key: B Question 17 of 25 Score: 1.2 (of possible 1.2 points) Mandating supervisory approval for write-offs or discounts can help prevent receivables skimming schemes. True False Question 18 of 25 Score: 1.2 (of possible 1.2 points) The concealment of receivables skimming can be difficult because: A. The audit trail must be destroyed. B. The incoming payments are expected. C. Inventory must be padded to conceal shrinkage. D. All of the above Answer Key: B Question 19 of 25 Score: 1.2 (of possible 1.2 points) Myra Manning, CFE, was hired to investigate some suspicious activity at Arizona Medical Supply after one of the company’s largest customers complained several times that its account statements do not reflect all the payments it has made. While examining the accounts receivable activity, Myra noticed a significant rise in the volume of overdue accounts during the last 6 months. What type of scheme might this situation indicate? A. Cash larceny B. Shell company C. Receivables skimming D. False refunds Question 20 of 25 Score: 1.2 (of possible 1.2 points) Methods of skimming sales include which of the following? A. Conducting unauthorized sales after hours B. Rigging the cash register so that the sale is not recorded C. Posting a sale for less than the amount collected D. All of the above Question 21 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Brian Lee, a top-notch plastic surgeon, collected payments from his patients without giving a cut to the clinic where he practiced. What was his motivation for committing the fraud? A. He needed to repay his student loan. B. He was greedy. C. He felt that the clinic was taking too much of a cut from his income. D. He wanted to use the proceeds to fund his “doctors without borders” practice. Answer Key: B Question 22 of 25 Score: 1.2 (of possible 1.2 points) George Albert was a property manager for a large apartment complex while he was going to college. One of his duties was to collect rent from the tenants. If rent was paid after the third of the month, a late fee was tacked on to the amount due. When a tenant paid his rent late, George would backdate the payment, record and remit only the rent portion to his employers, and pocket the late fee. This is an example of what type of fraud? A. Larceny B. Sales skimming C. Fraudulent write-offs D. Plugging Answer Key: B Question 23 of 25 Score: 1.2 (of possible 1.2 points) A method of concealing receivables skimming by crediting one account while abstracting money from a different account is known as: A. Account substitution B. Kiting C. Lapping D. Plugging Question 24 of 25 Score: 1.2 (of possible 1.2 points) To cover up a skimming scheme in which the employee takes cash from the register, the employee must make a voided sale in order for the register to balance. True False Question 25 of 25 Score: 1.2 (of possible 1.2 points) To a fraudster, the principle advantage of skimming is the difficulty with which the scheme is detected. True False Chapter 03 Quiz Total Grade: 30 (of possible 30 points) Question 1 of 25 Score: 1.2 (of possible 1.2 points) Jeff Lewis is an accounts receivable clerk for FTB Industries. As customers pay off their balances, Lewis posts the payments but pockets the money. He can conceal his theft by: A. Making unsupported entries for the amount stolen B. Adjusting the account with a discount C. Destroying the records D. All of the above Question 2 of 25 Score: 1.2 (of possible 1.2 points) Which of the following computer audit tests would be the least useful in detecting a cash larceny scheme? A. Summarizing the difference between the cash receipt report and the sales register system by employee B. Summarizing the top sales producers by employee C. Summarizing discounts, returns, and cash receipt adjustments by employee D. Reviewing all unique journal entries in the cash accounts Answer Key: B Question 3 of 25 Score: 1.2 (of possible 1.2 points) Jan Ashley worked for the R&S Department Store as a sales associate in the fine linens department. As she would give change back to a customer for cash sales, she would also pull out a $10 bill and slip it in her pocket. She concealed her scheme by issuing one false refund at the end of her shift for the total amount she stole that day. This is an example of what type of scheme? A. Sales skimming B. Larceny at the point of sale C. Lapping D. Larceny at the deposit Answer Key: B Question 4 of 25 Score: 1.2 (of possible 1.2 points) To prevent cash larceny through falsification of cash counts, an independent employee should verify the cash count in each register or cash box at the end of each shift. True False Question 5 of 25 Score: 1.2 (of possible 1.2 points) Which of the following antifraud controls can help prevent and detect cash larceny from the deposit? A. Having two copies of the bank statement delivered to different persons in an organization B. Comparing the bank authenticated deposit slip with the general ledger posting of the day’s receipts C. Preparing the deposit slip to show each individual check and money order along with currency receipts D. All of the above Question 6 of 25 Score: 1.2 (of possible 1.2 points) Cash misappropriations are divided into two broad groups: fraudulent disbursements schemes and cash receipts schemes. True False Question 7 of 25 Score: 1.2 (of possible 1.2 points) The most important factor in preventing cash larceny from the deposit is: A. Separating the duties of the deposit function B. Having two employees deliver the deposit to the bank C. Having a visible management presence in the mailroom D. None of the above Question 8 of 25 Score: 1.2 (of possible 1.2 points) Skimming involves the theft of money that has already appeared on a victim’s books, while cash larceny involves stealing money before it has been recorded. True False Question 9 of 25 Score: 1.2 (of possible 1.2 points) Mel Turner, the runner for a small bookstore, had a bad habit of helping himself to cash from the deposit on the way to the bank. He covered his tracks by substituting a check from the next day’s deposit for the amount he stole from the previous day’s deposit. This is an example of what type of concealment? A. Deposits in transit B. Deposit lapping C. Force balancing D. None of the above Answer Key: B Question 10 of 25 Score: 1.2 (of possible 1.2 points) Dorothy McNally stole $232 from the company deposit while on the way to the bank. She can conceal the theft by recording the missing amount on the bank reconciliation as a(n): A. Deposit in transit B. Outstanding check C. Credit memo D. None of the above Question 11 of 25 Score: 1.2 (of possible 1.2 points) Deposit lapping is considered an off-book scheme. True False Question 12 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, cash larceny schemes were the least common form of cash misappropriations. True False Question 13 of 25 Score: 1.2 (of possible 1.2 points) Running a report that summarizes user access for the sales, accounts receivable, cash receipt, and general ledger systems during non-business hours might identify a cash larceny scheme. True False Question 14 of 25 Score: 1.2 (of possible 1.2 points) Where do most larceny schemes involving cash occur? A. In the accounting department B. In the mailroom C. At the point of sale D. At off-site locations Question 15 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Laura Grove was the head teller at a bank in Tennessee. As the head teller, she had the authority to open the night depository along with another teller. For security reasons, each teller only had half of the combination to the vault. In the end, Grove opened the vault and stole two deposit bags worth approximately $16,000. Which of the following red flags made the investigators suspect Laura? A. The security system showed that she was the last one to leave the bank on the day before the bags were stolen. B. She broke out in a rash when she was interviewed. C. During the interview she made a point of mentioning that the other teller had been having financial problems. D. All of the above Answer Key: B Question 16 of 25 Score: 1.2 (of possible 1.2 points) Methods for concealing larceny of receivables include which of the following? A. Lapping B. Stolen statements C. Reversing entries D. All of the above Question 17 of 25 Score: 1.2 (of possible 1.2 points) The two categories of cash receipts schemes are: A. Lapping and skimming B. Lapping and cash larceny C. Cash larceny and skimming D. Skimming and billing schemes Question 18 of 25 Score: 1.2 (of possible 1.2 points) Victor Jackson, CFE, was hired by BRS Carpet and Tile to investigate possible cash larceny at the point of sale. Which of the following red flags should he look for? A. Large differences between sales records and cash on hand B. Unusual journal entries to the cash accounts C. A large number of small differences between sales records and cash on hand D. All of the above Question 19 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, cash larceny schemes had the largest median loss of all cash misappropriations. True False Question 20 of 25 Score: 1.2 (of possible 1.2 points) All of the following are ways a fraudster might conceal cash larceny from the deposit except: A. Posting missing money as “deposits in transit” B. Deposit lapping C. Falsifying the bank copy of the deposit slip D. Destroying customer statements Question 21 of 25 Score: 1.2 (of possible 1.2 points) The central weakness of a cash larceny scheme is the resulting imbalance in the organization’s accounting records. True False Question 22 of 25 Score: 1.2 (of possible 1.2 points) Which of the following methods can be used to conceal a larceny scheme that occurred at the point of sale? A. Falsifying the cash count B. Destroying the register tape C. Stealing from another employee’s register D. All of the above Question 23 of 25 Score: 1.2 (of possible 1.2 points) If discrepancies are found between the sales records and the cash on hand, which of the following schemes might be occurring? A. Cash larceny at the point of sale B. Cash larceny from the deposit C. Fraudulent disbursements D. Sales skimming Question 24 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Laura Grove was the head teller at a bank in Tennessee. As the head teller, she had the authority to open the night depository along with another teller. For security reasons, each teller only had half of the combination to the vault. In the end, Grove opened the vault and stole two deposit bags worth approximately $16,000. How was she ultimately caught? A. She broke down and confessed to the investigators during a routine interview of all tellers. B. Her husband found the bank’s money and turned her in. C. The bank found some of the checks in the dumpster near her house with her fingerprints on them. D. None of the above Answer Key: B Question 25 of 25 Score: 1.2 (of possible 1.2 points) Danielle Boyle, CFE, was hired to investigate some suspicious activity in the accounts receivable department at Red Technologies. While examining the company’s accounting records, she noticed several payments posted to customers’ accounts that were later reversed with journal entries to “courtesy discounts.” What type of scheme might this situation indicate? A. Receivables skimming B. Deposit lapping C. Cash larceny of receivables D. Shell company Chapter 04 Quiz Total Grade: 30 (of possible 30 points) Question 1 of 25 Score: 1.2 (of possible 1.2 points) Producing an invoice that looks professional is the most difficult part of a shell company scheme. True False Question 2 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, a Southeastern medical college was plagued with fraudulent activity. What started as an investigation into some suspicious expense reimbursement activity eventually led to the discovery of a fictitious company that was set up to fraudulently bill the college for supplies that never existed. Which of the following red flags were found during the investigation? A. Some vendors didn’t have street addresses or telephone numbers. B. Invoices were received for just under the amount that required two authorized signatures. C. Some of the checks were cashed at check cashing companies. D. All of the above Question 3 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, a Southeastern medical college was plagued with fraudulent activity. What started as an investigation into some suspicious expense reimbursement activity eventually led to the discovery of a fictitious company that was set up to fraudulently bill the college for supplies that never existed. What was the first sign that there were more problems than the initial expense reimbursement fraud? A. The auditors found an usually high number of new unapproved vendors. B. The administrative assistant suddenly left town when requested to be interviewed. C. The supervisor resigned his position immediately. D. A tip was received by internal auditors. Answer Key: B Question 4 of 25 Score: 1.2 (of possible 1.2 points) In order to start up a shell company, the fraudster will most likely need which of the following? A. Certificate of incorporation B. Mailing address C. Bank account D. All of the above Question 5 of 25 Score: 1.2 (of possible 1.2 points) The internal auditor for the Bremer Group recently ran a computer audit test that showed that Ouetzen Company, one of the company’s listed vendors, doesn’t have a telephone number or a tax ID number. Of the choices given, what type of fraud does this situation most likely indicate? A. Larceny scheme B. Shell company scheme C. Non-accomplice vendor scheme D. Personal purchases scheme Answer Key: B Question 6 of 25 Score: 1.2 (of possible 1.2 points) When a billing scheme is occurring, the company’s expenses appear lower than they should, causing the financial statements to show falsely inflated profits. True False Question 7 of 25 Score: 1.2 (of possible 1.2 points) Warning signs of a shell company scheme include which of the following? A. Invoices lacking details of the items purchased B. A vendor that is not listed in the phone book C. An unexpected and significant increase in “consulting expenses” D. All of the above Question 8 of 25 Score: 1.2 (of possible 1.2 points) Abby Watkins works in the accounts payable department for SVX Company. Recently, she set up a payment to Pacific Industries for invoice number 7001a, which is unlike any invoice number she has seen from Pacific in the past. The voucher contains a purchase order that backs up the invoice, but it looks like a photocopy. Additionally, the accounting system shows that invoice number 7001 from Pacific was for a slightly different amount and has already been paid. Pacific Industries is an established vendor with SVX, but the payment address has recently been changed to a P.O. Box in the vendor file. What type of fraud does this situation most likely indicate? A. Personal purchases scheme B. Shell company scheme C. Non-accomplice vendor scheme D. False purchase requisition scheme Question 9 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, billing schemes were the second most costly type of fraudulent disbursements schemes. True False Question 10 of 25 Score: 1.2 (of possible 1.2 points) Sally Fuller is a buyer for GWA publishing company. Her job is to purchase supplies and services for the printing of technical manuals. Her brother sets up a printing company, and Sally hires him to print most of these manuals for GWA. However, rather than actually printing the manuals, her brother hires another printer to do the work, then sells the printed manuals to GWA at a 50 percent markup. As a result, his prices are much higher than the other printers who serve GWA. This type of scheme is most likely a: A. Pay-and-return scheme B. Pass-through scheme C. Inventory-markup scheme D. Non-accomplice vendor scheme Answer Key: B Question 11 of 25 Score: 1.2 (of possible 1.2 points) ____________________ are schemes in which the employee intentionally mishandles payments that are owed to legitimate vendors. A. Pass-through schemes B. Pay-and-return schemes C. Shell company schemes D. Switch-and-swap schemes Answer Key: B Question 12 of 25 Score: 1.2 (of possible 1.2 points) Which of the following computer audit tests can be used to detect billing schemes? A. Extracting manual checks and summarizing by vendor and issuer B. Extracting a sample of vendor open invoices for confirmation with the vendor C. Extracting delivery addresses that do not correspond to company locations D. All of the above Question 13 of 25 Score: 1.2 (of possible 1.2 points) Invoices that are submitted by shell companies can be for fictitious goods or services or for items that were actually sold to the victim company. True False Question 14 of 25 Score: 1.2 (of possible 1.2 points) Fictitious entities created for the sole purpose of committing fraud are called: A. Ghost companies B. Non-accomplice vendors C. Shell companies D. “Rubber stamp” companies Question 15 of 25 Score: 1.2 (of possible 1.2 points) In a ______________ scheme, the perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose. A. Purchasing B. Skimming C. Larceny D. Billing Question 16 of 25 Score: 1.2 (of possible 1.2 points) A pass-through scheme is usually undertaken by someone who works in which department? A. Accounts payable B. Receiving C. Purchasing D. Accounts receivable Question 17 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Albert Miano, the facilities supervisor for a popular magazine, submitted phony invoices. When Miano received the checks for the phony invoices, he forged the contractor’s signature. He then endorsed the check in his own name. How was the fraud caught? A. The auditors found a discrepancy in the invoices that were submitted. B. The new chief of internal audit found it by accident. C. A vendor received a check by mistake and called the accounts payable department. D. The external audit found it in an audit sample of canceled checks. Answer Key: B Question 18 of 25 Score: 1.2 (of possible 1.2 points) Charles Dieter and Joey Davis worked together to steal nearly $50,000 from Valdosta Medical Supply. Charles, an accounts payable clerk, deliberately overpaid a few of the company’s vendors. He then called the vendors, explained the “mistake,” and asked for the excess to be refunded. Joey, a mailroom employee, intercepted the incoming refund checks and cashed them. The two men split the proceeds. What type of scheme did Charles and Joey commit? A. Shell company B. Larceny C. Pass-through D. Pay-and-return Question 19 of 25 Score: 1.2 (of possible 1.2 points) Purchasing personal items using an organization’s money is what type of scheme? A. Larceny scheme B. Billing scheme C. Pay-and-return scheme D. Skimming scheme Answer Key: B Question 20 of 25 Score: 1.2 (of possible 1.2 points) Which of the following controls can be used to prevent or detect personal purchases on company credit cards? A. Having credit card statements sent directly to someone with signature authority on the account for review and payment B. Requiring employees to receive store credits rather than cash when returning items they purchased with the company’s credit card C. Monitoring credit card expenses for unexplained increases in purchasing levels D. All of the above Question 21 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Albert Miano, the facilities supervisor for a popular magazine, submitted phony invoices. When Miano received the checks for the phony invoices, he forged the contractor’s signature. He then endorsed the check in his own name. What controls weaknesses did the company have that facilitated Miano’s scheme? A. Employees in the accounts payable department did not follow departmental procedures. B. Accounts payable never checked signatures on the invoices against the authorized signatures on file. C. Miano was allowed to pick up the approved invoices from the administrative vice president’s office and deliver them to the accounts payable department. D. All of the above Question 22 of 25 Score: 1.2 (of possible 1.2 points) Eli Adams is an accounts payable clerk for MJF Productions. By forging signatures, he was able to procure a company credit card. He recently bought home stereo equipment and put it on his company credit card. When the credit card statement arrived at MJF, Eli prepared a check to the credit card company and buried the purchase in the monthly expenses of the company’s largest cost center, knowing that his manager is generally inattentive when approving payments. What type of fraud is this? A. Larceny B. Pass-through scheme C. Personal purchases scheme D. Forged maker scheme Question 23 of 25 Score: 1.2 (of possible 1.2 points) Which of the following actions is least likely to help prevent and detect schemes involving fraudulent invoices from non-accomplice vendors? A. Marking “paid” on every voucher that has been paid B. Verifying vendor address changes before disbursements are issued C. Matching all bank statement items to canceled checks D. Separating the duties of purchasing, authorizing, and distributing payments Question 24 of 25 Score: 1.2 (of possible 1.2 points) In the Fraud Tree, all of the following are categories of fraudulent disbursements except: A. Payroll schemes B. Cash larceny C. Check tampering D. Billing schemes Answer Key: B Question 25 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, the most common fraudulent disbursement schemes were: A. Billing schemes B. Check tampering schemes C. Payroll schemes D. Register disbursement schemes Chapter 05 Quiz Total Grade: 30 (of possible 30 points) Question 1 of 30 Score: 1 (of possible 1 point) In one of the case studies in the textbook, Melissa Robinson, who worked as an executive secretary for a worldwide charitable organization and was active in her children’s school, was also a thief. As one of two people allowed to sign checks on the organization’s bank accounts, she learned early on that she could forge the second person’s signature without anyone becoming suspicious. How was she finally caught? A. A co-worker contacted the organization’s executive director when she found that a company check had been written to the children’s school for Robinson’s personal items. B. New officers were elected, and they took the accounting books from her. C. The auditors discovered her fraud during an annual audit of the books. D. Robinson’s husband tipped off the audit committee after he became suspicious of some of Robinson’s purchases. Answer Key: B Question 2 of 30 Score: 1 (of possible 1 point) In one of the case studies in the textbook, Ernie Phillips was a CPA who had fallen on hard times both financially and personally. He eventually got a job as a controller for a friend who had just been named as the receiver for a financial services company. Within a short period of time Phillips began writing checks to himself that had nothing to do with payroll. Control weaknesses that facilitated the commission of this fraud include which of the following? A. The bank statements were sent directly to Phillips. B. Phillips had check signing authority. C. There was no separation of duties between accounts payable and the treasury department. D. All of the above Question 3 of 30 Score: 1 (of possible 1 point) In one of the case studies in the textbook, Melissa Robinson, who worked as an executive secretary for a worldwide charitable organization and was active in her children’s school, was also a thief. As one of two people allowed to sign checks on the organization’s bank accounts, she learned early on that she could forge the second person’s signature without anyone becoming suspicious. What red flags were present that indicated that something wasn’t appropriate? A. Robinson would not take vacation leave. B. There were a lot of missing files that the auditors couldn’t locate during their annual audit. C. Robinson would not release any financial information when requested and gave excuses for why it wasn’t available. D. All of the above Question 4 of 30 Score: 1 (of possible 1 point) In a forged maker scheme, the perpetrator fraudulently affixes the signature of an authorized maker to a check. True False Question 5 of 30 Score: 1 (of possible 1 point) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, check tampering has the lowest median loss of all fraudulent disbursement frauds. True False Question 6 of 30 Score: 1 (of possible 1 point) Concealing a check tampering scheme generally means hiding both the identity of the perpetrator and the fact that the fraud ever occurred. True False Question 7 of 30 Score: 1 (of possible 1 point) To prevent and detect forged maker schemes, an organization should: A. Separate the duties of check preparation and check signing. B. Rotate authorized check signers. C. Maintain a usage log for the signature stamp. D. All of the above Question 8 of 30 Score: 1 (of possible 1 point) Which of the following computer audit tests can be used to detect forged maker schemes? A. Extract checks that are out of sequence B. Extract manual checks and summarize by vendor and issuer C. Extract all checks payable to “cash” and summarize by issuer for reasonableness D. All of the above Question 9 of 30 Score: 1 (of possible 1 point) In which of the following schemes does the fraudster intercept and convert a company check made payable to a third party? A. Forged maker scheme B. Authorized maker scheme C. Altered payee scheme D. Concealed check scheme Question 10 of 30 Score: 1 (of possible 1 point) To prevent altered payee schemes, the person who prepares the check should also review the check after it has been signed. True False Question 11 of 30 Score: 1 (of possible 1 point) Producing a counterfeit check using the company’s logo and bank account number is one type of concealed check scheme. True False Question 12 of 30 Score: 1 (of possible 1 point) Which of the following is not an effective control mechanism to safeguard an organization’s check stock? A. Boxes of blank checks should be sealed with security tape. B. Organizations should use check stock that is high-quality and distinctly marked. C. The employee in charge of the check preparation function should periodically verify the security of unused checks. D. Voided checks should be promptly destroyed. Question 13 of 30 Score: 1 (of possible 1 point) To successfully carry out and conceal a check tampering scheme, the fraudster must have: A. Access to the check stock B. Access to the bank statements C. The ability to forge signatures or alter other information on the check D. All of the above Question 14 of 30 Score: 1 (of possible 1 point) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, check tampering is the most common fraudulent disbursement fraud. True False Question 15 of 30 Score: 1 (of possible 1 point) Check tampering includes both fraudulently preparing a company check for one’s own benefit and intercepting a company check that is intended for a third party and converting it for one’s own benefit. True False Question 16 of 30 Score: 1 (of possible 1 point) Kristen Diamond worked in the mailroom at B&R Industries. When attaching postage to the outgoing mail, she would search for payments being sent to a specific vendor, K. D. Sand. She intercepted these checks and carefully changed them to appear payable to K. Diamond. She then endorsed the checks with her own name and deposited them into her personal bank account. What type of scheme did Kristen commit? A. Concealed check B. Payables skimming C. “Tacking on” D. Forged endorsement Question 17 of 30 Score: 1 (of possible 1 point) In one of the case studies in the textbook, Ernie Phillips was a CPA who had fallen on hard times both financially and personally. He eventually got a job as a controller for a friend who had just been named as the receiver for a financial services company. Within a short period of time Phillips began writing checks to himself that had nothing to do with payroll. What happened to Phillips? A. He quit his job and moved to another state. B. He pleaded guilty to fraud and grand theft and spent 24 months in prison. C. He paid the money back by mortgaging his home. D. He was charged criminally, and while out on bail, he fled with his family. Question 18 of 30 Score: 1 (of possible 1 point) Mary Duncan is an internal auditor for the Western Realty Group. Recently, she ran a program that extracted checks that were out of the normal sequence. She found that four or five checks were written every month that fit this category. Based on the information given, which of the following schemes is likely occurring? A. Multiple reimbursement scheme B. Shell company scheme C. Personal purchases scheme D. Forged maker scheme Question 19 of 30 Score: 1 (of possible 1 point) Check tampering schemes involving checks made payable to “cash” are extremely difficult to resolve, as there is no way to tell who converted the check. True False Question 20 of 30 Score: 1 (of possible 1 point) Billy Hodges was in charge of preparing checks for the Lightner Company. He entered the payment information into the accounting system, and the completed checks were sent back to him to review. He then forwarded the checks to his supervisor for signing. In each batch of legitimate checks, Hodges would insert checks made payable to himself. When his supervisor was busy, he would take the stack of checks to him and ask him to sign them immediately in order to meet their cycle time deadline. The supervisor would inattentively sign the checks, and then Hodges would extract the checks he made payable to himself. This is an example of what type of check tampering scheme? A. Concealed check scheme B. Forged endorsement scheme C. Forged maker scheme D. Altered payee scheme Question 21 of 30 Score: 1 (of possible 1 point) Melanie Diggers is an internal auditor for Atlantic Equipment Rental and Sales. While performing a routine review of one of the company’s bank accounts, she noticed an unusual “adjusting entry” to the account on the general ledger. She also found that several checks that had cleared the bank in the last few months were absent from the stack of canceled checks. She requested copies of these checks from the bank and discovered that they were all made payable to the company’s controller who has check signing authority on the account. The controller is also responsible for performing the bank reconciliation and recording month-end journal entries. Which of the following schemes do these signs most likely indicate? A. Concealed check scheme B. False voids scheme C. Authorized maker scheme D. Forged maker scheme Question 22 of 30 Score: 1 (of possible 1 point) Mavis Bosman works as an accounts receivable clerk at Brooks Publishing. She steals an incoming check from a customer and cashes it at a grocery store by forging the endorsement on the back of the check. This is an example of a check tampering scheme. True False Question 23 of 30 Score: 1 (of possible 1 point) Which of the following choices is not a category of check tampering? A. Forged maker schemes B. Altered payee schemes C. Unauthorized endorsement schemes D. Concealed check schemes Question 24 of 30 Score: 1 (of possible 1 point) Vicky Rogers works in the accounts payable department at HDU, Inc. When checks are returned to the company for incorrect vendor addresses, she is supposed to research them, correct them, and then forward them to the proper address. Instead, Rogers decided to convert some of the returned checks for her own use. Based on the information provided, what type of check tampering scheme is this likely to be? A. Forged maker B. Forged endorsement C. Concealed check D. Authorized maker Answer Key: B Question 25 of 30 Score: 1 (of possible 1 point) The person who prepares and signs the check is known as the ______________ of the check. A. Author B. Endorser C. Payer D. Maker Question 26 of 30 Score: 1 (of possible 1 point) Which of the following is not a type of altered payee scheme? A. “Tacking” on B. Forged maker C. Using erasable ink D. Leaving the payee designation blank Answer Key: B Question 27 of 30 Score: 1 (of possible 1 point) Check tampering is unique from other fraudulent disbursement schemes because in a check tampering scheme: A. The perpetrator physically prepares the fraudulent check. B. The perpetrator must have access to a signature stamp in order to conceal the crime. C. The perpetrator submits a phony document in order to generate the fraudulent payment. D. The perpetrator must endorse the check in order to cash or deposit it. Question 28 of 30 Score: 1 (of possible 1 point) Which of the following procedures can help prevent and detect the theft and conversion of outgoing company checks? A. Train employees to look for dual endorsements on canceled checks. B. Chart the date of mailing for every outgoing check. C. Track changes made to vendor records. D. All of the above Question 29 of 30 Score: 1 (of possible 1 point) Methods used to manipulate electronic payments include which of the following? A. Abusing legitimate access to the employer’s payment system B. Gaining access to the employer’s payment system through social engineering C. Exploiting weaknesses in the employer’s internal control over its electronic payment system D. All of the above Question 30 of 30 Score: 1 (of possible 1 point) In one of the case studies in the textbook, Ernie Phillips was a CPA who had fallen on hard times both financially and personally. He eventually got a job as a controller for a friend who had just been named as the receiver for a financial services company. Within a short period of time Phillips began writing checks to himself that had nothing to do with payroll. How was the fraud discovered? A. The president received a bank statement containing canceled checks that had been written to Phillips. B. The receiver received a call from the bank asking him to verify a check. C. A vendor received a check in error and reported it to the operations manager. D. The operations manager found a check made payable to Phillips while searching Phillips’ desk for some accounting records. Chapter 06 Quiz Total Grade: 27.6 (of possible 30 points) Question 1 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, payroll frauds are the least costly type of fraudulent disbursement schemes. True False Question 2 of 25 Score: 0 (of possible 1.2 points) Ellie Weaver works for the JAG Group as the customer service supervisor. When Joel Carter was hired into her department, she listed his start date as one month before he actually began work. Accordingly, the payroll department generated an extra paycheck for Carter, which Weaver intercepted and cashed at a liquor store. What type of fraud is this? A. Forged endorsement scheme B. Ghost employee scheme C. Altered payee scheme D. Falsified wages scheme Answer Key: B Question 3 of 25 Score: 1.2 (of possible 1.2 points) If an employee generates a much higher percentage of uncollected sales than his coworkers, what type of scheme might he be committing? A. Sales skimming B. Commission scheme C. Multiple reimbursement scheme D. Shell company scheme Answer Key: B Question 4 of 25 Score: 1.2 (of possible 1.2 points) Which of the following procedures will not help prevent ghost employee schemes? A. The personnel records are maintained separately from the payroll and timekeeping functions. B. The personnel department conducts background and reference checks on all prospective employees before hiring them. C. The person responsible for hiring new employees also supervises the payroll function. D. The personnel department verifies all changes to the payroll. Question 5 of 25 Score: 1.2 (of possible 1.2 points) Comparing actual payroll expenses to budget projections can help identify falsified hours and salary schemes. True False Question 6 of 25 Score: 1.2 (of possible 1.2 points) If a fraudster fails to remove a terminated employee from the payroll and collects the former employee’s fraudulent paychecks, he or she is committing a: A. Payroll larceny scheme B. Falsified hours and salary scheme C. Forged endorsement scheme D. Ghost employee scheme Question 7 of 25 Score: 0 (of possible 1.2 points) In one of the case studies in the textbook, Jerry Harkanell worked as an administrative assistant for a large San Antonio hospital, where his clerical duties included the submission of the payroll information for his unit. He found that he could add hours to the timesheets and receive extra pay. He continued to alter his timesheets until he was finally caught. What red flag was present that should have made someone suspicious? A. He used erasable ink to record the hours on the timesheets. B. He showed up for work on a day he had off so he could personally turn in the timesheets. C. No one else in the department had overtime hours but Harkanell. D. All of the above Answer Key: B Question 8 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Jerry Harkanell worked as an administrative assistant for a large San Antonio hospital, where his clerical duties included the submission of the payroll information for his unit. He found that he could add hours to the timesheets and receive extra pay. He continued to alter his timesheets until he was finally caught. How was his scheme detected? A. An exception report showed that Harkanell had claimed overtime hours for a period when there was no need to work overtime. B. The payroll department sent the timesheets for one pay period back to the supervisor for review when a suspicious number of hours had been indicated. C. An overtime audit was conducted revealing that Harkanell had worked an unusual number of hours compared to others in the department. D. The internal auditors received an anonymous tip. Question 9 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Katie Jordon was the “All-American Girl Next Door” working her first job out of college. As an on-site manager for an apartment complex in Dallas, she did such a good job that when her employer purchased a huge apartment complex in Houston, she was asked to run it. All was well until a member of the maintenance crew resigned. She continued to keep him on the payroll and pocketed his wages. She later added a non-existent assistant once she saw how easy it was to add an employee without being questioned. However, her scheme eventually came to light, and her days of bonus pay were over. How was her scheme discovered? A. An employee tipped off the main office when she saw the timesheets listing an employee that she had never heard of. B. When Jordon’s boss made a routine visit to the office, he noticed that there was no sign of an assistant in the office. C. She was splitting the proceeds with her boyfriend, and he contacted the home office when she broke up with him. D. The auditors found it when they conducted a routine audit of all new acquisitions after being in business for one year. Answer Key: B Question 10 of 25 Score: 1.2 (of possible 1.2 points) The most common method of misappropriating funds from the payroll is: A. Overpayment of wages B. Using a ghost employee C. Overstating commissions D. Theft of payroll deductions Question 11 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Jerry Harkanell worked as an administrative assistant for a large San Antonio hospital, where his clerical duties included the submission of the payroll information for his unit. He found that he could add hours to the timesheets and receive extra pay. He continued to alter his timesheets until he was finally caught. How was the case resolved? A. He confessed to falsifying the overtime and was terminated. B. A civil suit was filed to recover the loss. C. He was convicted and sentenced to prison. D. None of the above Question 12 of 25 Score: 1.2 (of possible 1.2 points) Which of the following is not a type of payroll scheme? A. Ghost employee scheme B. False deduction scheme C. Falsified hours and salary scheme D. Commission scheme Answer Key: B Question 13 of 25 Score: 1.2 (of possible 1.2 points) Marsha Wood added her one-year-old niece, Jackie, to the payroll at JNC Company and began issuing paychecks in Jackie’s name, even though Jackie did not work for the organization. Marsha’s niece is not considered a ghost employee because she is a real individual rather than a fictitious person. True False Question 14 of 25 Score: 1.2 (of possible 1.2 points) Which of the following can be used to test for commission schemes? A. Extract manual checks and summarize by salesperson and amount. B. Compare hours reported per timecard system to payroll system. C. Extract customer sale balances that exceed the customer credit limit. D. None of the above Question 15 of 25 Score: 1.2 (of possible 1.2 points) Comparing salaried employees’ gross pay from one pay period to the next is one way of testing for payroll fraud. True False Question 16 of 25 Score: 1.2 (of possible 1.2 points) Which of the following controls will help prevent and detect falsified hours and salary schemes? A. The duties of payroll preparation, authorization, and distribution are segregated. B. Sick leave and vacation time are monitored for excesses by the payroll department. C. Supervisors return authorized timecards to the employees for review before they are sent to the payroll department. D. All of the above Question 17 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, payroll frauds are the most common type of fraudulent disbursement schemes. True False Question 18 of 25 Score: 1.2 (of possible 1.2 points) During a review of A+ Service’s payroll records, Judy Penney, an internal auditor, noticed that Bradley Banks has no deductions taken from his paychecks for withholding taxes or insurance. She then searched for Banks in the personnel records, but could not locate him. Based on this information, what type of scheme did Penney most likely uncover? A. Ghost employee scheme B. Falsified salary scheme C. Fictitious vendor scheme D. None of the above Question 19 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Katie Jordon was the “All-American Girl Next Door” working her first job out of college. As an on-site manager for an apartment complex in Dallas, she did such a good job that when her employer purchased a huge apartment complex in Houston, she was asked to run it. All was well until a member of the maintenance crew resigned. She continued to keep him on the payroll and pocketed his wages. She later added a non-existent assistant once she saw how easy it was to add an employee without being questioned. However, her scheme eventually came to light, and her days of bonus pay were over. What happened to Jordon? A. The company terminated her employment but failed to press charges against her in order to keep things quiet. B. She was convicted but served no jail time. C. She skipped town and a warrant was issued for her arrest. D. She took out a loan for the amount stolen and paid the company back in lieu of the company pressing charges against her. Answer Key: B Question 20 of 25 Score: 1.2 (of possible 1.2 points) Which of the following is not a method typically used by an employee to fraudulently inflate his or her hours in a manual timekeeping system? A. Collusion B. “Lazy manager” method C. Forging the supervisor’s signature D. Manipulating the pay grade Question 21 of 25 Score: 1.2 (of possible 1.2 points) A _______________ is an individual on the payroll who does not actually work for the organization. A. Falsified employee B. Phantom employee C. Ghost employee D. Shell employee Question 22 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Katie Jordon was the “All-American Girl Next Door” working her first job out of college. As an on-site manager for an apartment complex in Dallas, she did such a good job that when her employer purchased a huge apartment complex in Houston, she was asked to run it. All was well until a member of the maintenance crew resigned. She continued to keep him on the payroll and pocketed his wages. She later added a non-existent assistant once she saw how easy it was to add an employee without being questioned. However, her scheme eventually came to light, and her days of bonus pay were over. What was her motivation for stealing? A. Her boyfriend, a professional motocross racer, was injured in a race. B. She was getting married and needed money for the wedding. C. She blew the engine in her car and didn’t have the money to replace it. D. She wanted to pay off her college loan early so she could save for a house. Question 23 of 25 Score: 1.2 (of possible 1.2 points) Jim Stevens is a payroll manager for a mid-sized insurance company in the southeast. Last year, his performance review was conducted late, so he received a retroactive pay increase. Because he was not authorized to access his own employee records, Stevens stole another employee’s password and logged into the payroll system. He manipulated his records to keep the retroactive pay increase in effect in future periods, effectively doubling his intended pay raise. What type of fraud is this? A. Larceny of wages B. Falsified hours and salary scheme C. Commission scheme D. Ghost employee scheme Answer Key: B Question 24 of 25 Score: 1.2 (of possible 1.2 points) Which of the following analyses can be used to identify ghost employee schemes? A. Identifying employees who have no withholding taxes taken out B. Comparing actual payroll expenses to budgeted expenses C. Comparing employees who have the same Social Security number, bank account, or physical address D. All of the above Question 25 of 25 Score: 1.2 (of possible 1.2 points) Which of the following computer audit tests can be used to detect ghost employee schemes? A. Extract users who can write checks and also add new employees in the payroll and timecard system. B. Extract all employees without a social security number. C. Compare employees reported per timecard system to the payroll system. D. All of the above Chapter 07 Quiz Total Grade: 30 (of possible 30 points) Question 1 of 25 Score: 1.2 (of possible 1.2 points) Kevin Chitry, a sales executive for CIT Manufacturing, frequently took clients out for dinner and shows when they came to town to tour the plant. He usually paid for these expenses himself and submitted the receipts to his supervisor for approval and reimbursement. Occasionally, however, he also took his family out to restaurants and rock concerts and included these expenses in his reimbursement requests by indicating that he was entertaining a client. This type of fraud is known as a(n): A. Overstated expense reimbursement B. Mischaracterized expense reimbursement C. Fictitious expense reimbursement D. Altered receipt reimbursement Answer Key: B Question 2 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Cy Chesterly was the vice president in charge of sales for one of the largest machine parts manufacturers in the Midwest. He was an excellent salesman and helped build the company into one of the most successful in the industry. While Chesterly was known to go overboard on the entertainment expenses, he really went wild when it came to buying personal items—vacations, furniture, and jewelry to name a few. What other frauds turned up in the investigation? A. Chesterly put his girlfriend on the payroll as a ghost employee. B. Chesterly skimmed some of the cash sales. C. Chesterly falsified sales figures to collect unearned bonuses. D. Chesterly cut special deals to his customers and received kickbacks in return. Question 3 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, expense reimbursement schemes have a lower median loss than check tampering schemes. True False Question 4 of 25 Score: 1.2 (of possible 1.2 points) What type of expense reimbursement scheme occurs when an employee submits a receipt for an entertainment expense that a client paid for? A. Mischaracterized expense reimbursement B. Overstated expense reimbursement C. Fictitious expense reimbursement D. Duplicate reimbursement scheme Question 5 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Cy Chesterly was the vice president in charge of sales for one of the largest machine parts manufacturers in the Midwest. He was an excellent salesman and helped build the company into one of the most successful in the industry. While Chesterly was known to go overboard on the entertainment expenses, he really went wild when it came to buying personal items—vacations, furniture, and jewelry to name a few. How was he caught? A. He purchased one too many high-ticket items for his son and this was brought to the attention of the CEO. B. A new president was hired and he found Chesterly out while reviewing the accounting records. C. Chesterly became ill and the receipts for personal items were found while he was out sick. D. The internal auditors found Chesterly out during an audit of his cost center’s expenses. Answer Key: B Question 6 of 25 Score: 1.2 (of possible 1.2 points) Expense reimbursement schemes include which of the following? A. Multiple reimbursements B. Mischaracterized expenses C. Overstated expenses D. All of the above Question 7 of 25 Score: 1.2 (of possible 1.2 points) Which of the following methods can be used to perpetrate a fictitious expense reimbursement scheme? A. Creating counterfeit receipts B. Stealing blank receipts C. Submitting expenses that were paid by a third party D. All of the above Question 8 of 25 Score: 1.2 (of possible 1.2 points) Which of the following is not considered a red flag of a fictitious expense reimbursement scheme? A. An employee repeatedly uses the company credit card for business travel expenses. B. An employee’s reimbursement requests are always for round-dollar amounts. C. An employee submits reimbursement requests that consistently fall just below the reimbursement limit. D. An employee frequently requests reimbursement for high-dollar items that he claims were paid for in cash. Question 9 of 25 Score: 1.2 (of possible 1.2 points) Daisy McMillan works as the office manager for Timball and Lewis, a medium-sized law firm. One afternoon, she went to the hardware store to purchase a few maintenance items for the office. While there, she also bought her husband a hammer as a birthday present. At the register, the items, including the hammer, totaled $63. She paid for all the items together and received both a carbon copy receipt and a separate credit card receipt. Back at the office, she carefully scratched additional numbers on to the carbon copy receipt to increase the total price to $168 and turned in the altered receipt for reimbursement. Several weeks later, she turned in the credit card receipt along with another reimbursement request for the $63. What type of expense reimbursement fraud did she commit? A. Overstated expense reimbursement B. Multiple reimbursements C. Mischaracterized expense reimbursement D. All of the above Question 10 of 25 Score: 1.2 (of possible 1.2 points) Because they leave a solid audit trail, expense reimbursement schemes are generally easier to detect than other types of fraud schemes. True False Question 11 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Marcus Lane, a geologist for an environmental management and engineering services firm, traveled all over North and South America as part of his job, resulting in numerous expense reimbursements. Unfortunately, Lane went too far and began to double book his air travel using his personal credit card. He booked two separate flights to the same location, but with a huge cost difference. He used the cheaper ticket for the actual flight and returned the more expensive ticket for credit. And, of course, he submitted the more expensive ticket for reimbursement. How was he punished? A. He was convicted of grand theft and received probation. B. He resigned from the company and a civil suit was filed against him. C. He was terminated and agreed to pay the money back. D. He was allowed to resign and the company agreed not to seek a refund if it was kept quiet. Question 12 of 25 Score: 1.2 (of possible 1.2 points) Which of the following procedures can be used to detect mischaracterized expense reimbursement schemes? A. Compare the dates of claimed reimbursable business expenses to the employees’ work schedules. B. Compare current expense reimbursement levels to amounts for prior years. C. Compare current expense reimbursement levels to budgeted amounts. D. All of the above Question 13 of 25 Score: 1.2 (of possible 1.2 points) To safeguard against expense reimbursement schemes, organizations should require that employee expense reports be reviewed and approved by a supervisor outside the requestor’s department. True False Question 14 of 25 Score: 1.2 (of possible 1.2 points) Claiming personal travel as a business expense is an example of what type of expense reimbursement scheme? A. Multiple reimbursements B. Overstated expense reimbursements C. Mischaracterized expense reimbursements D. Altered expense reimbursements Question 15 of 25 Score: 1.2 (of possible 1.2 points) Permitting employees to book their own travel using their own credit card is an effective internal control over expense reimbursement schemes. True False Question 16 of 25 Score: 1.2 (of possible 1.2 points) An altered or forged receipt can indicate what type of expense reimbursement scheme? A. Mischaracterized expense reimbursements B. Fictitious expense reimbursements C. Overstated expense reimbursements D. All of the above Question 17 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Marcus Lane, a geologist for an environmental management and engineering services firm, traveled all over North and South America as part of his job, resulting in numerous expense reimbursements. Unfortunately, Lane went too far and began to double book his air travel using his personal credit card. He booked two separate flights to the same location, but with a huge cost difference. He used the cheaper ticket for the actual flight and returned the more expensive ticket for credit. And, of course, he submitted the more expensive ticket for reimbursement. How was his scheme detected? A. The internal auditor discovered it during a routine audit of expense reimbursements. B. The department’s administrative assistant took a message from the travel agency about a trip that she knew Lane didn’t take. C. Lane’s manager received an anonymous tip. D. The external auditors discovered it while sampling expenses during their annual audit. Question 18 of 25 Score: 1.2 (of possible 1.2 points) As the manager of a local auto-parts store, Manny Ortega was responsible for reimbursing employees when they purchased supplies for the store with their own money. When employees brought Ortega their receipts for reimbursement, he would often alter the receipts to show a larger amount. Then he would ring a “no sale” on the cash register, remove the full amount per the altered receipt, and pocket the excess. Because the employee received the expected amount and the register totals remained in balance, Ortega was able to continue this scheme for nearly 2 years before being caught. What type of fraud did Ortega commit? A. Overstated expense reimbursement scheme B. Mischaracterized expense reimbursement scheme C. Register disbursement scheme D. None of the above Question 19 of 25 Score: 1.2 (of possible 1.2 points) Charlene DiAngelo is a sales manager for Northwest Paper & Plastics. On April 11, she took some clients out for a business lunch to discuss a potential contract. When she returned to the office, she made a photocopy of her restaurant receipt. Using correction fluid, she changed the date on the photocopy to read June 11. She submitted the original restaurant receipt with a reimbursement request on April 11 and held on to the photocopy for 2 months. On June 12, she submitted the altered photocopy along with a second reimbursement request. What type of fraud scheme did DiAngelo commit? A. Altered receipt B. Fictitious expense reimbursement C. Billing D. Multiple reimbursement Question 20 of 25 Score: 1.2 (of possible 1.2 points) Donna Holbrook, an administrative assistant at Mason Enterprises, charged some office supplies to the company credit card. Several weeks later, she attached the store receipt from the purchase to an expense report and requested reimbursement from the company. This is an example of which type of expense reimbursement scheme? A. Overstated expense B. Multiple reimbursement C. Mischaracterized expense D. Over-purchased reimbursement Answer Key: B Question 21 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, expense reimbursement schemes are the least common type of fraudulent disbursement schemes. True False Question 22 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Cy Chesterly was the vice president in charge of sales for one of the largest machine parts manufacturers in the Midwest. He was an excellent salesman and helped build the company into one of the most successful in the industry. While Chesterly was known to go overboard on the entertainment expenses, he really went wild when it came to buying personal items—vacations, furniture, and jewelry to name a few. He was caught, however, and his lifestyle came to a halt. What was the most likely reason that the company didn’t have Chesterly prosecuted? A. Chesterly was well liked by everyone and, with new management coming in, the company thought that prosecuting him would have a negative impact on morale. B. Chesterly’s wife became seriously ill and the company felt that it would have been too much of a blow to her recovery if he were in prison. C. Some of the company’s customers were believed to have been involved in Chesterly’s schemes. D. He agreed to mortgage his home to repay the money. Question 23 of 25 Score: 1.2 (of possible 1.2 points) Which of the following procedures can be used to prevent mischaracterized expense reimbursement schemes? A. A policy should be established and communicated to employees regarding what types of expenses will and will not be reimbursed. B. Employees should be required to sign their expense reports before being reimbursed. C. The internal audit department should review all expense reports under a certain dollar amount. D. None of the above Question 24 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Marcus Lane, a geologist for an environmental management and engineering services firm, traveled all over North and South America as part of his job, resulting in numerous expense reimbursements. Unfortunately, Lane went too far and began to double book his air travel using his personal credit card. He booked two separate flights to the same location, but with a huge cost difference. He used the cheaper ticket for the actual flight and returned the more expensive ticket for credit. And, of course, he submitted the more expensive ticket for reimbursement. What changes to internal controls were made as a result of Lane’s fraud? A. Enforcement of a new policy that business expenditures other than travel be charged to personal credit cards only B. Clarification and better enforcement of the policy that all travel be booked through the company travel agent using a designated company credit card C. Enforcement of a new policy that employees submit their travel expense reports for reimbursement within five days of returning from a trip D. All of the above Answer Key: B Question 25 of 25 Score: 1.2 (of possible 1.2 points) If an employee submits a photocopy of a receipt as support for a business expense, the expense should be independently verified before it is reimbursed. True False Chapter 08 Quiz Total Grade: 28.8 (of possible 30 points) Question 1 of 25 Score: 1.2 (of possible 1.2 points) When an employee perpetrates a credit card refund scheme, the perpetual inventory will show a greater amount than the physical inventory. True False Question 2 of 25 Score: 1.2 (of possible 1.2 points) Register disbursement schemes are difficult to conceal because they cause the cash drawer to be out of balance with the cash register tape. True False Question 3 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Bob Walker was the head cashier for a discount drug store who perpetrated his fraud scheme by issuing fictitious refunds. What was Walker’s motive for committing the crime? A. His wife became ill and needed money to pay for prescription drugs. B. He had been demoted from a management position and wanted to get back at the store. C. He lost a lot of money gambling and was too embarrassed to tell his wife. D. He had accumulated nearly $60,000 in credit card debt and was about to lose his house. Answer Key: B Question 4 of 25 Score: 1.2 (of possible 1.2 points) For the perpetrator, the most dangerous part of a typical register disbursement scheme is often: A. Physically removing the cash from the register and carrying it out of the store B. Adjusting the cash register tape to match the cash count C. Replacing the returned merchandise in the physical inventory D. Forging the customer receipt as documentation for the reversing transaction Question 5 of 25 Score: 1.2 (of possible 1.2 points) Which of the following can be used to conceal a false refund scheme? A. Destroying register tapes B. Issuing refunds below the review limit C. Forcing inventory totals D. All of the above Question 6 of 25 Score: 0 (of possible 1.2 points) According to the textbook, the best way for an organization to prevent fraudulent register disbursements is to: A. Have each employee compare the cash in his or her register drawer to the register tape at the end of each shift. B. Maintain appropriate separation of duties. C. Have a policy requiring photocopied receipts for sales refunds. D. All of the above Answer Key: B Question 7 of 25 Score: 1.2 (of possible 1.2 points) Which of the following tests can be used to detect register disbursement schemes? A. Extract the top 10 employees with the lowest sales activity. B. Identify and examine unique journal entries in the cash accounts. C. Identify customer sales posted to one credit card and refunds posted to another credit card. D. None of the above Question 8 of 25 Score: 1.2 (of possible 1.2 points) Nicolas Barrens conspired with his manager to steal nearly $6,000 over 2 months from the grocery store where they worked. Each time Nicolas rang up a customer at the register, he asked the customer if he’d like a receipt. When a customer said no, Nicolas pretended to discard the receipt in the trash, but actually slipped the receipt into his pocket. At the end of his shift, he filled out a void slip for each of these sales and submitted them to his supervisor for approval. With the original receipt and the approved void slip, Nicolas removed cash from the register in the amount of the voided sales and split the proceeds with his supervisor. Nicolas committed what type of fraud scheme? A. Fictitious expenses B. False voids C. Skimming D. None of the above Answer Key: B Question 9 of 25 Score: 1.2 (of possible 1.2 points) Which of the following is a type of register disbursement scheme? A. Fictitious refunds B. Overstated refunds C. False voids D. All of the above Question 10 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, register disbursement schemes were the most frequently reported type of fraudulent disbursement scheme. True False Question 11 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Bob Walker was the head cashier for a discount drug store who perpetrated his fraud scheme by issuing fictitious refunds. What happened to Walker? A. He was placed on probation and ordered to make full restitution. B. The store terminated his employment and accepted a promissory note for the amount stolen in return for not turning him over to the police. C. His parole for a previous conviction was revoked and he was returned to prison. D. He was arrested, but disappeared after making bail. Question 12 of 25 Score: 1.2 (of possible 1.2 points) Register disbursement schemes are different from skimming and larceny at the register in that they: A. Are on-book schemes, where as skimming and larceny are off-book schemes B. Require the use of an accomplice C. Leave a record of the removal of money on the register tape D. All of the above Question 13 of 25 Score: 1.2 (of possible 1.2 points) In one of the cases in the textbook, Joe Anderson, a part-time shoe salesperson at a department store, perpetrated a fictitious returns scheme using third-party credit cards. Why was a fraud examination initiated? A. Another employee witnessed Anderson pocketing cash and reported the incident. B. The shoe department was losing money and had a high rate of returns on its shoes. C. The store’s surveillance camera caught Anderson pocketing the money. D. Anderson credited the wrong account and the customer called up to inquire as to why her credit card had been credited. Answer Key: B Question 14 of 25 Score: 1.2 (of possible 1.2 points) Sara Michaels works as a sales associate in the shoe department at a large chain department store. To supplement her income, Sara processed multiple fictitious refunds on sales made to customers. This is an example of what type of asset misappropriation? A. Register disbursement fraud B. Pay and return scheme C. Skimming scheme D. Cash larceny scheme Question 15 of 25 Score: 1.2 (of possible 1.2 points) Billy Mitchell is the head cashier for a clothing store that specializes in men’s silk suits. After losing big at the local dog track, Billy was in the hole financially. To cover his gambling debts, he started issuing numerous refund credits to his own credit card for amounts just below the store’s review limit. This is an example of a __________________ scheme. A. Cash larceny B. Credit card skimming C. Fictitious refunds D. Understated reimbursement Question 16 of 25 Score: 1.2 (of possible 1.2 points) Running a computer program that compares adjustments to inventory to the void/refund transactions summarized by employee can detect which of the following schemes? A. Register disbursement schemes B. Cash larceny schemes C. Skimming schemes D. All of the above Question 17 of 25 Score: 1.2 (of possible 1.2 points) In one of the cases in the textbook, Joe Anderson, a part-time shoe salesperson at a department store, perpetrated a fictitious returns scheme using third-party credit cards. What happened as the result of the investigation? A. Anderson was terminated and promised to pay back all the fraudulent proceeds. B. The department store recovered most of its losses through its bonding company. C. Local and federal charges for embezzlement and financial transaction card fraud were brought against Anderson and 27 co-conspirators. D. All of the above Question 18 of 25 Score: 1.2 (of possible 1.2 points) Greg Manor is the sales manager at County Arts & Crafts Supply. Recently he has received several complaints from customers who claim they were not given a receipt for their purchases. What type of scheme might this situation indicate? A. Skimming B. False refunds C. False voids D. All of the above Question 19 of 25 Score: 1.2 (of possible 1.2 points) An excessive number of reversing sales transactions at the register is an indicator of which of the following schemes? A. Skimming B. Register disbursement C. Pass-through scheme D. Multiple reimbursements Answer Key: B Question 20 of 25 Score: 1.2 (of possible 1.2 points) In one of the case studies in the textbook, Bob Walker was the head cashier for a discount drug store who perpetrated his fraud scheme by issuing fictitious refunds. How was the fraud discovered? A. The bookkeeper noticed an unusually large number of policy overrides by Walker. B. The internal auditor developed a computer program that identified cashiers with an unusually high number of returns. C. The store manager caught Walker pocketing cash. D. An anonymous tip from the company’s hotline came into the asset protection department. Question 21 of 25 Score: 1.2 (of possible 1.2 points) Which of the following procedures can be used to prevent and detect a register disbursement scheme? A. Randomly call customers who have returned merchandise or voided sales. B. Restrict access to the control key or management code that authorizes reversing transactions. C. Place signs around the store encouraging customers to ask for and examine their receipts. D. All of the above Question 22 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, median losses due to register disbursement schemes were the highest of all the fraudulent disbursement schemes. True False Question 23 of 25 Score: 1.2 (of possible 1.2 points) Meredith Chapman works as a retail clerk at a children’s clothing store. When a customer returns an item for a cash refund, Meredith enters an amount greater than the actual refund into the register, pays the customer the amount owed for the returned merchandise, and keeps the excess cash for herself. What type of scheme is Meredith committing? A. Overstated expenses B. Cash larceny C. Overstated refunds D. Skimming Question 24 of 25 Score: 1.2 (of possible 1.2 points) To safeguard against false voids schemes, companies should require a copy of the customer’s receipt from the initial purchase as documentation for voided sales. True False Question 25 of 25 Score: 1.2 (of possible 1.2 points) Leslie White, CFE, was called in to investigate suspicious activity at Anderson’s Department Store. During her investigation, she ran a test to search for customer sales and refunds that occurred on the same day. She also summarized refunds by employee and extracted the names of all employees who can post both refunds and inventory adjustments. What type of scheme is Leslie most likely looking for? A. Skimming B. Unconcealed larceny C. Fraudulent reimbursements D. Fictitious refunds Chapter 09 Quiz Total Grade: 28.8 (of possible 30 points) Question 1 of 25 Score: 1.2 (of possible 1.2 points) Of the following, which is the best method for detecting the theft of inventory? A. Have the warehouse manager personally oversee bi-monthly inventory counts. B. Have someone from purchasing conduct inventory counts every quarter. C. Have a designated person in customer service follow-up with customers who have complained about short shipments. D. Match vendor addresses against employee addresses. Question 2 of 25 Score: 1.2 (of possible 1.2 points) Andy Kaplan is a foreman for JCP Enterprises, a regional construction company. He recently ordered some plumbing supplies from the company warehouse for an office building project he is overseeing. When the supplies arrived at the job site, however, he loaded them in his truck and took them home to use in remodeling his master bathroom. What kind of inventory theft scheme did Andy commit? A. False shipments B. Unconcealed larceny C. Asset requisition D. Misappropriation of intangible assets Question 3 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, non-cash schemes occur more frequently than cash schemes. True False Question 4 of 25 Score: 1.2 (of possible 1.2 points) Running a computer program that identifies shipping documents with no associated sales order can detect which of the following non-asset cash misappropriation schemes? A. False shipments B. Purchasing and receiving schemes C. Unconcealed inventory larceny D. Asset requisition schemes Question 5 of 25 Score: 1.2 (of possible 1.2 points) Manually altering entries in an organization’s books in order to conceal fraud is called: A. Padding the books B. Forced reconciliation C. Shrinkage D. Fictitious reconstruction Answer Key: B Question 6 of 25 Score: 1.2 (of possible 1.2 points) An employee causes his organization to purchase merchandise that it does not need. This is an example of what type of scheme? A. Purchasing and receiving scheme B. False billing scheme C. Unconcealed larceny scheme D. Asset requisition scheme Answer Key: B Question 7 of 25 Score: 1.2 (of possible 1.2 points) In one of the cases in the textbook, Larry Gunter was a shipping clerk for a computer company that manufactured microprocessor chips. After learning that the chips were valuable, he stole three boxes and sold them to his girlfriend’s father. Since the scheme worked so well the first time, he continued stealing and selling the chips, even letting a co-worker in on the scheme. How was Gunter punished? A. He was arrested, charged with grand theft and embezzlement, and sentenced to prison. B. He was indicted for receiving stolen property, placed on probation, and ordered to repay the company for the value of the stolen chips. C. The company fired him but agreed not to prosecute him if he repaid the money and did not go to the media. D. He wasn’t, because he found out about the investigation and skipped town on the day he was to be arrested. Question 8 of 25 Score: 1.2 (of possible 1.2 points) Unexplained increases in inventory shrinkage can be a red flag that signals which type of fraud scheme? A. Fictitious refunds B. Inventory larceny C. Sales skimming D. All of the above Question 9 of 25 Score: 1.2 (of possible 1.2 points) Which of the following computer audit tests can be used to detect an inventory misappropriation scheme? A. Identifying inventory receipts in the receiving system that do not agree to the receipts per the accounts payable system B. Identifying inventory shipments delivered to an address that is not designated as a business address C. Identifying inventory with a negative quantity balance D. All of the above Question 10 of 25 Score: 1.2 (of possible 1.2 points) An unexplained increase in uncollectible accounts receivable may be a warning sign of a noncash asset misappropriation scheme involving false shipments of inventory. True False Question 11 of 25 Score: 1.2 (of possible 1.2 points) To deter inventory theft schemes, organizations should install security cameras in the warehouses without the employees’ knowledge. True False Question 12 of 25 Score: 1.2 (of possible 1.2 points) To supplement her income, Jeanne Lester decided to start her own bookkeeping business while still working as an office assistant at Howe & Lyon, a small CPA firm. Not having much start-up capital for her new business, she used her phone at work to contact clients and her work computer to print invoices and client letters. However, she ordered and paid for her own office supplies and used her own postage stamps to mail the invoices and letters. From the information given, has Jeanne misappropriated any of the firm’s assets? A. Yes B. No Question 13 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, the theft of which type of non-cash asset was the least common but caused the highest median loss? A. Equipment B. Proprietary information C. Securities D. Inventory Question 14 of 25 Score: 1.2 (of possible 1.2 points) The unaccounted-for reduction in the company’s inventory that results from theft is called: A. Physical defalcation B. Spoilage C. Shrinkage D. Misappropriation of intangible assets Question 15 of 25 Score: 1.2 (of possible 1.2 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, cash schemes have a higher median loss than non-cash schemes. True False Question 16 of 25 Score: 1.2 (of possible 1.2 points) In one of the cases in the textbook, Swainler’s Technology discovered that someone had stolen 1,400 hard drives from its computer warehouse. In order to collect on its theft insurance policy, the company had to show that the theft was an outside job. Before the insurance company paid Swainler’s claim, it hired an independent investigator, who ultimately found that the hard drives were stolen and sold by Swainler’s marketing manager, Frederic Boucher. Which of the following control weaknesses were present in the company? A. Because the company was run primarily on trust, many transactions were conducted without any documentation or controls. B. The surveillance cameras on the loading dock didn’t work. C. Background checks were required only on senior executives and accounting personnel. D. All of the above Question 17 of 25 Score: 1.2 (of possible 1.2 points) Which of the following is not a method used to conceal false shipments of inventory? A. Creating false sales orders B. Falsely increasing the perpetual inventory C. Writing off the inventory as scrap D. Physical padding Answer Key: B Question 18 of 25 Score: 1.2 (of possible 1.2 points) Borrowing a company asset for personal use without permission, even if it is returned unharmed, is a form of non-cash asset misappropriation. True False Question 19 of 25 Score: 1.2 (of possible 1.2 points) Ace Electronics is a company that sells computers, televisions, home entertainment centers, DVD players, and other electronic equipment. A downturn in the market has caused severe financial problems in the company. In order to fool the auditors as they begin their inventory count, several of Ace’s managers have begun stacking empty boxes in the warehouse to create the illusion of extra inventory. This scheme is known as: A. Forced reconciliation B. Physical padding C. Inventory shuffling D. Misappropriation of intangible assets Answer Key: B Question 20 of 25 Score: 1.2 (of possible 1.2 points) In one of the cases in the textbook, Larry Gunter was a shipping clerk for a computer company that manufactured microprocessor chips. After learning that the chips were valuable, he stole three boxes and sold them to his girlfriend’s father. Since the scheme worked so well the first time, he continued stealing and selling the chips, even letting a co-worker in on the scheme. How was the theft discovered? A. A security guard found the chips in a routine check of his work cart. B. An inventory manager filling an order noticed that many of the chips were missing. C. The auditors found the shortage when they conducted the annual inventory count. D. His co-worker notified the loss prevention department in exchange for a cash award. Answer Key: B Question 21 of 25 Score: 1.2 (of possible 1.2 points) Which of the following is not a red flag in a fraudulent shipment scheme? A. An increase in bad debt expense B. An unexplained decrease in the scrap account C. Unusually high levels of reorders for inventory items D. Shipments with missing sales documents Answer Key: B Question 22 of 25 Score: 0 (of possible 1.2 points) To prevent fraudulent shipments of merchandise, organizations should: A. Match every receiving slip to an approved purchase order. B. Match every outgoing shipment to a sales order. C. Make sure that all increases to perpetual inventory records are supported by proper source documents. D. All of the above Answer Key: B Question 23 of 25 Score: 1.2 (of possible 1.2 points) Which of the following procedures would be least helpful in preventing larceny of non-cash assets? A. Segregating the duties of sales and accounts payable B. Installing surveillance cameras in the warehouse and on sales floors C. Creating access logs to track employees that enter restricted areas D. Employing security guards at the entrance of the warehouse Question 24 of 25 Score: 1.2 (of possible 1.2 points) Ben Rogers works as a cashier for Tillis Sporting Goods. One afternoon, he asked his sister Dawn to come into the store. When she arrived, Ben put three watches, two fishing reels, and four pairs of sunglasses in a sack and gave it to her. Dawn walked out of the store, sold two of the watches, and returned to the store later to return the other items for a refund. What type of asset misappropriation has been committed? A. Sales skimming B. Pay-and-return scheme C. False refund scheme D. Inventory larceny scheme Question 25 of 25 Score: 1.2 (of possible 1.2 points) Which of the following methods can be used to conceal inventory shrinkage on a company’s books? A. Creating fictitious sales and receivables B. Writing off inventory as obsolete C. Physical padding D. All of the above 1 of 1 Chapter 10 Quiz Total Grade: 28 (of possible 30 points) Question 1 of 30 Score: 1 (of possible 1 point) ___________________ is the offering, giving, receiving, or soliciting of something of value as a reward for a favorable decision. A. Business diversion B. Economic extortion C. Illegal gratuity D. Commercial bribery Question 2 of 30 Score: 1 (of possible 1 point) In one of the case studies in the textbook, Rita Mae King was a purchasing agent at an electronics and appliance chain. She frequently worked with travel vendors and managed to put Spicewood Travel on the top of the preferred vendor list. Upon investigation, the fraud examiners discovered that she ran her own travel agency out of her office at the store and received kickbacks from Spicewood Travel in return for having her company use them to book trips. Why didn’t the company pursue legal action against King? A. The company didn’t want the publicity so they quietly let her resign. B. The vice president of loss prevention recommended against criminal action because of King’s age and her husband’s ill health. C. There was not enough evidence to pursue a conviction. D. Spicewood Travel agreed to reimburse the company for overcharges if they wouldn’t pursue criminal action against King. Answer Key: B Question 3 of 30 Score: 1 (of possible 1 point) Which of the following schemes can be detected by identifying vendor addresses that are not designated as a business address? A. Shell company schemes B. Kickback schemes C. Conflicts of interest D. All of the above Question 4 of 30 Score: 1 (of possible 1 point) Which of the following is not a type of corruption scheme? A. Bribery B. Conflict of interest C. Illegal gratuities D. Concealed payments Question 5 of 30 Score: 1 (of possible 1 point) A corruption scheme in which several bidders conspire to split contracts, thereby ensuring that each gets a certain amount of work, is known as: A. Bid pooling B. Bid rigging C. Bid division D. Bid diversion Question 6 of 30 Score: 1 (of possible 1 point) Which of the following would likely not be a potential target for accepting bribes in a big-rigging scheme? A. A product assurance representative B. An accounts payable clerk C. A contracting official D. The engineer in charge of the project’s technical specifications Answer Key: B Question 7 of 30 Score: 1 (of possible 1 point) Fred Weaver is the contracts manager for a city government. In order for anyone to do business with the municipality, he or she must pay Fred 10 percent of the total amount of the contract. This type of corruption is known as: A. Bribery B. Economic extortion C. A conflict of interest D. Bid-rigging Answer Key: B Question 8 of 30 Score: 1 (of possible 1 point) The typical bid-rigging scheme committed during the need recognition phase of the contract negotiation process involves defining a “need” that can be met only by a certain supplier or contractor. True False Question 9 of 30 Score: 0 (of possible 1 point) To safeguard against kickback schemes, which of the following procedures should an organization implement? A. Have an employee in the purchasing department review the organization’s payment patterns on a quarterly basis. B. Establish a written policy specifying that employees cannot accept more than $500 annually in gifts from customers or suppliers. C. Prohibit employees from engaging in any transaction on behalf of the organization when they have an undisclosed personal interest in the transaction. D. All of the above Question 10 of 30 Score: 1 (of possible 1 point) If a government employee agrees to award a contract to a vendor in exchange for a promise of future employment, this is considered to be an illegal gratuity. True False Question 11 of 30 Score: 1 (of possible 1 point) Abe Wilson works as a city councilman in large city on the east coast. As part of his duties, he negotiated the purchase of some land in order to build a new water treatment plant for the city. The land was sold to the city by Jake Bryan for terms that were favorable to the city. After the sale was finalized, Bryan treated Abe and his wife to an all-expenses-paid Alaskan cruise. This type of fraud is known as: A. A conflict of interest B. Bribery C. An illegal gratuity D. Economic extortion Question 12 of 30 Score: 1 (of possible 1 point) Julius Smith is a purchasing agent for a Louisiana state agency. He has a project budgeted for $24,000 that he would like to hire RGS Consultants to handle. Unfortunately for Julius and RGS Consultants, the state has a requirement that all projects over $10,000 must be sent out for competitive bids. In order to avoid the bidding process, Julius breaks the project into three component projects worth $8,000 each. RGS Consultants is subsequently awarded the contracts for all three projects. What type of bid-rigging scheme is this? A. Bid pooling B. Underbidding C. Bid splitting D. Bid diversion Question 13 of 30 Score: 1 (of possible 1 point) To facilitate a bribery scheme, a fraudster might divert company funds to a non-company account from which the illegal payments can be made. This account is called a: A. Slush fund B. Petty cash fund C. Bid pool D. None of the above Question 14 of 30 Score: 1 (of possible 1 point) Identifying trends in over-purchased and/or obsolete inventory over several periods is a proactive computer audit test that can be used to detect which of the following schemes? A. False purchases B. Corruption C. Overstated expenses D. None of the above Answer Key: B Question 15 of 30 Score: 1 (of possible 1 point) The offering, giving, receiving, or soliciting of something of value for the purpose of influencing a business decision without the knowledge or consent of the principal is known as: A. Official bribery B. Commercial bribery C. Conflict of interest D. Illegal gratuity Answer Key: B Question 16 of 30 Score: 1 (of possible 1 point) Johanna Pye is a hair stylist at Mamon Salon. The salon’s policy states that stylists receive 40 percent of the revenue they generate as their compensation. Johanna grew tired of sharing her income with the salon and decided she wanted to make more money. She continued seeing her existing clients at the salon, but when new clients called for an appointment, Johanna lied and told them the salon was completely booked for the next few months. She then offered to come to their homes and cut their hair for 10 percent less than what the clients would be charged at the salon. She did not report the house call appointments to the salon, and was therefore able to keep all the income she generated from these side clients. This is an example of what type of scheme? A. Shell company B. Resource diversion C. Business diversion D. Double dealing Question 17 of 30 Score: 1 (of possible 1 point) To deter kickback schemes, an organization should implement which of following procedures? A. Separate the purchasing, authorization, and cash disbursements functions. B. Track purchase levels by vendor. C. Compare the prices paid for goods and services to market rates. D. All of the above Question 18 of 30 Score: 1 (of possible 1 point) The primary approach for preventing conflicts of interest schemes is to develop and implement which of the following? A. A voucher system B. A company ethics policy C. A document retention program D. An anonymous reporting mechanism to receive tips and complaints Answer Key: B Question 19 of 30 Score: 1 (of possible 1 point) Extracting round-dollar payments and summarizing them by vendor can help detect both corruption and billing schemes. True False Question 20 of 30 Score: 1 (of possible 1 point) Which of the following is a red flag that might indicate that a bid-rigging scheme is occurring? A. The contract price is unusually low. B. A high bid is followed by amendments that reduce the payments to the contractor. C. The losing bidders become sub-contractors on the project. D. Many more bidders responded to the request for proposals than expected. Question 21 of 30 Score: 1 (of possible 1 point) In one of the case studies in the textbook, Rita Mae King was a purchasing agent at an electronics and appliance chain. She frequently worked with travel vendors and managed to put Spicewood Travel on the top of the preferred vendor list. Upon investigation, the fraud examiners discovered that she ran her own travel agency out of her office at the store and received kickbacks from Spicewood Travel in return for having her company use them to book trips. What triggered the investigation of Rita Mae King’s activities? A. Her supervisor found an invoice for a trip that she booked showing she received an employee discount from Spicewood Travel. B. An employee from Spicewood Travel called King’s office and left an urgent message for King to call them concerning a travel problem with a group she booked to the Cayman Islands. C. Another employee of her company found a business card that she had left in a fishbowl for a drawing showing that she was an employee of Spicewood Travel. D. Her former boyfriend called the loss prevention department’s hotline and informed them that she was receiving kickbacks from Spicewood Travel. Question 22 of 30 Score: 1 (of possible 1 point) In one of the case studies in the textbook, the General Services Administration (GSA), the federal government’s bookkeeping agency, purchased more than $200 million worth of defective and useless furniture from a New Jersey furniture manufacturer. After reviewing the books of the furniture manufacturer, it was clear that the company was paying off GSA inspectors. What happened to the furniture manufacturing company? A. It was charged with making false certifications and fined $2 million. B. It lost its contract with the GSA and went bankrupt. C. It was bought by another company. D. All of the above Answer Key: B Question 23 of 30 Score: 1 (of possible 1 point) In one of the case studies in the textbook, the General Services Administration (GSA), the federal government’s bookkeeping agency, purchased more than $200 million worth of defective and useless furniture from a New Jersey furniture manufacturer. After reviewing the books of the furniture manufacturer, it was clear that the company was paying off GSA inspectors. The investigators eventually focused on one particular regional inspector because: A. He vacationed in Europe with the vendor and charged the trip back to the government as a business related trip. B. He paid cash for a new home on the Jersey shore. C. He purchased eleven race horses. D. He had credit card charges of more than twice his annual salary during a six-month period. Question 24 of 30 Score: 1 (of possible 1 point) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, schemes involving corruption were the least common of the three types of occupational fraud schemes. True False Question 25 of 30 Score: 1 (of possible 1 point) Donna Boyd is an internal auditor for GDP, Inc., an electronics manufacturer. While conducting a routine review of the company’s inventory costing, she discovers that the cost of one of the parts they use in manufacturing DVD players has been steadily increasing over the last six months and is now much higher than the general market price. Additionally, she notices that the company has been heavily favoring one specific supplier for that part. Based on these circumstances, what type of fraud scheme may be occurring at GDP? A. Kickbacks B. Conflict of interest C. Shell company D. Any of the above Question 26 of 30 Score: 0 (of possible 1 point) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, bribery schemes occurred more often than other types of corruption schemes. True False Question 27 of 30 Score: 1 (of possible 1 point) Matching the vendor master file to the employee master file is a proactive computer audit test that can be used to detect which type of fraud scheme(s)? A. Bribery B. Shell company C. Both bribery and shell company D. None of the above Question 28 of 30 Score: 1 (of possible 1 point) Stanley Block works in the IT department at Towery, Inc. After finding out that the company is planning to purchase four more computers for the accounting department, Stanley bought four computers from a friend for $1,200. Then, using his brother’s name and address as vendor information, he resold the computers to Towery for $2,300. This type of scheme is known as a(n): A. Over-purchase sale B. Resource diversion sale C. Double-sided sale D. Turnaround sale Question 29 of 30 Score: 1 (of possible 1 point) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, the median loss due to corruption schemes was the highest of the three types of occupational fraud schemes. True False Question 30 of 30 Score: 1 (of possible 1 point) John Clark works as a land buyer for a city government. After negotiating the purchase of a parcel of land to be used for a new library, he asked the seller out for a coffee date, and she accepted. This situation is an example of an illegal gratuity. True False Chapter 11 Quiz Total Grade: 29.97 (of possible 30 points) Question 1 of 27 Score: 1.11 (of possible 1.11 points) The civil and criminal protections for whistleblowers under Sarbanes-Oxley apply only to employees of publicly traded companies. True False Question 2 of 27 Score: 1.11 (of possible 1.11 points) Which of the following is a duty of the Public Company Accounting Oversight Board? A. Registering accounting firms that audit publicly traded companies B. Establishing or adopting standards relating to audits of publicly traded companies C. Enforcing compliance with professional standards and securities laws relating to public company audits D. All of the above Question 3 of 27 Score: 1.11 (of possible 1.11 points) According to COSO’s study, Fraudulent Financial Reporting, which of the following is the most likely to commit financial statement fraud? A. Organized criminals B. Mid-level employees C. The chief exective officer and/or chief financial officer D. Lower-level employees Question 4 of 27 Score: 1.11 (of possible 1.11 points) The financial statements for DRG Industries contain a misstatement that is so significant that reasonable investors would likely make a different investment decision if they were given the correct information. What concept of GAAP applies to this situation? A. Full disclosure B. Revenue recognition C. Materiality D. Cost-benefit Question 5 of 27 Score: 1.11 (of possible 1.11 points) Vanessa Armstrong was the chief financial officer for D&G Technologies, a publicly traded corporation. During the 20X1 fiscal year, she caused the company’s financial statements to violate reporting requirements by including a significant overstatement of revenue so that she would receive a large performance bonus. When her transgression came to light, the company was required to issue restated financial statements for 20X1. Under the provisions of SarbanesOxley, Vanessa must reimburse the company for any bonus she received during the 12 months after the 20X1 financials were initially filed. True False Question 6 of 27 Score: 1.11 (of possible 1.11 points) Senior management is most likely to understate business performance in the financial statements for which of the following reasons? A. To reduce the value of an owner-managed business for purposes of a divorce settlement B. To comply with loan covenants C. To increase the value of a corporate unit whose management is planning a buyout D. To trigger performance-related compensation or earn-out payments Question 7 of 27 Score: 1.11 (of possible 1.11 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, the most common type of occupational fraud is financial statement fraud. True False Question 8 of 27 Score: 1.11 (of possible 1.11 points) A company’s financial statements are the responsibility of: A. The independent auditors B. The shareholders C. The accounting department D. Management Question 9 of 27 Score: 1.11 (of possible 1.11 points) When a fraudster feeds fictitious information into the accounting system in order to manipulate reported results, this is called: A. Going outside the accounting system B. Beating the accounting system C. Going around the accounting system D. Playing the accounting system Answer Key: B Question 10 of 27 Score: 1.11 (of possible 1.11 points) The conservatism constraint for financial reporting states that, if there is any doubt, companies should aim to avoid overstating assets and income. True False Question 11 of 27 Score: 1.11 (of possible 1.11 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, losses due to financial statement frauds are higher than other occupational fraud schemes. True False Question 12 of 27 Score: 1.11 (of possible 1.11 points) Which of the following is not one of the provisions established under the Sarbanes-Oxley Act? A. Code of ethics for senior financial officers B. Management assessments of internal controls C. The creation of the Public Accounting Standards Board D. Criminal penalties for altering documents Question 13 of 27 Score: 1.11 (of possible 1.11 points) Fraudulent manipulation of the going concern assumption usually results from an organization trying to conceal its terminal business situation. True False Question 14 of 27 Score: 1.11 (of possible 1.11 points) Which of the following is not a reason that senior management would overstate business performance to meet certain objectives? A. To meet a lender’s criteria for granting/extending loan facilities B. To meet or exceed the earnings or revenue growth expectations of stock market analysts C. To reduce current expectations so that future growth will be better perceived and rewarded D. To increase the amount of financing available from asset-based loans Question 15 of 27 Score: 1.11 (of possible 1.11 points) The conceptual framework for financial reporting includes several assumptions that underlie generally accepted accounting principles. Which of the following is one of these assumptions? A. Economic entity B. Relevance C. Matching D. Comparability Question 16 of 27 Score: 1.11 (of possible 1.11 points) Investigating registered public accounting firms and their employees, conducting disciplinary hearings, and imposing sanctions where justified are duties of which of the following bodies? A. General Accounting Office’s Oversight Board B. Public Company Accounting Oversight Board C. AICPA’s Accounting Standards Board D. SEC’s Subcommittee on Corporate Governance Answer Key: B Question 17 of 27 Score: 1.11 (of possible 1.11 points) If a fraudster manipulates the assumptions used to calculate depreciation charges in order to increase earnings to a desired figure, which general method of financial statement fraud is the fraudster using? A. Going outside the accounting system B. Beating the accounting system C. Going around the accounting system D. Playing the accounting system Question 18 of 27 Score: 1.11 (of possible 1.11 points) Intentionally reporting product sales in the financial statements for the period prior to when they actually occurred is a violation of which generally accepted accounting principle? A. Periodicity B. Matching C. Historical cost D. Revenue recognition Question 19 of 27 Score: 1.11 (of possible 1.11 points) If a fraudster uses his computer to produce fictitious financial statements while completely ignoring the data in the accounting system, this is an example of what general financial statement fraud method? A. Beating the accounting system B. Playing the accounting system C. Going outside the accounting system D. None of the above Question 20 of 27 Score: 1.11 (of possible 1.11 points) Under Sarbanes-Oxley, chief executive officers and chief financial officers are required to personally certify annual and quarterly SEC filings. Which of the following is an item that they must certify in their reports? A. They have disclosed to the audit committee any material control weakness. B. The financial statements were prepared in conformity with GAAP. C. The company’s internal controls have prevented or detected all material instances of fraud during the last year. D. All of the above Question 21 of 27 Score: 1.11 (of possible 1.11 points) Which of the following is a reason that a chief executive officer might commit financial statement fraud? A. To receive or increase a performance bonus B. To avoid termination due to poor performance C. To conceal the company’s true performance D. All of the above Question 22 of 27 Score: 1.11 (of possible 1.11 points) The Sarbanes-Oxley Act placed restrictions on the types of services that public accounting firms are allowed to perform for audit clients. Which of the following services are public audit firms now expressly prohibited from performing for their audit clients? A. Quarterly review services B. Tax services C. Bookkeeping services D. All of the above Question 23 of 27 Score: 1.11 (of possible 1.11 points) Walden Industries is being sued by a former employee for wrongful termination. It is probable that the company will lose the case and be ordered to pay the plaintiff a significant sum of money. If Walden fails to report this information somewhere in its financial statements, it is violating the GAAP concept of: A. Materiality B. Full disclosure C. Matching D. Cost-benefit Answer Key: B Question 24 of 27 Score: 1.11 (of possible 1.11 points) As the result of the Sarbanes-Oxley Act, the Securities Exchange Commission has implemented which of the following rules? A. New standards of professional conduct for attorneys B. Insider trades during pension fund blackout periods C. Conditions for use of non-GAAP financial measures D. All of the above Question 25 of 27 Score: 1.11 (of possible 1.11 points) The Sarbanes-Oxley Act provides that members of the audit committee may receive compensation for consulting or advisory work only if approved by a majority of the board members. True False Question 26 of 27 Score: 1.11 (of possible 1.11 points) The term “financial statement” does not include a statement of cash receipts and disbursements, because this type of presentation violates the required use of accrual accounting under GAAP. True False Question 27 of 27 Score: 1.11 (of possible 1.11 points) Under Sarbanes-Oxley, pubic accounting firms must rotate the lead partner or the partner reviewing the audit every year. True False Chapter 12 Quiz Total Grade: 30 (of possible 30 points) Question 1 of 30 Score: 1 (of possible 1 point) While conducting the annual audit of Bluebird Company’s financial statements, Elsie Finnegan, CFE, CPA, came across some fishy findings. The company recorded several large and unusual sales at the end of the fiscal year to customers Elsie had never heard of. Further, all of these sales occurred within the company’s specialty division, which had previously been in danger of closing due to recurring losses. Based on these findings, what type of financial statement fraud is likely occurring? A. Expense omission B. Unrecorded warranties C. Fictitious revenues D. All of the above Question 2 of 30 Score: 1 (of possible 1 point) Capitalizing revenue-based expenses as depreciable assets will cause income to be ____________ in the current period and _______________ in future periods. A. Understated; overstated B. Understated; understated C. Overstated; understated D. Overstated; overstated Question 3 of 30 Score: 1 (of possible 1 point) According to AU 240, fraud involving senior management should be reported directly to the shareholders as soon as the fraud is documented. True False Question 4 of 30 Score: 1 (of possible 1 point) Which of the following is a red flag associated with fictitious revenues? A. An unusual decrease in gross margin B. An unusual decline in the number of days’ purchases in accounts payable C. Several unusual and highly complex sales transactions recorded close to the period end D. Recurring losses while reporting increasing cash flows from operations Question 5 of 30 Score: 1 (of possible 1 point) In one of the cases in the textbook, Eddie Antar, the CEO of the Crazy Eddie electronic stores in the New Jersey area, took fraud to a higher level. The company started out as a small, familyowned business, but Eddie soon found that he could really clean up by taking his company public and making a fortune off the sale of stock. However, in order to sustain his financial success, he turned to cooking the books. Unfortunately for Eddie, his scheme eventually came to an end. What happened to Eddie Antar? A. He fled the country and is still at large. B. He repaid the money and was placed on probation. C. He was convicted of racketeering and sentenced to prison. D. He became a witness for the SEC against his cousin, the CFO, in exchange for a reduced sentence. Question 6 of 30 Score: 1 (of possible 1 point) In one of the cases in the textbook, Eddie Antar, the CEO of the Crazy Eddie electronic stores in the New Jersey area, took fraud to a higher level. The company started out as a small, familyowned business, but Eddie soon found that he could really clean up by taking his company public and making a fortune off the sale of stock. However, in order to sustain his financial success, he turned to cooking the books. Unfortunately for Eddie, his scheme eventually came to an end. What financial statement fraud scheme did Eddie commit? A. Overstatement of inventory B. Improper disclosures C. Fictitious revenues D. All of the above Question 7 of 30 Score: 1 (of possible 1 point) Vertical analysis is also known as “common sizing” of financial statements. True False Question 8 of 30 Score: 1 (of possible 1 point) In one of the cases in the textbook, Eddie Antar, the CEO of the Crazy Eddie electronic stores in the New Jersey area, took fraud to a higher level. The company started out as a small, familyowned business, but Eddie soon found that he could really clean up by taking his company public and making a fortune off the sale of stock. However, in order to sustain his financial success, he turned to cooking the books. Unfortunately for Eddie, his scheme eventually came to an end. How was the fraud caught? A. His ex-wife contacted the SEC. B. Eddie lost a proxy battle for ownership, and the company’s new owners quickly discovered the fraud as they reviewed the books. C. The audit committee received an anonymous tip which led them to the fraud. D. The auditors found that the inventory count had been changed. Answer Key: B Question 9 of 30 Score: 1 (of possible 1 point) Which of the following is a common target for improper asset valuation schemes? A. Accounts receivable B. Business combinations C. Inventory valuation D. All of the above Question 10 of 30 Score: 1 (of possible 1 point) Promoting strong values, based on integrity, throughout the organization can help reduce financial statement fraud by addressing which side of the fraud triangle? A. Non-sharable financial needs B. Opportunity to commit fraud C. Pressure to commit fraud D. Rationalization of fraud Question 11 of 30 Score: 1 (of possible 1 point) Staff Accounting Bulletin Topic 13, “Revenue Recognition,” indicates that revenue is considered realized or realizable and earned when four criteria are met. Which of the following is one of these criteria? A. Collectibility is reasonably assured. B. Goods have been scheduled to be delivered or services have been scheduled to be rendered within the current fiscal period. C. The seller has located alternate buyers. D. All of the above are criteria for revenue recognition. Question 12 of 30 Score: 1 (of possible 1 point) GAAP strictly prohibits companies from engaging in all related-party transactions because, without an arm’s-length business negotiation process, the company may suffer economic harm and ultimately injure unsuspecting shareholders. True False Question 13 of 30 Score: 1 (of possible 1 point) An unusual change in the relationship between fixed assets and depreciation is a red flag associated with which type of financial statement fraud scheme? A. Timing differences B. Improper asset valuation C. Improper disclosure D. All of the above Answer Key: B Question 14 of 30 Score: 1 (of possible 1 point) Scott Ruskin is the CEO of Decatur Materials. The company has been struggling for the last few years and is in danger of defaulting on several of its bank loan covenants. Scott is facing significant pressure from the board of directors to turn the company around. Unless he meets all of the financial goals for the year, he will be out the door without a golden parachute. To improve the financial appearance of the company, Scott undertakes a scheme to boost the balance sheet by faking inventory. The analysis of what financial ratio would most likely bring this scheme to light? A. Quick ratio B. Collection ratio C. Inventory turnover D. Profit margin Question 15 of 30 Score: 1 (of possible 1 point) Which of the following is an example of improper asset valuation? A. Fictitious accounts receivable B. Understating assets C. Misclassifying assets D. All of the above Question 16 of 30 Score: 1 (of possible 1 point) The textbook lists several ways to reduce the pressures to commit financial statement fraud, including: A. Avoiding setting unachievable financial goals B. Maintaining accurate and complete internal accounting records C. Having confidential reporting mechanisms to communicate inappropriate behavior D. Maintaining accurate personnel records including background checks on new employees Question 17 of 30 Score: 1 (of possible 1 point) AU 240 requires auditors to document: A. Any specific risks of material misstatement due to fraud that were identified B. The discussion among engagement personnel regarding the susceptibility of the entity’s financial statements to material misstatement due to fraud C. The reasons supporting the auditor’s conclusion if the auditor has not identified improper revenue recognition as a risk D. All of the above Question 18 of 30 Score: 1 (of possible 1 point) Which of the following is not an example of financial statement fraud? A. Falsification of material financial records, supporting documents, or business transactions B. Unintentional misapplication of accounting principles C. Deliberate omission of material disclosures D. All of the above are examples of financial statement fraud Answer Key: B Question 19 of 30 Score: 1 (of possible 1 point) Which of the following is a red flag associated with concealed liabilities and expenses? A. Gross margin significantly lower than industry average B. An unusual increase in the number of days’ purchases in accounts payable C. An unusual change in the relationship between fixed assets and depreciation D. Significant reductions in accounts payable while competitors are stretching out payments to vendors Question 20 of 30 Score: 1 (of possible 1 point) In the vertical analysis of an income statement, _____________ is assigned 100 percent, with all other items expressed as a percentage thereof. A. Gross sales B. Net sales C. Net income D. Gross margin Answer Key: B Question 21 of 30 Score: 1 (of possible 1 point) An organization that seeks to fraudulently minimize its net income due to tax considerations may do so by: A. Recording fictitious revenues B. Omitting existing liabilities C. Expensing capitalized expenditures D. Underestimating warranty repairs expense Question 22 of 30 Score: 1 (of possible 1 point) An unusual growth in the number of days’ sales in receivables can be a red flag for which of the following financial statement fraud schemes? A. Timing differences B. Fictitious revenues C. Improper asset valuation D. All of the above Question 23 of 30 Score: 1 (of possible 1 point) Establishing clear and uniform accounting procedures with no exception clauses can help reduce financial statement fraud by addressing which side of the fraud triangle? A. Pressures to commit fraud B. Opportunity to commit fraud C. Rationalizations of financial statement fraud D. Non-sharable problems Answer Key: B Question 24 of 30 Score: 1 (of possible 1 point) According to SAS 99 (AU 240), “Consideration of Fraud in a Financial Statement Audit,” the auditor should ask management about the risks of fraud and how they are addressed. Which of the following is not described as an issue that the auditor should ask management about? A. Whether management has knowledge of fraud or suspected fraud B. Management’s understanding of the risk of fraud C. Whether and how management communicates the company’s financial results to its employees D. Programs that the entity has established to prevent, deter, or detect fraud Question 25 of 30 Score: 1 (of possible 1 point) Recording revenue from a sale even though the rights and risks of ownership have not yet passed to the purchaser is an example of what type of fictitious revenue scheme? A. Partial sale B. Circumstantial sale C. Tentative sale D. Sale with conditions Question 26 of 30 Score: 1 (of possible 1 point) Management has an obligation to disclose to the shareholders any fraud that is committed by the company’s employees or vendors. True False Question 27 of 30 Score: 1 (of possible 1 point) In one of the cases in the textbook, Michael Weinstein was the head of Coated Sales, Inc., a company that coated fabrics for use in producing things like parachutes, helmet liners, and camouflage suits. By engaging in financial shenanigans, Coated Sales moved to the top of its industry, but ultimately the good times turned into bad times, and the company declared bankruptcy. Which of the following was a red flag that a fraud was being perpetrated? A. A single check was used to pay off several different customer accounts. B. The company experienced extremely rapid growth even while its competitors’ growth was flat. C. The company kept changing auditors every other year. D. The bank account had been overdrawn on at least four occasions in one year. Question 28 of 30 Score: 1 (of possible 1 point) Sharpe Medical Supply, Inc. has suffered a recent slow-down in sales and is in danger of showing a loss for the 20X1 fiscal year. To boost income, the sales manager encourages two of the company’s largest customers to overbuy several slow-moving products at deep discounts. He also offers them extended payment terms, some of which delay payment until the end of 20X2. This is an example of what type of scheme? A. Channel stuffing B. Discount extension C. Sales re-routing D. Long-term contracts Question 29 of 30 Score: 1 (of possible 1 point) It is more difficult to manipulate construction contracts that use the percentage of completion method than contracts that use the completed contract method. True False Question 30 of 30 Score: 1 (of possible 1 point) The technique for analyzing the percentage change in individual financial statement items from one accounting period to the next is known as: A. Ratio analysis B. Vertical analysis C. Horizontal analysis D. Correlation analysis Chapter 13 Quiz Total Grade: 30 (of possible 30 points) Question 1 of 20 Score: 1.5 (of possible 1.5 points) Taylor is a procurement specialist for Hillside Corporation. He is reviewing contracts, and notices a pattern between three particular contractors. Contractor A bid the lowest on the first job, Contractor B bid the lowest on the second job, and Contractor C bid the lowest on the third job. All three contractors bid on all three jobs. Which of the following is a potential scheme perpetrated by these contractors? A. Bid tailoring B. Bid rotation C. Complementary bids D. Phantom bids Answer Key: B Question 2 of 20 Score: 1.5 (of possible 1.5 points) What is a recommended preventative measure a company should take to protect its physical property? A. Send and receive all mail from company premises B. Ensure outdoor waste receptacles are locked and guarded C. Keep sensitive documents out of sight and in employees’ drawers D. Ensure the cleaning staff only works after business hours Answer Key: B Question 3 of 20 Score: 1.5 (of possible 1.5 points) ________________ is the use of technology to gain unauthorized access to sensitive information on a computer system. A. Data manipulation B. Computer hacking C. Social engineering D. Computer crime Answer Key: B Question 4 of 20 Score: 1.5 (of possible 1.5 points) Which of the following is commonly used to perpetrate data manipulation and destruction schemes? A. Wire tapping B. Data dumps C. Network infiltration D. Malware Question 5 of 20 Score: 1.5 (of possible 1.5 points) Which of the following is NOT one of the four phases of the procurement process? A. The presolicitation phase B. The solicitation phase C. The performance phase D. The project review phase Question 6 of 20 Score: 1.5 (of possible 1.5 points) Password cracking, social engineering, and phishing are all: A. Methods used to gain unauthorized access B. Data manipulation tactics C. Corporate espionage tactics D. None of the above Question 7 of 20 Score: 1.5 (of possible 1.5 points) Which of the following statements is true with regard to credit cards? A. Less than half of the U.S. population has a credit card B. The chances of being caught using an unauthorized card are small C. Counterfeit credit cards are known as “black plastic” cards D. The hologram is the easiest part of a credit card to duplicate Answer Key: B Question 8 of 20 Score: 1.5 (of possible 1.5 points) Why are computer fraud cases difficult for a fraud examiner to investigate? A. They lack a traditional paper audit trail. B. They require an understanding of the technology used to commit the crime. C. They require the use of one or more specialists to assist the fraud examiner. D. All of the above are reasons why computer fraud cases are difficult to investigate. Question 9 of 20 Score: 1.5 (of possible 1.5 points) According to the textbook, which of the following is NOT one of a corporate spy’s favorite departments to target? A. Research and development B. Legal C. Marketing D. Human resources Answer Key: B Question 10 of 20 Score: 1.5 (of possible 1.5 points) Which of the following statements is true with regard to external fraud threats? A. Unrelated third parties pose the greatest threat to an organization B. Only companies that contract with vendors are at a risk of external fraud C. A member of an organization’s board of directors committing fraud against that organization is an example of external fraud D. Companies that house large amounts of customer payment data are especially vulnerable to external fraud threats Question 11 of 20 Score: 1.5 (of possible 1.5 points) Which of the following is a key finding from the 2010/2011 Computer Crime and Security Survey? A. Data manipulation is one of the most commonly seen attacks. B. Almost 80% of the survey respondents experienced at least one security incident. C. Respondents believed that the activities of outsiders accounted for much of their losses from cybercrime. D. All companies surveyed had a technical expert on staff. Question 12 of 20 Score: 1.5 (of possible 1.5 points) Which of the following does corporate espionage include? A. Legitimate intelligence collection B. Acquisition of information through clandestine means C. Intelligence analysis using legal means D. All of the above Answer Key: B Question 13 of 20 Score: 1.5 (of possible 1.5 points) A caterer has been contracted by Austin Corp. to provide the food for a large banquet. The catering contract explicitly states that the caterer will serve a fish entrée and a chicken entrée, and the fish entrée will consist of red snapper. The caterer decides to use tilapia instead, which costs about a third as much as red snapper, but is also a white fish and looks quite similar. He figures that no one at the banquet will be able to tell the difference. Austin Corp. is charged the price of the red snapper. What type of scheme has the caterer perpetrated? A. Product substitution B. Cost mischarging C. Material deception D. Contract falsification Question 14 of 20 Score: 1.5 (of possible 1.5 points) Max Reynolds is trying to obtain customer payment data from Stella Corporation. He wanders around Stella’s offices pretending to be a confused intern, looking for someone who can help him get on his computer. An unsuspecting employee gives him her login information, not realizing the amount of data she has just given him access to. He downloads several spreadsheets of customer payment data and takes off. What type of scheme has Max committed against Stella Corporation? A. Phishing B. Password cracking C. Social engineering D. Employee hijacking Question 15 of 20 Score: 1.5 (of possible 1.5 points) Which of the following is the best way to prevent vendor fraud? A. Conduct vendor audits B. Perform services in-house rather than using vendors C. Disallow any contract modifications D. Require a minimum of three vendors to be considered for any project Question 16 of 20 Score: 1.5 (of possible 1.5 points) All of the following are examples of malware EXCEPT: A. Blackware B. Virus C. Trojan horse D. Botnet Question 17 of 20 Score: 1.5 (of possible 1.5 points) If an organization offers wireless or remote access, its server software should terminate any connection: A. From a foreign country B. Cash larceny C. After a certain number of unsuccessful attempts to enter an invalid password D. Skimming Question 18 of 20 Score: 1.5 (of possible 1.5 points) Which of the following is NOT one of the three sources of external fraud discussed? A. Vendors B. Customers C. Auditors D. Unrelated third parties Question 19 of 20 What is encryption? Score: 1.5 (of possible 1.5 points) A. Impersonating one of the organization’s computers to get access to the network B. A type of intrusion detection system C. A company’s criteria for password selection D. Procedures used to convert information using an algorithm that makes it unreadable Question 20 of 20 Score: 1.5 (of possible 1.5 points) What is a paperhanger? A. A person who is an expert in check fraud B. A person who counterfeits money C. A person who specializes in e-commerce check scams D. A person who is an expert in credit card fraud Chapter 14 Quiz Total Grade: 30 (of possible 30 points) Question 1 of 30 Score: 1 (of possible 1 point) Fraudulent financial reporting risks include which of the following? A. Payment of bribes or gratuities B. Aiding and abetting of fraud by outside parties C. Inappropriately reflected balance sheet amounts D. Misappropriation of intangible assets Question 2 of 30 Score: 1 (of possible 1 point) To maximize the effectiveness of the fraud risk assessment process, the fraud risk assessment team should include both facts and opinions in its report. True False Question 3 of 30 Score: 1 (of possible 1 point) Which of the following is a type of detective control? A. Segregating duties B. Performing background checks C. Performing surprise audits D. Ensuring proper alignment between an individual’s authority and level of responsibility Question 4 of 30 Score: 1 (of possible 1 point) Both management and auditors have a responsibility for fraud risk management. True False Question 5 of 30 Score: 1 (of possible 1 point) Management should consider which of the following in establishing an acceptable level of fraud risk for the organization? A. The organization’s business objectives B. The organization’s risk tolerance level C. Both A and B D. Neither A nor B Question 6 of 30 Score: 1 (of possible 1 point) Which of the following actions might management take in order to transfer a residual fraud risk? A. Eliminate the related asset B. Exit the related activity C. Purchase fidelity insurance D. Implement countermeasures Question 7 of 30 Score: 1 (of possible 1 point) Management is not likely to have sufficient knowledge of controls to override them. True False Question 8 of 30 Score: 1 (of possible 1 point) Which of the following information-gathering techniques enables the fraud risk assessor to observe the interactions of employees as they discuss a question or issue? A. Interviews B. Surveys C. Focus groups D. Anonymous feedback mechanisms Question 9 of 30 Score: 1 (of possible 1 point) When assessing the potential incentives, pressures, and opportunities to commit fraud, the fraud risk assessment team should evaluate which of the following? A. Incentive programs and how they may affect employees’ behavior when conducting business or applying professional judgment B. Highly complex business transactions and how they might be used to conceal fraudulent acts C. Opportunities for collusion D. All of the above Question 10 of 30 Score: 1 (of possible 1 point) It is not important to consider reputation risk in performing a fraud risk assessment since this risk cannot easily be mitigated. True False Question 11 of 30 Score: 1 (of possible 1 point) One of the first steps in a fraud risk assessment involves identifying potential fraud risks inherent to the organization. True False Question 12 of 30 Score: 1 (of possible 1 point) Which of the following is not true regarding fraud risk? A. It can be analyzed quantitatively B. It results exclusively from sources internal to the organization C. It can be analyzed qualitatively D. It encompasses reputation risk Answer Key: B Question 13 of 30 Score: 1 (of possible 1 point) Risks resulting from ineffective or nonexistent controls are known as which of the following? A. Residual risks B. Inherent risks C. Control risks D. Audit risks Question 14 of 30 Score: 1 (of possible 1 point) Effective internal controls can eliminate the need for a fraud risk assessment. True False Question 15 of 30 Score: 1 (of possible 1 point) The results of a fraud risk assessment can help auditors design programs and procedures in a way that enables the auditors to look for fraud in known areas of high risk. True False Question 16 of 30 Score: 1 (of possible 1 point) Factors that influence the level of fraud risk faced by an organization include which of the following? A. The nature of the business B. The effectiveness of the organization’s internal control C. The ethics and values of the organization and the people in it D. All of the above Question 17 of 30 Score: 1 (of possible 1 point) Which of the following is not a potential corruption risk? A. Payment of bribes to public officials, companies, or private individuals B. Inadequate disclosures pertaining to related-party transactions C. Receipt of kickbacks, bribes, or gratuities D. Aiding and abetting of fraud by customers or vendors Answer Key: B Question 18 of 30 Score: 1 (of possible 1 point) Which of the following is not a true statement regarding the fraud risk assessment process? A. It is more of a science than an art B. To be most effective, it should be an ongoing, continuous process C. It should be influenced by the culture of an organization D. It is aimed at proactively identifying an organization’s vulnerabilities to fraud Question 19 of 30 Score: 1 (of possible 1 point) Which of the following factors should be considered when selecting a sponsor for the fraud risk assessment? A. Seniority B. Independence C. Ability to elicit cooperation D. All of the above Question 20 of 30 Score: 1 (of possible 1 point) Which of the following factors enhances a fraud risk assessment? A. Collaboration between management and auditors B. Independence and objectivity of those leading and conducting the work C. Inclusion of people’s perceptions at all levels of the organization D. All of the above Question 21 of 30 Score: 1 (of possible 1 point) In assessing the significance to the organization of identified fraud risks, the fraud risk assessment team should first consider them on an inherent basis. True False Question 22 of 30 Score: 1 (of possible 1 point) _________ controls are designed to stop an undesirable event from occurring, whereas _________ controls are designed to identify an undesirable event that has already occurred. A. Preventive; detective B. Internal; external C. Risk; discovery D. Operating; review Question 23 of 30 Score: 1 (of possible 1 point) Assessing an area as having a high fraud risk means that fraud is occurring there. True False Question 24 of 30 Score: 1 (of possible 1 point) Which of the following is not one of the three interrelated elements that enable someone to commit fraud? A. Opportunity B. Non-sharable financial need C. Ability to rationalize D. Fraud risk Question 25 of 30 Score: 1 (of possible 1 point) In general, management should avoid sharing the fraud risk assessment process and results with employees. True False Question 26 of 30 Score: 1 (of possible 1 point) The objective of a fraud risk assessment is to help management recognize factors that make an organization most vulnerable to fraud so that management can address those factors to reduce the exposure. True False Question 27 of 30 Score: 1 (of possible 1 point) Which of the following techniques can be used to evaluate the effectiveness and efficiency of internal controls? A. Review of the accounting policies and procedures in place B. Interviews with management and employees C. Consideration of the risk of management’s override of controls D. All of the above Question 28 of 30 Score: 1 (of possible 1 point) Internal control is a process aimed at proactively identifying and addressing an organization’s vulnerabilities to internal and external fraud. True False Question 29 of 30 Score: 1 (of possible 1 point) Which of the following factors should be considered in assessing the likelihood of occurrence of each fraud risk? A. Financial statement and monetary significance B. Internal control environment of the organization C. Criminal, civil, and regulatory liabilities D. Financial condition of the organization Answer Key: B Question 30 of 30 Score: 1 (of possible 1 point) The vulnerability of an organization to those capable of overcoming the three elements of the fraud triangle is known as which of the following? A. Inherent risk B. Fraud risk assessment C. Fraud risk D. Control risk Chapter 15 Quiz Total Grade: 30 (of possible 30 points) Question 1 of 30 Score: 1 (of possible 1 point) McCloud, an internal investigator for a private company, has reason to believe that LaRue, the company’s controller, has been embezzling cash and living the high life on the company’s dime. McCloud has just discovered that LaRue bought a mansion on the edge of town last year and McCloud wants to find out more about the purchase. Information about whether LaRue took out a mortgage on the property may be found by searching: A. LaRue’s income tax return B. County real property records C. LaRue’s bank account transactions D. All of the above Question 2 of 30 Score: 1 (of possible 1 point) Which of the following statements is true regarding the use of undercover operations as part of a fraud examination? A. Undercover operations are never legal and should not be used in fraud examinations. B. Undercover operations should be used only if there is sufficient probable cause that a crime has been committed. C. There are no restrictions governing the use of undercover operations as part of fraud investigations. D. None of the above Answer Key: B Question 3 of 30 Score: 1 (of possible 1 point) Which of the following factors should be considered when determining whether to employ outside consultants during a fraud examination engagement? A. Company politics B. The degree of expertise required for specific tasks C. Potential threats of retaliation against internal investigators D. All of the above Question 4 of 30 Score: 1 (of possible 1 point) In a written fraud examination report, the fraud examiner’s conclusions about how the fraud occurred should be explicitly stated. True False Question 5 of 30 Score: 1 (of possible 1 point) Able is a fraud examiner who works for XYZ, a private company. While investigating an allegation of employee embezzlement, Able calls Baker, a suspected co-conspirator, and pretends to be a member of the local police force. Able tells Baker that if he turns over his financial records to Able, that he will be provided immunity from prosecution. Is Able’s use of impersonation in this situation legally acceptable? A. Yes B. No Answer Key: B Question 6 of 30 Score: 1 (of possible 1 point) While investigating an alleged conflict of interest scheme, Green, an internal investigator, is contacted by the ex-wife of Brown, the primary suspect. After calling her ex-husband some unsavory names and telling Green that Brown hasn’t paid a dime of his court-ordered alimony, the jilted former spouse informs Green that she has some dirt on Brown. She tells Green that she’d be more than happy to spill the beans about Brown’s misdeeds if Green can ensure that she receives half of any money recovered as a result of the investigation. Because Brown’s exwife is clearly seeking a financial reward for supplying information, Green should discontinue speaking with her and should not rely on any information she provides. True False Question 7 of 30 Score: 1 (of possible 1 point) Which of the following information is typically not included in a corporate registration? A. The location of the corporation’s principal office B. The tax returns and quarterly reports for the corporation C. The names of the corporation’s directors and officers D. The date of incorporation Answer Key: B Question 8 of 30 Score: 1 (of possible 1 point) When choosing a fraud examination team, it is important to include as many parties as possible to ensure that all investigatory perspectives are covered. True False Question 9 of 30 Score: 1 (of possible 1 point) _________________ refers to establishing how and when a piece of evidence was received; how it was maintained or stored while in each person’s possession; what changes, if any, it underwent in that person’s custody; and how it left that person’s custody. A. Authentication B. Forensic examination C. Chain of custody D. None of the above Question 10 of 30 Score: 1 (of possible 1 point) A well-written, accurate, and understandable investigation report will: A. Convey all pertinent evidence B. Add credibility to the investigation C. Accomplish the objectives of the case D. All of the above Question 11 of 30 Score: 1 (of possible 1 point) Bob Taylor, CFE, is writing a report on his findings from an investigation into an alleged inventory larceny scheme. During his investigation, he was unable to accurately quantify the amount of the loss to the victim company, but he assumes that the loss falls between $100,000 and $200,000. In the report, Bob should report the amount of the loss as $200,000 so that the company can recoup as much money as possible from the perpetrator. True False Question 12 of 30 Score: 1 (of possible 1 point) Which of the following statements about handling and storing documentary evidence is not true? A. Documents received should be initialed and dated by the fraud examiner. B. The original document should be preserved for forensic examinations. C. Photocopied documents should be stored in transparent plastic envelopes. D. Documents should never be stapled or paper-clipped. Question 13 of 30 Score: 1 (of possible 1 point) The failure to adequately investigate an allegation of employee fraud may be a violation of legal and regulatory requirements. True False Question 14 of 30 Score: 1 (of possible 1 point) Jackson, CFE, is investigating a suspected embezzlement by one of XYZ Corp.’s employees. As part of this investigation, she is assembling a financial profile of the suspect. Among other things, she wants to know if the suspect has made any significant real estate purchases since the embezzlement scheme began. Information on real estate transactions such as deeds, grants, transfers, and mortgages is located: A. With the county recorder B. With the state tax assessor C. With the secretary of state D. With the U.S. Department of Land Management Question 15 of 30 Score: 1 (of possible 1 point) A company may need to undertake an internal investigation into alleged employee fraud for which of the following reasons? A. To mitigate the company’s vicarious liability for the wrongful conduct B. To determine the source and amount of loss C. To guard against wrongful termination accusations D. All of the above Question 16 of 30 Score: 1 (of possible 1 point) To be valid, a search warrant must be issued by a judge and must be served by a law enforcement official. True False Question 17 of 30 Score: 1 (of possible 1 point) Fraud examinations conclude with: A. A conviction of the guilty party B. A report of the investigation findings C. A confession from the suspect D. An opinion on the guilt or innocence of the implicated party Answer Key: B Question 18 of 30 Score: 1 (of possible 1 point) Information concerning a corporation’s name, ownership, stock value, initial shareholders, directors, and officers is registered and maintained at which of the following levels? A. Federal B. State C. Municipal D. County Answer Key: B Question 19 of 30 Score: 1 (of possible 1 point) Of the following, which is the preferred method of organizing documentary evidence? A. Chronological order B. Alphabetical order C. By witness D. Order received Question 20 of 30 Score: 1 (of possible 1 point) Lloyd, CFE, has asked Betsy for access to her bank records as part of an investigation into an alleged embezzlement scheme. If Betsy agrees, her consent must be written, signed, and dated in order for it to be binding. True False Question 21 of 30 Score: 1 (of possible 1 point) To find the names of the parties who have an interest in the estate of a deceased individual, an investigator should search the records of which court? A. County civil court B. U.S. District court C. Probate court D. None of the above Question 22 of 30 Score: 1 (of possible 1 point) When preparing an investigative report, the fraud examiner should assume that it will be read by outside parties. True False Question 23 of 30 Score: 1 (of possible 1 point) If, during the handling of a piece of documentary evidence, an investigator inadvertently holds the document with bare hands and leaves fingerprints on it, the document should be destroyed and a new copy should be obtained. True False Question 24 of 30 Score: 1 (of possible 1 point) In most cases, which of the following parties should be primarily responsible for directing a fraud examination? A. The external auditors B. The head of the security department C. The company’s legal counsel D. The human resources manager Question 25 of 30 Score: 1 (of possible 1 point) In which section of the standard fraud examination report should the investigator discuss the identity and background information obtained about the individuals implicated in the matter under investigation? A. Summary B. Introduction C. Body D. Results Question 26 of 30 Score: 1 (of possible 1 point) _____________ involves obtaining information through the use of falsehoods or deception. A. Pretexting B. Subject manipulation C. Forensic investigation D. Surveillance Question 27 of 30 Score: 1 (of possible 1 point) To obtain information about an auto loan, such as where and when the loan originated and the current address of the debtor, an investigator should search the Uniform Commercial Code documents filed with the Secretary of State. True False Question 28 of 30 Score: 1 (of possible 1 point) Baker, CFE, is on a stakeout at the home of Potter, the prime suspect in a large false billing scheme. When Baker arrives at Potter’s street, she notices Potter’s garbage has been placed on the curb for pickup. Baker believes she could obtain much of the information she needs by going through Potter’s garbage. In order to legally sift through Potter’s trash and seize discarded documents to be used as evidence, Baker must: A. Obtain a search warrant B. Obtain a subpoena duces tecum C. Obtain Potter’s consent D. None of the above Question 29 of 30 Score: 1 (of possible 1 point) Fraud examination teams should be broken down into two segregated groups: one that focuses on the financial side of the investigation and one that performs the investigatory field work. True False Question 30 of 30 Score: 1 (of possible 1 point) When organizing documentary evidence, it is recommended that investigators keep which of the following? A. Chronologies B. To-do lists C. A separate file for key documents D. All of the above Chapter 16 Quiz Total Grade: 30 (of possible 30 points) Question 1 of 30 Score: 1 (of possible 1 point) Respondents in an interview give both verbal and nonverbal clues that can be used to determine whether they are being deceptive. Which of the following is generally not considered a verbal clue to deception? A. Changes in speech patterns B. Tolerant attitude C. Feigned unconcern D. Overuse of emotive words Question 2 of 30 Score: 1 (of possible 1 point) When obtaining a written confession during an admission-seeking interview, which of the following is not an item that should be included in the written statement? A. Willingness to cooperate B. Promise of leniency C. Excuse clause D. Intent to perpetrate the crime Answer Key: B Question 3 of 30 Score: 1 (of possible 1 point) Which of the following is not one of the primary purposes of asking introductory questions during an interview? A. Establishing rapport between the interviewer and the subject B. Asking sensitive questions before the subject has the ability to go on the defensive C. Observing reactions to questions D. Establishing the theme of the interview Answer Key: B Question 4 of 30 Score: 1 (of possible 1 point) When the subject of an investigation has been accused of misconduct, establishing a morally acceptable rationalization might allow the accused to reconcile his actions with his conscience. Which of the following is not an example of an acceptable rationalization? A. The accused has been unfairly treated by his management. B. The accused felt that he needed to get back at someone in the organization. C. The accused is a bad person by nature. D. The accused engaged in the misconduct for the benefit of others. Question 5 of 30 Score: 1 (of possible 1 point) All notes taken by the interviewer should be preserved, as they may be needed if the case goes to trial. True False Question 6 of 30 Score: 1 (of possible 1 point) During the introductory phase of an interview, the respondent states that he won’t provide any information unless he is promised confidentiality. In this situation, you should give in to his request to ensure that you get the information you are seeking. True False Question 7 of 30 Score: 1 (of possible 1 point) When obtaining a written statement during an admission-seeking interview, the investigator should prepare the statement for the confessor to sign. True False Question 8 of 30 Score: 1 (of possible 1 point) During an interview, you ask the respondent a question that contains the answer as part of the question. This is called a(n): A. Open question B. Closed question C. Assessment question D. None of the above Question 9 of 30 Score: 1 (of possible 1 point) James Turner, CFE, was called in to investigate a sales skimming case at Durant Hardware. During an admission-seeking interview of Nadia Brown, the primary suspect, James asked, “Did you just want some extra money, or did you do this because you had financial problems?” Nadia began crying and nodded yes. This small admission as a response to James’ question is called a: A. Provisional admission B. Point-of-reference confession C. Benchmark admission D. Tentative confession Question 10 of 30 Score: 1 (of possible 1 point) Oral confessions are as legally binding as written confessions. True False Question 11 of 30 Score: 1 (of possible 1 point) Assessment questions are worded so that dishonest people will likely agree with many of the statements, while honest people likely won’t. True False Question 12 of 30 Score: 1 (of possible 1 point) During an admission-seeking interview in which an accusation has been made, the respondent will normally object to the accusation and attempt to deny it. When you are convinced of the respondent’s guilt, it is important to: A. Interrupt the denial. B. Ask the respondent to put the denial in writing. C. Repeat the denial for confirmation of understanding. D. None of the above Question 13 of 30 Score: 1 (of possible 1 point) During an admission-seeking interview, Andrew Douglas, the primary suspect, repeatedly began his responses with the phrase “to tell the truth.” Additionally, he had trouble remembering several key facts regarding the events in question, even though his memory of the small details was excellent. Andrew’s verbal clues likely indicate that he is being truthful. True False Question 14 of 30 Score: 1 (of possible 1 point) A(n) _____________ interview is one that has the potential to bring about strong emotional reactions in the respondent. A. Explosive B. Aggressive C. Volatile D. Emotive Question 15 of 30 Score: 1 (of possible 1 point) During an interview, the respondent frequently uses the phrases “honestly” and “I swear to God.” The respondent is giving a type of verbal clue known as: A. Character testimony B. Illustrators C. Oaths D. Manipulators Question 16 of 30 Score: 1 (of possible 1 point) At the conclusion of an interview, closing questions should be asked for which of the following purposes? A. Reviewing key facts to ensure that they have not been misunderstood B. Gathering previously unknown facts C. Asking the respondent if he or she has been treated fairly D. All of the above Question 17 of 30 Score: 1 (of possible 1 point) In an admission-seeking interview, once the accused has provided a verbal confession, the interviewer should focus on obtaining: A. An estimate of the total amount of money involved B. A motive for the offense C. The names of other people who are involved D. All of the above Question 18 of 30 Score: 1 (of possible 1 point) An open question is a question that is worded in a way that makes it difficult to answer with a simple “yes” or a “no.” True False Question 19 of 30 Score: 1 (of possible 1 point) During a potentially volatile interview, there should be only one person in the room with the respondent in order to prevent intimidation. True False Question 20 of 30 Score: 1 (of possible 1 point) During an admission-seeking interview, the accused individual will likely present reasons why he or she could not have committed the offense. When this occurs, the fraud examiner should step in and diffuse these alibis by: A. Discussing the accused’s deceptions B. Displaying the physical evidence C. Discussing the testimony of other witnesses D. Any of the above Question 21 of 30 Score: 1 (of possible 1 point) The purpose of informational questions is to gather unbiased, factual information. Which of the following is a type of informational question? A. Assessment B. Norming C. Closing D. Leading Question 22 of 30 Score: 1 (of possible 1 point) The question “Do you think someone around here might be justified in making a secret arrangement with one of the company’s vendors?” is an example of what type of interview question? A. Allusive B. Admission-seeking C. Assessment D. Alternative Question 23 of 30 Score: 1 (of possible 1 point) ______________ questions are asked if you have a reasonable cause to believe that the respondent is responsible for the fraud under investigation. A. Admission-seeking B. Assessment C. Leading D. Closing Question 24 of 30 Score: 1 (of possible 1 point) During an interview, when an interviewee repeatedly fiddles with a pen or picks lint from her clothing, she is giving non-verbal clues called: A. Illustrators B. Manipulators C. Exemplifiers D. None of the above Answer Key: B Question 25 of 30 Score: 1 (of possible 1 point) Private employers conducting an internal investigation are generally required to give Miranda warnings before commencing an admission-seeking interview with a non-union employee. True False Question 26 of 30 Score: 1 (of possible 1 point) Which of the following question types will generally not be asked during an information-gathering interview of a neutral witness? A. Introductory B. Informational C. Assessment D. Closing Question 27 of 30 Score: 1 (of possible 1 point) While conducting an interview, you have reason to believe that the respondent is not being truthful. What type of questions will help you establish the respondent’s credibility? A. Open B. Non-leading C. Admission-seeking D. Assessment Question 28 of 30 Score: 1 (of possible 1 point) In an interview situation, the process of observing behavior before critical questions are asked is called: A. Calibrating B. Leading C. Attribution D. None of the above Question 29 of 30 Score: 1 (of possible 1 point) Which of the following is a rule that the interviewer should follow when asking questions during the introductory phase of the interview? A. Promise confidentiality to the respondent. B. Give the interviewee the opportunity to respond to the source of the allegations. C. Question only one person at a time. D. All of the above Question 30 of 30 Score: 1 (of possible 1 point) When asking informational questions, you should start with general questions and then proceed to specific questions. True False Chapter 17 Quiz Total Grade: 30 (of possible 30 points) Question 1 of 20 Score: 1.5 (of possible 1.5 points) Vigorously prosecuting fraud perpetrators is considered to be the best proactive way to deter fraud. True False Question 2 of 20 Score: 1.5 (of possible 1.5 points) The terms deterrence and prevention mean the same thing and can be used interchangeably. True False Question 3 of 20 Score: 1.5 (of possible 1.5 points) Fraud prevention involves removing the root cause of fraudulent behavior, such as economic deprivation or social injustice. True False Question 4 of 20 Score: 1.5 (of possible 1.5 points) Although hotlines are an essential part of an effective fraud reporting system, only about 5 percent of hotline calls are actually developed into solid cases. True False Question 5 of 20 Score: 1.5 (of possible 1.5 points) Which of the following should be included in an organization’s formal ethics policy? A. A statement that dishonest acts will be punished B. Information on how unethical conduct can be reported C. All of the above D. Specific conduct that violates the policy Question 6 of 20 Score: 1.5 (of possible 1.5 points) The “tone at the top” that is set by management is more important in providing a strong ethical message to employees than having a formal organizational ethics policy in place. True False Question 7 of 20 Score: 1.5 (of possible 1.5 points) The school of ethical thought that advocates concrete ethical principles that cannot be violated is the: A. Modern ethical principle B. Utilitarian ethical principle C. Fundamental ethical principle D. Imperative ethical principle Question 8 of 20 Score: 1.5 (of possible 1.5 points) As it relates to Corporate Sentencing Guidelines, corporations are required to perform certain minimum steps for due diligence. Which of the following is not one of the required steps? A. Use due care not to delegate significant authority to people who are known to have a propensity to engage in illegal activities. B. Consistently enforce standards through appropriate discipline. C. Have policies defining standards and procedures to be followed by the organization’s agents and employees. D. Assign internal audit personnel to ensure compliance. Question 9 of 20 Score: 1.5 (of possible 1.5 points) The Corporate Sentencing Guidelines allow organizations that have an effective fraud prevention and detection program in place to receive more lenient criminal sentences than those without such a program. True False Question 10 of 20 Score: 1.5 (of possible 1.5 points) The concept of ______________ provides that corporations can legally be held criminally responsible for the acts of their employees if those acts were done in the course and scope of their employment and for the apparent benefit of the corporation. A. Displaced criminal sanctions B. Civil responsibility C. Imputed liability D. Connected accountability Question 11 of 20 Score: 1.5 (of possible 1.5 points) The implementation of hidden controls is a crucial component of an effective proactive fraud deterrence plan. True False Question 12 of 20 Score: 1.5 (of possible 1.5 points) Dean Crawley is a foreman for the Albuquerque Construction Co. As part of his duties, Dean often must run to the hardware store to purchase supplies when they are needed immediately for a building project. One afternoon, Dean’s building crew ran out of a particular sized nail and needed 35 more right away to meet their tight project deadline. Dean went to the nearest hardware store to restock, but quickly realized he had forgotten his wallet. Rather than waste precious time retrieving his wallet, he slipped 40 nails into his pockets and walked out without paying for them. Even though Dean’s actions specifically violated company policies, the company may still be held criminally responsible for his theft. True False Question 13 of 20 Score: 1.5 (of possible 1.5 points) For the past several months the Adams Shop, a mom and pop retail store, has suffered costly losses due to the theft of merchandise. Putting in a comprehensive surveillance system that covers all of the entrances and exits at all four of their locations is not feasible at this time. Nevertheless, they have decided to install several surveillance cameras in their flagship store. They notified their employees that the cameras were being installed and placed posters at the store entrances notifying their customers of the new security. Not surprisingly, thefts decreased dramatically within a month and continued to decline over the next six months. Without the cash to install cameras in all the stores, Adams installed fake cameras at the other three stores and let employees and customers at those locations know about the cameras. Thefts dropped at the other stores as well. The concept that most likely explains why the thefts decreased is known as: A. Surreptitious detection B. Proactive deterrence C. Pre-emptive anti-fraud strikes D. Perception of detection Question 14 of 20 Score: 1.5 (of possible 1.5 points) Which of the following choices is not an action that will increase the perception of detection within an organization? A. Developing employee anti-fraud education programs B. Increasing the use of analytical reviews C. Establishing a reporting program D. Conducting clandestine audits Question 15 of 20 Score: 1.5 (of possible 1.5 points) Having an adequate program to report fraud is vital to the success of an organization’s efforts to detect and deter fraud. Which of the following is a key point that should be emphasized in such a program? A. There is an exact method for reporting suspected wrongdoing. B. Penalties may be assessed on employees who report inaccurate information, regardless of intent. C. All of the above D. If everyone works together, fraud, waste, and abuse can be completely eliminated within the organization. Question 16 of 20 Score: 1.5 (of possible 1.5 points) The school of ethical thought that advocates situational ethics, i.e., each behavior should be evaluated on its own merits, is the: A. Circumstantial ethical principle B. Imputed ethical principle C. Utilitarian ethical principle D. Imperative ethical principle Question 17 of 20 Score: 1.5 (of possible 1.5 points) All organizations, regardless of size, should institute a formal ethics policy. True False Question 18 of 20 Score: 1.5 (of possible 1.5 points) The axiom that states “employees who believe that they will be caught engaging in occupational fraud and abuse are less likely to commit it” is called: A. Perception of detection B. Preventive selection C. Cognitive choice D. None of the above Question 19 of 20 Score: 1.5 (of possible 1.5 points) Brian Ferguson is a cashier at a 24-hour convenience store. He has worked the night shift for the last year and a half, and often fills in for other employees at the last minute, but has never received a raise. Furthermore, Brian just got passed over for a promotion to store manager, which would have nearly doubled his pay. Understandably, he is outraged. Because his employer is so “cheap” and “unfair,” Brian begins taking cases of beer and snacks home to supplement his income. The term that best describes Brian’s theft as retribution for his inadequate pay is: A. Actionable rationalization B. Wages in kind C. Involuntary breach D. Imperative ethics Answer Key: B Question 20 of 20 Score: 1.5 (of possible 1.5 points) Modification of behavior through the perception of negative sanctions is called: A. Prevention B. Dissuasion C. Preclusion D. Deterrence Question 1 of 100 Score: 1.5 (of possible 1.5 points) Permitting employees to book their own travel using their own credit card is an effective internal control over expense reimbursement schemes. True False Question 2 of 100 Score: 1.5 (of possible 1.5 points) Kevin Chitry, a sales executive for CIT Manufacturing, frequently took clients out for dinner and shows when they came to town to tour the plant. He usually paid for these expenses himself and submitted the receipts to his supervisor for approval and reimbursement. Occasionally, however, he also took his family out to restaurants and rock concerts and included these expenses in his reimbursement requests by indicating that he was entertaining a client. This type of fraud is known as a(n): A. Overstated expense reimbursement B. Altered receipt reimbursement C. Mischaracterized expense reimbursement D. Fictitious expense reimbursement Question 3 of 100 Score: 1.5 (of possible 1.5 points) To safeguard against expense reimbursement schemes, organizations should require that employee expense reports be reviewed and approved by a supervisor outside the requestor’s department. True False Question 4 of 100 Score: 1.5 (of possible 1.5 points) As the manager of a local auto-parts store, Manny Ortega was responsible for reimbursing employees when they purchased supplies for the store with their own money. When employees brought Ortega their receipts for reimbursement, he would often alter the receipts to show a larger amount. Then he would ring a “no sale” on the cash register, remove the full amount per the altered receipt, and pocket the excess. Because the employee received the expected amount and the register totals remained in balance, Ortega was able to continue this scheme for nearly 2 years before being caught. What type of fraud did Ortega commit? A. Overstated expense reimbursement scheme B. Mischaracterized expense reimbursement scheme C. None of the above D. Register disbursement scheme Question 5 of 100 Score: 1.5 (of possible 1.5 points) Daniel Isley works as an internal auditor for Atlantic Insurance Co. While reviewing the company’s travel and entertainment expenses, Isley noticed that one employee had submitted several receipts from Chase’s Restaurant for round-dollar amounts just under the company’s reimbursement limit. Further, the receipts were consecutively numbered, but were submitted over a six-month period. What type of scheme did Isley most likely uncover? A. Fictitious expense reimbursement B. None of the above C. Multiple reimbursement D. Mischaracterized reimbursement Question 6 of 100 Score: 0 (of possible 1.5 points) Expense reimbursement schemes include which of the following? A. All of the above B. Mischaracterized expenses C. Overstated expenses D. Multiple reimbursements Question 7 of 100 Score: 1.5 (of possible 1.5 points) Claiming personal travel as a business expense is an example of what type of expense reimbursement scheme? A. Altered expense reimbursements B. Multiple reimbursements C. Overstated expense reimbursements D. Mischaracterized expense reimbursements Question 8 of 100 Score: 1.5 (of possible 1.5 points) Charlene DiAngelo is a sales manager for Northwest Paper & Plastics. On April 11, she took some clients out for a business lunch to discuss a potential contract. When she returned to the office, she made a photocopy of her restaurant receipt. Using correction fluid, she changed the date on the photocopy to read June 11. She submitted the original restaurant receipt with a reimbursement request on April 11 and held on to the photocopy for 2 months. On June 12, she submitted the altered photocopy along with a second reimbursement request. What type of fraud scheme did DiAngelo commit? A. Fictitious expense reimbursement B. Altered receipt C. Billing D. Multiple reimbursement Question 9 of 100 Score: 1.5 (of possible 1.5 points) Which of the following best describes what is meant by “the tone at the top.” A. fraud perpetrators are given a second chance. B. fraud perpetrators are severely punished. C. expectations of honesty are implied. D. a proper example is set by management. Question 10 of 100 Score: 1.5 (of possible 1.5 points) _____________ is gathered from individuals using investigative techniques such as interviewing, interrogation, and honesty tests. A. Personal observation B. Physical evidence C. Testimonial evidence D. Documentary evidence Question 11 of 100 Score: 0 (of possible 1.5 points) An investigator is conducting a surveillance operation on an individual. Surveillance is what type of fraud investigation evidence? A. Testimonial evidence B. Physical evidence C. Personal observation D. Documentary evidence Question 12 of 100 Score: 1.5 (of possible 1.5 points) What is the term that would lead a reasonable, prudent professional to believe a fraud has occurred, is occurring, or will incur? A. Probation B. Suspension C. Predication D. Retaliation Question 13 of 100 Score: 1.5 (of possible 1.5 points) John Pearson (CPA) is investigating a possible management fraud. He found an email on an employee's computer to use as evidence in the case. This email is an example of __________? A. Physical evidence B. Testimonial evidence C. Personal observation D. Documentary evidence Question 14 of 100 Score: 1.5 (of possible 1.5 points) For a fraud investigation to be conducted, the following is a prerequisite A. Rationalization B. A specific allegation of fraud against another party C. Consistent bottom-line improvement D. Predication Question 15 of 100 Score: 1.5 (of possible 1.5 points) Use Benford’s Law to answer the following question. 5 will be the first digit of a random number set______ A. about the same as 6. B. more often than 1. C. more often than 3. D. less often than 4. Question 16 of 100 Score: 1.5 (of possible 1.5 points) Use Benford’s law to answer the following question. The first digit of random data sets will begin with a ______ more often than 2. A. 3 B. 4 C. 7 D. 1 Question 17 of 100 Score: 1.5 (of possible 1.5 points) Use Benford’s law to answer the following question. The first digit of random data sets will begin with a ______ more often than 2. A. 3 B. 1 C. 4 D. 7 Answer Key: B Question 18 of 100 Score: 1.5 (of possible 1.5 points) You are a fraud investigator working with complex data sets. You decide to the split the data sets into case-specific tables. This process is known as_______ A. Stratification B. Deviation C. Soundex D. Data mining Question 19 of 100 Score: 0 (of possible 1.5 points) How can Benford's law help detect fraud? A. By focusing on unexplained changes. B. By establishing weaknesses in the accounting control system. C. By identifying accounting anomalies. D. By showing attempts by fraudsters to make stolen amounts look random. Question 20 of 100 Score: 1.5 (of possible 1.5 points) The most important factor in preventing cash larceny from the deposit is: A. None of the above B. Having a visible management presence in the mailroom C. Separating the duties of the deposit function D. Having two employees deliver the deposit to the bank Question 21 of 100 Score: 1.5 (of possible 1.5 points) To prevent cash larceny through falsification of cash counts, an independent employee should verify the cash count in each register or cash box at the end of each shift. True False Question 22 of 100 Score: 1.5 (of possible 1.5 points) The central weakness of a cash larceny scheme is the resulting imbalance in the organization’s accounting records. True False Question 23 of 100 Score: 1.5 (of possible 1.5 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, cash larceny schemes had the largest median loss of all cash misappropriations. True False Question 24 of 100 Score: 1.5 (of possible 1.5 points) Which of the following antifraud controls can help prevent and detect cash larceny from the deposit? A. Preparing the deposit slip to show each individual check and money order along with currency receipts B. All of the above C. Comparing the bank authenticated deposit slip with the general ledger posting of the day’s receipts D. Having two copies of the bank statement delivered to different persons in an organization Answer Key: B Question 25 of 100 Score: 1.5 (of possible 1.5 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, cash larceny schemes were the least common form of cash misappropriations. True False Question 26 of 100 Score: 1.5 (of possible 1.5 points) Dorothy McNally stole $232 from the company deposit while on the way to the bank. She can conceal the theft by recording the missing amount on the bank reconciliation as a(n): A. None of the above B. Credit memo C. Outstanding check D. Deposit in transit Question 27 of 100 Score: 1.5 (of possible 1.5 points) In one of the case studies in the textbook, Laura Grove was the head teller at a bank in Tennessee. As the head teller, she had the authority to open the night depository along with another teller. For security reasons, each teller only had half of the combination to the vault. In the end, Grove opened the vault and stole two deposit bags worth approximately $16,000. How was the case settled? A. She was prosecuted but received probation in lieu of prison time. B. She paid the bank back in lieu of prosecution. C. She was prosecuted and sentenced to eighteen months in jail. D. She was dismissed and signed a promissory note to repay the money. Question 28 of 100 Score: 1.5 (of possible 1.5 points) If an employee had the responsibility of both writing checks and making deposits to a bank, they would have ____. A. Financial pressure B. Perceived opportunity C. Rationalization Answer Key: B Question 29 of 100 Score: 1.5 (of possible 1.5 points) A fraud perpetrator named Maximus is able to convince a potential victim that she will receive a job promotion if she supports him in a fraud scheme. Maximus is using which type of power? A. Expert power B. Coercive power C. Reward power D. Legitimate power Question 30 of 100 Score: 1.5 (of possible 1.5 points) Which of the following statements is true? A. Research shows that only people with a criminal mind set can commit fraud. B. When fraud does occur, the most common reaction by those around the fraud is confession. C. Most fraud perpetrators have profiles that look like those of other honest people. D. Fraud perpetrators usually can be distinguished from others on the basis of demographic characteristics. Question 31 of 100 Score: 1.5 (of possible 1.5 points) Financial pressures associated with fraud include all but which statement? A. Personal financial losses B. High bills or personal debt C. Living beyond one's means D. Getting even with the employer Question 32 of 100 Score: 1.5 (of possible 1.5 points) Sam is persuaded by a trusted friend to participate in fraud. Sam rationalizes the actions as being justifiable. Which type of power is being employed on Sam? A. Coercive power B. Referent power C. Reward power D. Legitimate power Answer Key: B Question 33 of 100 Score: 1.5 (of possible 1.5 points) Which control structure components are "modeling" and "labeling" sub-components of? A. Review B. Accounting system C. Control procedure D. Control environment Question 34 of 100 Score: 1.5 (of possible 1.5 points) You are a fraud investigator just hired to begin an engagement. You create a tool that considers all the aspects of the fraud that are currently known to you. With this tool you also establish different fraud theories. This tool is also known as a ______________ A. Vulnerability chart B. Surveillance log C. Perceptual map D. Pareto chart Question 35 of 100 Score: 1.5 (of possible 1.5 points) You are an investigator on an engagement. You will use surveillance to investigate ________ A. key internal controls. B. conversion possibilities. C. theft acts. D. concealment possibilities. Question 36 of 100 Score: 1.5 (of possible 1.5 points) From the options below, which is not a type of surveillance? A. Electronic surveillance B. Stationary or fixed point C. Audit D. Tailing Question 37 of 100 Score: 1.5 (of possible 1.5 points) Which amendment to the US constitution protects subjects of covert operations against unreasonable breaches of privacy? A. Fifth Amendment B. Seventh Amendment C. Second Amendment D. Fourth Amendment Question 38 of 100 Score: 1.5 (of possible 1.5 points) You are an investigator on an engagement. You will use surveillance to investigate ________ A. theft acts. B. conversion possibilities. C. concealment possibilities. D. key internal controls. Question 39 of 100 Score: 1.5 (of possible 1.5 points) From the options below, which is not an analytical fraud symptom? A. Consistent cash shortages B. Overriding of existing controls C. Unreasonably high expenses D. Excess purchases Answer Key: B Question 40 of 100 Score: 1.5 (of possible 1.5 points) Identify the stress coping behavior sequence that an individual will often exhibit after committing fraud. A. Fear - Guilt - Stress - Behavior changes B. Guilt - Fear - Stress - Behavior changes C. Fear - Guilt - Behavior changes - Stress D. Guilt - Stress - Fear - Behavior changes Answer Key: B Question 41 of 100 Score: 0 (of possible 1.5 points) An accounting anomaly fraud symptom would include the following exampleA. Excess purchases B. Too many debit or credit memos C. Missing documents D. Inadequate accounting system Question 42 of 100 Score: 1.5 (of possible 1.5 points) A Sr. Accountant makes a fictitious journal entry (an expense transaction) to conceal fraud. This journal entry is an example of which fraud symptom? A. Analytical anomaly B. Unusual behavior C. Internal control weakness D. Accounting anomaly Question 43 of 100 Score: 1.5 (of possible 1.5 points) An individual commits fraud and does not feel stress. This person may be a___________ A. Utilitarian B. Agnostic C. Altruist D. Psychopath Question 44 of 100 Score: 1.5 (of possible 1.5 points) ____________________ is the theft of cash from a victim entity prior to its entry in an accounting system. A. Skimming B. A fictitious disbursement C. Larceny D. Conversion Question 45 of 100 Score: 1.5 (of possible 1.5 points) Which of the following computer audit tests can be used to detect skimming schemes? A. Identifying unique journal entries to the cash account B. Summarizing by employee the difference between the cash receipt report and the sales register system C. Joining the customer statement report file to the accounts receivable and reviewing for balance differences D. Extracting invoices paid by cash Question 46 of 100 Score: 1.5 (of possible 1.5 points) Which of the following techniques is not used to conceal sales skimming schemes? A. Inventory padding B. Recording false voids C. Lapping D. Destroying records of transaction Answer Key: B Question 47 of 100 Score: 1.5 (of possible 1.5 points) To cover up a skimming scheme in which the employee takes cash from the register, the employee must make a voided sale in order for the register to balance. True False Question 48 of 100 Score: 1.5 (of possible 1.5 points) Computing the percentage of assigned time to unassigned time for employees is one method to detect an employee skimming scheme. True False Question 49 of 100 Score: 1.5 (of possible 1.5 points) The concealment of receivables skimming can be difficult because: A. The audit trail must be destroyed. B. The incoming payments are expected. C. All of the above D. Inventory must be padded to conceal shrinkage. Answer Key: B Question 50 of 100 Score: 1.5 (of possible 1.5 points) In the Fraud Tree, asset misappropriations are broken down into cash and non-cash schemes. Which of the following is not considered a misappropriation of cash? A. Concealed expenses B. Larceny C. Skimming D. Fraudulent disbursements Question 51 of 100 Score: 1.5 (of possible 1.5 points) In one of the case studies in the textbook, Brian Lee, a top-notch plastic surgeon, collected payments from his patients without giving a cut to the clinic where he practiced. How was he punished? A. He was convicted of grand larceny and sentenced to probation. B. He was sued in civil court for the amount of the loss. C. He was terminated from the practice and was required to make full restitution in lieu of prosecution. D. He was allowed to continue to practice at the clinic but was required to make full restitution. Question 52 of 100 Score: 1.5 (of possible 1.5 points) In one of the case studies in the textbook, Jerry Harkanell worked as an administrative assistant for a large San Antonio hospital, where his clerical duties included the submission of the payroll information for his unit. He found that he could add hours to the timesheets and receive extra pay. He continued to alter his timesheets until he was finally caught. How was his scheme detected? A. The payroll department sent the timesheets for one pay period back to the supervisor for review when a suspicious number of hours had been indicated. B. An overtime audit was conducted revealing that Harkanell had worked an unusual number of hours compared to others in the department. C. An exception report showed that Harkanell had claimed overtime hours for a period when there was no need to work overtime. D. The internal auditors received an anonymous tip. Question 53 of 100 Score: 1.5 (of possible 1.5 points) Which of the following controls will help prevent and detect falsified hours and salary schemes? A. Supervisors return authorized timecards to the employees for review before they are sent to the payroll department. B. All of the above C. The duties of payroll preparation, authorization, and distribution are segregated. D. Sick leave and vacation time are monitored for excesses by the payroll department. Question 54 of 100 Score: 1.5 (of possible 1.5 points) Which of the following computer audit tests can be used to detect ghost employee schemes? A. Compare employees reported per timecard system to the payroll system. B. Extract all employees without a social security number. C. All of the above D. Extract users who can write checks and also add new employees in the payroll and timecard system. Question 55 of 100 Score: 1.5 (of possible 1.5 points) Orange Publishing hired Moe McDonnell, CFE, to investigate some large variances in the company’s labor costs. While looking through the payroll records for the shipping department, McDonnell noticed several employees who claimed extensive overtime during pay periods in which the company’s incoming and outgoing shipments were minimal. McDonnell pulled the timesheets for these pay periods and noticed that those belonging to the suspect employees had signatures that didn’t match the signatures on the other timesheets. What type of fraud might these findings indicate? A. Commission scheme B. Falsified hours and salary scheme C. Ghost employee scheme D. Overstated expenses scheme Answer Key: B Question 56 of 100 Score: 1.5 (of possible 1.5 points) Comparing actual payroll expenses to budget projections can help identify falsified hours and salary schemes. True False Question 57 of 100 Score: 1.5 (of possible 1.5 points) Which of the following is not a type of payroll scheme? A. Falsified hours and salary scheme B. Ghost employee scheme C. False deduction scheme D. Commission scheme Question 58 of 100 Score: 1.5 (of possible 1.5 points) Salaried ghost employees are generally easier to create and more difficult to conceal than hourly ghost employees True False Question 59 of 100 Score: 1.5 (of possible 1.5 points) Comparing salaried employees’ gross pay from one pay period to the next is one way of testing for payroll fraud. True False Question 60 of 100 Score: 1.5 (of possible 1.5 points) Which group is the primary victim of financial statement fraud? A. Analysts B. Organizations that buy goods or services C. Stockholders D. Middle management Question 61 of 100 Score: 1.5 (of possible 1.5 points) Why does one party usually file a complaint against another in a civil case? A. penalty. B. financial restitution. C. imprisonment. D. proving the other party wrong. Answer Key: B Question 62 of 100 Score: 1.5 (of possible 1.5 points) By what other name is "management fraud" referred to as? A. investment fraud. B. financial statement fraud. C. affinity fraud. D. stockholder fraud. Answer Key: B Question 63 of 100 Score: 1.5 (of possible 1.5 points) What is the burden of proof in a criminal case? A. the preponderance of evidence. B. beyond a reasonable doubt. C. the preponderance of knowledge and power. D. it lies with the defendant. Answer Key: B Question 64 of 100 Score: 1.5 (of possible 1.5 points) What is the burden of proof for a plaintiff to be successful in a civil case? A. To a degree of reasonable mitigation. B. To the standard of prima facie. C. Beyond a reasonable doubt. D. Preponderance of evidence. Question 65 of 100 Score: 1.5 (of possible 1.5 points) In one of the case studies in the textbook, Melissa Robinson, who worked as an executive secretary for a worldwide charitable organization and was active in her children’s school, was also a thief. As one of two people allowed to sign checks on the organization’s bank accounts, she learned early on that she could forge the second person’s signature without anyone becoming suspicious. How was she finally caught? A. The auditors discovered her fraud during an annual audit of the books. B. New officers were elected, and they took the accounting books from her. C. A co-worker contacted the organization’s executive director when she found that a company check had been written to the children’s school for Robinson’s personal items. D. Robinson’s husband tipped off the audit committee after he became suspicious of some of Robinson’s purchases. Answer Key: B Question 66 of 100 Score: 1.5 (of possible 1.5 points) In one of the case studies in the textbook, Ernie Phillips was a CPA who had fallen on hard times both financially and personally. He eventually got a job as a controller for a friend who had just been named as the receiver for a financial services company. Within a short period of time Phillips began writing checks to himself that had nothing to do with payroll. How was the fraud discovered? A. The receiver received a call from the bank asking him to verify a check. B. The president received a bank statement containing canceled checks that had been written to Phillips. C. The operations manager found a check made payable to Phillips while searching Phillips’ desk for some accounting records. D. A vendor received a check in error and reported it to the operations manager. Question 67 of 100 Score: 1.5 (of possible 1.5 points) Mary Duncan is an internal auditor for the Western Realty Group. Recently, she ran a program that extracted checks that were out of the normal sequence. She found that four or five checks were written every month that fit this category. Based on the information given, which of the following schemes is likely occurring? A. Personal purchases scheme B. Shell company scheme C. Forged maker scheme D. Multiple reimbursement scheme Question 68 of 100 Score: 1.5 (of possible 1.5 points) In one of the case studies in the textbook, Ernie Phillips was a CPA who had fallen on hard times both financially and personally. He eventually got a job as a controller for a friend who had just been named as the receiver for a financial services company. Within a short period of time Phillips began writing checks to himself that had nothing to do with payroll. What happened to Phillips? A. He pleaded guilty to fraud and grand theft and spent 24 months in prison. B. He paid the money back by mortgaging his home. C. He quit his job and moved to another state. D. He was charged criminally, and while out on bail, he fled with his family. Question 69 of 100 Score: 1.5 (of possible 1.5 points) In one of the case studies in the textbook, Melissa Robinson, who worked as an executive secretary for a worldwide charitable organization and was active in her children’s school, was also a thief. As one of two people allowed to sign checks on the organization’s bank accounts, she learned early on that she could forge the second person’s signature without anyone becoming suspicious. What red flags were present that indicated that something wasn’t appropriate? A. Robinson would not take vacation leave. B. There were a lot of missing files that the auditors couldn’t locate during their annual audit. C. All of the above D. Robinson would not release any financial information when requested and gave excuses for why it wasn’t available. Question 70 of 100 Score: 1.5 (of possible 1.5 points) In one of the case studies in the textbook, Melissa Robinson, who worked as an executive secretary for a worldwide charitable organization and was active in her children’s school, was also a thief. As one of two people allowed to sign checks on the organization’s bank accounts, she learned early on that she could forge the second person’s signature without anyone becoming suspicious. How was Robinson punished? A. She resigned, and a civil suit was filed to recover the loss. B. She was found guilty and ordered to make restitution to the organization and its insurance company. C. Charges were dismissed with prejudice when the evidence was thrown out on a technicality. D. She was allowed to resign and agreed to pay the money back. Answer Key: B Question 71 of 100 Score: 1.5 (of possible 1.5 points) Mavis Bosman works as an accounts receivable clerk at Brooks Publishing. She steals an incoming check from a customer and cashes it at a grocery store by forging the endorsement on the back of the check. This is an example of a check tampering scheme. True False Question 72 of 100 Score: 1.5 (of possible 1.5 points) Producing a counterfeit check using the company’s logo and bank account number is one type of concealed check scheme. True False Question 73 of 100 Score: 1.5 (of possible 1.5 points) In one of the case studies in the textbook, Bob Walker was the head cashier for a discount drug store who perpetrated his fraud scheme by issuing fictitious refunds. How was the fraud discovered? A. The bookkeeper noticed an unusually large number of policy overrides by Walker. B. The internal auditor developed a computer program that identified cashiers with an unusually high number of returns. C. An anonymous tip from the company’s hotline came into the asset protection department. D. The store manager caught Walker pocketing cash. Question 74 of 100 Score: 1.5 (of possible 1.5 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, register disbursement schemes were the most frequently reported type of fraudulent disbursement scheme. True False Question 75 of 100 Score: 1.5 (of possible 1.5 points) When an employee perpetrates a credit card refund scheme, the perpetual inventory will show a greater amount than the physical inventory. True False Question 76 of 100 Score: 1.5 (of possible 1.5 points) Nicolas Barrens conspired with his manager to steal nearly $6,000 over 2 months from the grocery store where they worked. Each time Nicolas rang up a customer at the register, he asked the customer if he’d like a receipt. When a customer said no, Nicolas pretended to discard the receipt in the trash, but actually slipped the receipt into his pocket. At the end of his shift, he filled out a void slip for each of these sales and submitted them to his supervisor for approval. With the original receipt and the approved void slip, Nicolas removed cash from the register in the amount of the voided sales and split the proceeds with his supervisor. Nicolas committed what type of fraud scheme? A. Skimming B. None of the above C. False voids D. Fictitious expenses Question 77 of 100 Score: 1.5 (of possible 1.5 points) Leslie White, CFE, was called in to investigate suspicious activity at Anderson’s Department Store. During her investigation, she ran a test to search for customer sales and refunds that occurred on the same day. She also summarized refunds by employee and extracted the names of all employees who can post both refunds and inventory adjustments. What type of scheme is Leslie most likely looking for? A. Skimming B. Unconcealed larceny C. Fictitious refunds D. Fraudulent reimbursements Question 78 of 100 Score: 1.5 (of possible 1.5 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, median losses due to register disbursement schemes were the highest of all the fraudulent disbursement schemes. True False Question 79 of 100 Score: 1.5 (of possible 1.5 points) An excessive number of reversing sales transactions at the register is an indicator of which of the following schemes? A. Register disbursement B. Multiple reimbursements C. Skimming D. Pass-through scheme Question 80 of 100 Score: 1.5 (of possible 1.5 points) In one of the case studies in the textbook, Bob Walker was the head cashier for a discount drug store who perpetrated his fraud scheme by issuing fictitious refunds. What happened to Walker? A. The store terminated his employment and accepted a promissory note for the amount stolen in return for not turning him over to the police. B. His parole for a previous conviction was revoked and he was returned to prison. C. He was arrested, but disappeared after making bail. D. He was placed on probation and ordered to make full restitution. Question 81 of 100 Score: 1.5 (of possible 1.5 points) What is the last stage in the current (default) model that most organizations typically use for dealing with fraud? A. Investigation B. Fraud incident C. Action D. Resolution Question 82 of 100 Score: 1.5 (of possible 1.5 points) Control activities can be either a preventive control or a detective control. From the options below, which is a detective control? A. Segregation of duties B. System of authorizations C. Independent checks D. Physical safeguards Question 83 of 100 Score: 1.5 (of possible 1.5 points) The most common way in which fraud is detected is through … A. auditors. B. discouraging collusion. C. monitoring employees. D. tips and complaints. Question 84 of 100 Score: 1.5 (of possible 1.5 points) The overall tone of the organization that management establishes through its modeling and labeling, organization, communication, and other activities is called the________ A. support network B. risk mitigation channel C. control environment D. detection framework Question 85 of 100 Score: 1.5 (of possible 1.5 points) From the options below, which allows managers to become aware of employees’ pressures, problems, and rationalizations thereby enabling them to take fraud prevention steps? A. Pygmalion effect B. Office grapevine C. Open door policies D. Code of ethics Question 86 of 100 Score: 1.5 (of possible 1.5 points) Which of the following actions is least likely to help prevent and detect schemes involving fraudulent invoices from non-accomplice vendors? A. Separating the duties of purchasing, authorizing, and distributing payments B. Matching all bank statement items to canceled checks C. Marking “paid” on every voucher that has been paid D. Verifying vendor address changes before disbursements are issued Answer Key: B Question 87 of 100 Score: 1.5 (of possible 1.5 points) Warning signs of a shell company scheme include which of the following? A. Invoices lacking details of the items purchased B. A vendor that is not listed in the phone book C. An unexpected and significant increase in “consulting expenses” D. All of the above Question 88 of 100 Score: 1.5 (of possible 1.5 points) In a shell company scheme, which of the following methods might a fraudster use to get a phony invoice approved for payment? A. Any of the above B. Collusion C. Falsification of purchase orders and receiving reports D. A “rubber stamp” supervisor Question 89 of 100 Score: 1.5 (of possible 1.5 points) In one of the case studies in the textbook, Albert Miano, the facilities supervisor for a popular magazine, submitted phony invoices. When Miano received the checks for the phony invoices, he forged the contractor’s signature. He then endorsed the check in his own name. What controls weaknesses did the company have that facilitated Miano’s scheme? A. Accounts payable never checked signatures on the invoices against the authorized signatures on file. B. Miano was allowed to pick up the approved invoices from the administrative vicepresident’s office and deliver them to the accounts payable department. C. Employees in the accounts payable department did not follow departmental procedures. D. All of the above Question 90 of 100 Score: 1.5 (of possible 1.5 points) Which of the following computer audit tests can be used to detect billing schemes? A. Extracting delivery addresses that do not correspond to company locations B. Extracting a sample of vendor open invoices for confirmation with the vendor C. Extracting manual checks and summarizing by vendor and issuer D. All of the above Question 91 of 100 Score: 1.5 (of possible 1.5 points) Purchasing personal items using an organization’s money is what type of scheme? A. Billing scheme B. Skimming scheme C. Pay-and-return scheme D. Larceny scheme Question 92 of 100 Score: 1.5 (of possible 1.5 points) According to the 2012 Report to the Nations on Occupational Fraud and Abuse, the most common fraudulent disbursement schemes were: A. Billing schemes B. Payroll schemes C. Register disbursement schemes D. Check tampering schemes Question 93 of 100 Score: 1.5 (of possible 1.5 points) Sally Fuller is a buyer for GWA publishing company. Her job is to purchase supplies and services for the printing of technical manuals. Her brother sets up a printing company, and Sally hires him to print most of these manuals for GWA. However, rather than actually printing the manuals, her brother hires another printer to do the work, then sells the printed manuals to GWA at a 50 percent markup. As a result, his prices are much higher than the other printers who serve GWA. This type of scheme is most likely a: A. Non-accomplice vendor scheme B. Pay-and-return scheme C. Pass-through scheme D. Inventory-markup scheme Question 94 of 100 Score: 1.5 (of possible 1.5 points) Once sufficient predication has been established, what is the first step a fraud examiner following the fraud theory approach should take? A. Create a hypothesis. B. Interview the suspect. C. Analyze data. D. Interview witnesses. Question 95 of 100 Score: 1.5 (of possible 1.5 points) Research in the Hollinger-Clark study suggests that the best way to deter employee theft is by: A. Strengthening internal controls B. Communicating the organization’s fraud policies to employees C. Increasing sanctions imposed on occupational fraudsters D. Increasing the perception of detection Question 96 of 100 Score: 1.5 (of possible 1.5 points) In the 2012 Report to the Nations on Occupational Fraud and Abuse, financial statement fraud had a higher median loss than asset misappropriation and corruption schemes. True False Question 97 of 100 Score: 1.5 (of possible 1.5 points) When Jill Michaels, an assistant to the director of procurement, moved into her new home, she used the company’s flat bed truck to move her furnishings on an afternoon when her boss was out of town. Which of the following best describes Michael’s act? A. Larceny B. Fraud C. Abuse D. Embezzlement Question 98 of 100 Score: 1.5 (of possible 1.5 points) Richard Moore is the controller for Ajax Company. Recently, he suffered several large losses at the race track, causing him to incur enormous personal debts. Which type of non-sharable financial problem best describes Richard’s situation? A. Business reversal B. Violation of ascribed obligations C. Status gaining D. Physical isolation Answer Key: B Question 99 of 100 Score: 1.5 (of possible 1.5 points) Who developed the Fraud Scale? A. Richard C. Hollinger B. Donald R. Cressey C. W. Steve Albrecht D. Joseph T. Wells Question 100 of 100 Score: 1.5 (of possible 1.5 points) The basic tenet of Edwin Sutherland’s theory of differential association is that crime is passed on genetically; that is, the offspring of criminals commit crimes because their parents did. True False [Show More]

Last updated: 1 year ago

Preview 1 out of 189 pages

Add to cart

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

We Accept:

We Accept

Reviews( 0 )

$10.50

Add to cart

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
50
0

Document information


Connected school, study & course


About the document


Uploaded On

Oct 12, 2020

Number of pages

189

Written in

Seller


seller-icon
QuizMaster

Member since 4 years

1092 Documents Sold


Additional information

This document has been written for:

Uploaded

Oct 12, 2020

Downloads

 0

Views

 50

Document Keyword Tags


$10.50
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·