New Year Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Question and Answers

Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam

Last Update Jan 14, 2026
Total Questions : 235

We are offering FREE CFE-Financial-Transactions-and-Fraud-Schemes ACFE exam questions. All you do is to just go and sign up. Give your details, prepare CFE-Financial-Transactions-and-Fraud-Schemes free exam questions and then go for complete pool of Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam test questions that will help you more.

CFE-Financial-Transactions-and-Fraud-Schemes pdf

CFE-Financial-Transactions-and-Fraud-Schemes PDF

$36.75  $104.99
CFE-Financial-Transactions-and-Fraud-Schemes Engine

CFE-Financial-Transactions-and-Fraud-Schemes Testing Engine

$43.75  $124.99
CFE-Financial-Transactions-and-Fraud-Schemes PDF + Engine

CFE-Financial-Transactions-and-Fraud-Schemes PDF + Testing Engine

$57.75  $164.99
Questions 1

Warner is part of management at ABC Corporation. He has been asked to implement measures to help prevent fraudulent billing schemes. Which of the following measures would likely be MOST EFFECTIVE?

Options:

A.  

Requiring all fraud tips to be reported to employees' direct supervisors

B.  

Combining the purchasing and payment functions within a single department

C.  

Enforcing competitive bidding from potential vendors

D.  

Using an external vendor to negotiate procurement contracts

Discussion 0
Questions 2

Every bribe is a two-sided transaction, in which where a vendor bribes a purchaser, there is someone on the vendor’s side of the transaction who is not making an illicit payment.

Options:

A.  

True

B.  

False

Discussion 0
Questions 3

“Anticipate possible losses and omit potential profits”, this results in:

Options:

A.  

Asymmetrical accounting

B.  

Symmetrical accounting

C.  

Playing accounting

D.  

Bearing accounting

Discussion 0
Questions 4

A running count that records how much inventory should be on hand is referred to:

Options:

A.  

Altered inventory

B.  

Perpetual inventory

C.  

Shrinking inventory

D.  

Fictitious inventory

Discussion 0
Questions 5

Which of the following must be present for a fraud to exist?

Options:

A.  

A material false statement

B.  

Knowledge that the statement was false when it was uttered

C.  

Reliance on the false statement by the victim

D.  

All of the above

Discussion 0
Questions 6

Which of the following would be MOST INDICATIVE of loan fraud in a draw request submitted by a construction developer?

Options:

A.  

The developer's personal account statements have been omitted.

B.  

Change orders have been included.

C.  

Lien releases from subcontractors are not included with the request.

D.  

There are several inspection reports.

Discussion 0
Questions 7

The behavior profile of employees who are involved in bribery schemes may include:

Options:

A.  

Gambling habit

B.  

Extravagant lifestyle

C.  

Drug and/or alcohol addiction

D.  

All of the above

Discussion 0
Questions 8

__________ are the amounts which are owed to other entities:

Options:

A.  

Supplies

B.  

Expenses

C.  

Assets

D.  

Liabilities

Discussion 0
Questions 9

The difference between assets and liabilities is called:

Options:

A.  

Equity

B.  

Expense

C.  

Revenue

D.  

Income statement

Discussion 0
Questions 10

Which of the following is a TRUE statement about counterfeit payment cards?

Options:

A.  

The hologram on payment cards is relatively simple to reproduce.

B.  

The production of counterfeit payment cards is too complicated for the use of high-speed printers.

C.  

Counterfeit payment cards can be created with blank plastic cards.

D.  

All of the above are true statements about counterfeit payment cards.

Discussion 0
Questions 11

White used a company vehicle for unauthorized, personal purposes while working in a different city. He provided false written and oral information regarding the use of the vehicle. The vehicle was returned without damages. What type of fraud did White commit?

Options:

A.  

White did not commit fraud

B.  

An expense reimbursement scheme

C.  

A misuse of a noncash asset

D.  

A financial statement fraud scheme

Discussion 0
Questions 12

Conflict of interest cases are more easily prevented than detected.

Options:

A.  

True

B.  

False

Discussion 0
Questions 13

Which of the following is an example of a technical security control that organizations can use to secure computer systems and communication networks?

Options:

A.  

Application security

B.  

Human audits

C.  

Penetration testing

D.  

Data security

Discussion 0
Questions 14

Which of the following is a recommended activity that organizations should engage in to protect their proprietary information from threats?

Options:

A.  

Enlisting a company task force to identify the information security practices of competitors

B.  

Practicing data minimization to limit the information available during a data breach

C.  

Storing devices that contain sensitive data in specially constructed quiet rooms

D.  

Prohibiting all nonemployees from entering the organization's premises

Discussion 0
Questions 15

Which of the following is a method of identity theft prevention that is recommended for businesses?

Options:

A.  

Use government identification numbers as employee identification numbers

B.  

Audit practices involving the handling of information only when regulators require it

C.  

Use encryption only when sending personal information externally through a hardwired internet connection

D.  

Collect government identification numbers from customers only when legally required to gather that information

Discussion 0
Questions 16

__________ means that traditional bribery statutes proscribe only payments made to influence the decisions of government agents or employees.

Options:

Discussion 0
Questions 17

__________ inventory and other assets is a relatively common way for fraudsters to remove assets from the books before or after they are stolen.

Options:

A.  

Altered

B.  

Perpetual

C.  

False shipping slip

D.  

Write-offs

Discussion 0
Questions 18

Persuasive evidence of an arrangement does not exist when:

Options:

A.  

Revenue and corresponding expenses don’t match each other.

B.  

No written or verbal agreement exists.

C.  

Timings not meet properly.

D.  

Capitalized expenses and Liabilities will not be up to satisfied level.

Discussion 0
Questions 19

In ____________ scheme, a supplier pays an employee of the purchasing company to write specifications that will require amendments at a later date.

Options:

A.  

Deliberate writing of vague specifications

B.  

Need recognition

C.  

False specification

D.  

Bid-splitting

Discussion 0
Questions 20

The most basic skimming scheme occurs when:

Options:

A.  

An employee sells goods or services to a customer, collects the customer’s payment, but makes no record of the sale.

B.  

An employee buys goods or services from a customer, drops the customer’s payment, but makes no record of the purchase.

C.  

An employee sells goods or services to a stakeholder, collects the stakeholder’s payment and makes record of the sale too.

D.  

An employee buys goods or services from a stakeholder, drops the stakeholder’s payment and makes record of the purchase too.

Discussion 0
Questions 21

In which phase of the competitive bidding process do fraudsters attempt to influence the selection of a contractor by restricting the pool of competitors from whom bids are sought?

Options:

A.  

Need recognition

B.  

Solicitation

C.  

False specification

D.  

Submission

Discussion 0
Questions 22

Which of the following are not basic types of non-sharable problems?

Options:

A.  

Violation of ascribed obligations

B.  

Business reversals

C.  

Physical isolation

D.  

Larceny by fraud

Discussion 0
Questions 23

Which of the following ratios can be used to determine the efficiency with which a company uses its assets?

Options:

A.  

Quick ratio

B.  

Receivable turnover ratio

C.  

Debt-to-equity ratio

D.  

Asset turnover ratio

Discussion 0
Questions 24

Which of the following is a red flag that might indicate that someone is attempting to commit insurance fraud?

Options:

A.  

A claim is made soon after an insurance policy commences.

B.  

The insured made one other insurance claim within the past five years.

C.  

A burglary loss claim includes small electronic items and jewelry.

D.  

A theft claim includes items that were purchased recently and the receipts.

Discussion 0
Questions 25

Which of the following actions can make mobile payments more secure?

Options:

A.  

Using the same log-in credentials for all payment applications

B.  

Activating biometric authentication to verify the user's identity

C.  

Disabling the biometric features on a newer mobile device

D.  

None of the above

Discussion 0
Questions 26

The person or persons who have access to __________ are often the targets of unethical vendors seeking an advantage in the process.

Options:

A.  

Bid-splitting

B.  

Sealed bids

C.  

General purchasing

D.  

Tailor specifications

Discussion 0
Questions 27

In the fraud scale, pressure, opportunity, and integrity variables all result in a list of ___ possible red flags or indicators of occupational fraud and abuse.

Options:

A.  

81

B.  

82

C.  

83

D.  

84

Discussion 0
Questions 28

A tangible asset is one which is:

Options:

A.  

Capable of being perceived

B.  

Capable of being appraised

C.  

Both A & B

D.  

Neither A nor B

Discussion 0
Questions 29

Which of the following factors is NOT included in most financial statement schemes?

Options:

A.  

Fictitious revenues

B.  

Persuasive Evidence

C.  

Concealed liabilities and expenses

D.  

Improper asset valuations

Discussion 0
Questions 30

Larceny is the scheme in which an employee simply takes inventory from the company premises without attempting to conceal it in the books and records.

Options:

A.  

True

B.  

False

Discussion 0
Questions 31

A fraudster creates a fictitious identity by combining a person's real government identification number with a fabricated name and birthdate. This scheme can BEST be described as:

Options:

A.  

Synthetic identity theft

B.  

Simulated identity theft

C.  

Traditional identity theft

D.  

Criminal identity theft

Discussion 0
Questions 32

To detect fraud committed by a health care provider, a fraud examiner should look for which of the following red flags?

Options:

A.  

The number of claims made by the provider for reimbursement are lower than average.

B.  

There is a high percentage of coding outliers in the provider's documentation.

C.  

The details in the provider's supporting documentation match the health care claim.

D.  

The provider has unusually low profits compared to similar businesses in the same region.

Discussion 0
Questions 33

___________ and __________ are used to increase (or decrease) the equity account.

Options:

A.  

Journal Entries & Debit

B.  

Journal Entries & Transactions

C.  

Journal Entries & Credit

D.  

None of all

Discussion 0
Questions 34

To prevent expense reimbursement fraud, it is recommended that companies require employees to submit receipts electronically.

Options:

A.  

True

B.  

False

Discussion 0
Questions 35

Employees steal an incoming payment and then place the incoming funds in an interest-bearing account for:

Options:

A.  

Converting stolen checks

B.  

Concealing the fraud

C.  

Short-term skimming

D.  

All of the above

Discussion 0
Questions 36

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:

Options:

A.  

Human intelligence

B.  

Baiting

C.  

Scavenging

D.  

Open-source intelligence

Discussion 0
Questions 37

Which of the following is a condition that facilitates insider cyberfraud?

Options:

A.  

Access logs are not reviewed by management.

B.  

Production programs are run during the business day.

C.  

Access privileges are restricted to assigned job functions.

D.  

Separation of duties exists in the data center.

Discussion 0
Questions 38

What type of fraud scheme would MOST LIKELY be revealed by comparing a company's personnel records with its payroll records to identify duplicate addresses and government identification numbers?

Options:

A.  

A fraudulent commissions scheme

B.  

A falsified hours and salary scheme

C.  

An expense reimbursement scheme

D.  

A ghost employee scheme

Discussion 0
Questions 39

Which of the following are used in a short-term skimming scheme?

Options:

A.  

Unrecorded sales, understated sales, and theft of incoming checks

B.  

Unrecorded sales, understated sales, and dual endorsements

C.  

False company accounts, understated sales, and theft of incoming checks

D.  

Understated sales, theft of incoming checks, and check-for-currency substitutions

Discussion 0
Questions 40

Which of the following offender types are people who take the money and run away?

Options:

A.  

Absconders

B.  

Long-term violators

C.  

Offender types

D.  

None of the above

Discussion 0
Questions 41

Which of the following is the MOST APPROPRIATE technique for detecting a cost mischarging scheme?

Options:

A.  

Reviewing the inspection and testing reports of questioned goods or materials

B.  

Comparing the direct and indirect labor account totals from the prior year to the current year

C.  

Inspecting questioned goods or materials by examining packaging, appearance, and description

D.  

Examining any change orders submitted by a contractor that add new items

Discussion 0
Questions 42

Which of the following scenarios BEST describes an electronic funds transfer (EFT) fraud scheme?

Options:

A.  

An individual uses another person's personal identifying information to fill out a credit card application in their name and plans to make online purchases using the new card.

B.  

A hacker obtains the account and password information of consumers and uses them to direct funds from their accounts.

C.  

A restaurant server secretly scans a customer's credit card information into a small device for fraudulent use at a later time.

D.  

An employee of a person-to-person (P2P) provider misrepresents the number of hours that they worked to increase the amount of money earned on their paycheck.

Discussion 0
Questions 43

Occupational fraud and abuse is a (an) __________ of doing business, in much the same way that we pay expenses for electricity, taxes, and wages.

Options:

A.  

Equity

B.  

Balance sheet

C.  

Expense

D.  

Financial record

Discussion 0
Questions 44

Which of the following statements is MOST ACCURATE regarding financial reporting practices and accounting frameworks, such as U.S. generally accepted accounting principles (GAAP) and International Financial Reporting Standards (IFRS)?

Options:

A.  

The financial reporting practices that a publicly traded company must follow are determined by the company's jurisdiction.

B.  

All publicly traded companies are required to adopt either U.S. GAAP or IFRS as their accounting framework.

C.  

Organizations that conduct business internationally must adopt IFRS as their accounting framework for financial reporting.

D.  

U.S. GAAP is a principle-based accounting framework, and IFRS is a rules-based accounting framework.

Discussion 0
Questions 45

Which of the following is NOT the reason why senior management will overstate business statements?

Options:

A.  

Comply with debt covenants

B.  

Meet personal performance criteria

C.  

Trigger performance-related compensation

D.  

Show a pattern of growth to support sale of a business

Discussion 0
Questions 46

The act of an official or fiduciary person who unlawfully and wrongfully uses his station or character to procure some benefit, contrary to duty and rights of others, is called:

Options:

A.  

Conflict of interest

B.  

Corruption

C.  

Bribery

D.  

Overbilling

Discussion 0
Questions 47

__________ may be defined as the offering, giving, receiving, or soliciting anything of value to influence an official act.

Options:

A.  

Corruption

B.  

Diverting business to vendors

C.  

Bribery

D.  

Lacking approval authority

Discussion 0
Questions 48

Another way to eliminate competition in the solicitation phase of the selection process is to:

Options:

A.  

Solicit bids from fictitious suppliers

B.  

Solicit transactions from fictitious vendors

C.  

Solicit bid-splitting from fictitious vendors

D.  

None of the above

Discussion 0
Questions 49

Which of the following scenarios is an example of upcoding?

Options:

A.  

Cindy receives payment in exchange for allowing an unnecessary surgical procedure to be completed on her that is then billed to her health care program

B.  

Dr. Loomis uses three procedure codes when submitting a claim for a surgery that she performed that is supposed to be billed using one procedure code

C.  

Landon inflates a medical bill that he wants to receive reimbursement for by misrepresenting the amount of the bill

D.  

Dr. Raul advises a patient with a small fracture in her leg to use crutches, but he submits the claim using a code to indicate that he placed a cast on the patient

Discussion 0
Questions 50

Which of the following is NOT a method for stealing inventory and other assets?

Options:

A.  

Larceny schemes

B.  

Asset requisition and transfer

C.  

Purchasing and receiving schemes

D.  

Sales & Equipment handling

Discussion 0
Questions 51

Which of the following is a common way that dishonest contractors collude to evade the competitive bidding process?

Options:

A.  

Arranging an agreement with competitors to divide and allocate markets

B.  

Submitting bids on fake contracts to give the appearance of genuine competition

C.  

Using different publications to publish their bid solicitations

D.  

Submitting invoices for work that was not performed on joint projects

Discussion 0
Questions 52

According to the Fraud Tree, cash has three following schemes:

Options:

A.  

Skimming, cash larceny, and fraudulent disbursements

B.  

Fraud analysis, skimming, and cash misappropriations

C.  

Cash larceny, cash distribution, and fraudulent disbursements

D.  

Cash distribution, skimming, and fraud analysis

Discussion 0
Questions 53

Statistical sampling enables the examiner to predict the occurrence rate for the population and therefore determine with some accuracy the error rate, or the potential for fraud.

Options:

A.  

True

B.  

False

Discussion 0
Questions 54

Entering a sales total lower than the amount actually paid by the customer is called:

Options:

A.  

Underrings a sale

B.  

Recording a sale procedure

C.  

Internal sales audits

D.  

All of the above

Discussion 0
Questions 55

Which of the following fraud schemes is MOST LIKELY to target members of a religious community?

Options:

A.  

Affinity fraud

B.  

Social control fraud

C.  

Bait and switch scheme

D.  

Advance-fee scheme

Discussion 0
Questions 56

Skimming is:

Options:

A.  

The removal of cash from a victim entity prior to its entry in an accounting system.

B.  

The addition of cash from a victim entity prior to its entry in an accounting system.

C.  

The removal of cash from a victim entity after its entry in an accounting system.

D.  

None of above

Discussion 0
Questions 57

Financial statement fraud is BEST described as the intentional or accidental misstatement of amounts in the financial statements.

Options:

A.  

True

B.  

False

Discussion 0
Questions 58

Baker, an employee of ABC Corporation, was the only employee who had control of the purchasing function for his department. Baker authorized the purchase of supplies that ABC did not need and used these supplies to make improvements to his house. This is an example of what kind of fraud?

Options:

A.  

Pay and return scheme

B.  

Personal purchases with company funds

C.  

Pass-through scheme

D.  

Theft of inventory

Discussion 0
Questions 59

Which of the following is a red flag of a Ponzi scheme?

Options:

A.  

There is pressure to take payouts rather than reinvest profits.

B.  

The financial manager manages, administers, and retains custody of investment funds.

C.  

The investment strategy is very easy to understand.

D.  

A firm has a history of returns on investments that fluctuate based on market conditions.

Discussion 0
Questions 60

Any expenses that are incurred but not paid by the end of the year are counted in our records of profit and loss, and are called:

Options:

A.  

Accruals

B.  

Depreciations

C.  

Expenses

D.  

Financial record

Discussion 0
Questions 61

Bid-rigging scheme occurs when:

Options:

A.  

An employee fraudulently assists a vendor in winning a contract through the competitive bidding process.

B.  

An employee does not assist a vendor in winning a contract through the competitive bidding process.

C.  

An employee once assists a vendor in winning a contract through a single competitive bidding process.

D.  

An employee once assists a vendor in winning a contract through a single competitive bidding process.

Discussion 0
Questions 62

All the following are basic methods used to prove corrupt payments in corruption schemes EXCEPT:

Options:

A.  

Making inquiries to the relevant Administration of Taxation

B.  

Secretly infiltrating ongoing transactions

C.  

Using an inside witness

D.  

Identifying and tracing payments through audit steps

Discussion 0
Questions 63

Reconciling the sales records to the cash receipts is an effective way to detect a sales skimming scheme.

Options:

A.  

True

B.  

False

Discussion 0
Questions 64

Which of the following is NOT a phase of the bidding process?

Options:

A.  

Presolicitation

B.  

Postsolicitation

C.  

Solicitation

D.  

Submission

Discussion 0
Questions 65

Accounting records are designed to be kept on subjective rather than objective evidence.

Options:

A.  

True

B.  

False

Discussion 0
Questions 66

Which of the following is FALSE concerning methods that corporate spies generally use to steal information from other organizations?

Options:

A.  

Spies often create counterfeit employee badges to gain entry into a target company.

B.  

Spies often gain direct access to a target company by obtaining employment as a security officer or a member of the maintenance staff.

C.  

Spies primarily use social engineering to search for confidential information on employee desks or workstations at the target company.

D.  

Spies use technical surveillance to obtain nondocumentary information about target companies that cannot be found through open sources.

Discussion 0
Questions 67

Which of the following scenarios is the MOST ACCURATE example of insurer health care fraud?

Options:

A.  

While acting as an intermediary for a government health care program, the insurance company verifies provider claims before billing the government for them.

B.  

To obtain regulatory approval for increasing its rates, the insurance company submits inflated cost data for review.

C.  

After negotiating discounts with its medical providers, the insurance company provides the negotiated rate to its consumers instead of the original amount.

D.  

Upon identifying that a claimant has provided incomplete information, the insurance company refuses to pay a claim.

Discussion 0
Questions 68

Which of the following is a common red flag of a bid tailoring scheme?

Options:

A.  

The procuring entity's request for bid submissions provides clear bid submission information.

B.  

There are unusually narrow specifications for the type of goods being procured.

C.  

The procuring entity rebids contracts because fewer than the minimum number of bids are received.

D.  

Numerous bidders respond to the procuring entity's bid requests.

Discussion 0
Questions 69

_________ is defined as a person who works for the victim organization and who is the primary culprit.

Options:

Discussion 0
Questions 70

Which of the four basic measures, if properly installed and implemented, may help prevent inventory fraud?

Options:

A.  

Proper documentation, segregation of duties, independent checks, and physical safeguards

B.  

Proper documentation, segregation of duties, independent checks, and inventory control

C.  

Proper documentation, physical padding, independent checks, and physical safeguards

D.  

Prenumbered affiliations, segregation of duties, independent checks, and physical safeguards

Discussion 0