Which of the following is MOST ACCURATE concerning common methods that identity thieves use to steal information?
Answer : A
Which of the following would NOT be helpful in the prevention of expense reimbursement schemes?
Answer : B
All of the following items appear on the balance sheet EXCEPT:
Answer : D
Which of the following is an example of a corruption scheme?
Answer : B
Green, an employee of ABC Corporation, formed a company called Acme Consulting. He opened a bank account in Acme’s name and used his home computer to create invoices from Acme for “consulting services.” In reality, Acme does not provide any services at all. It is a company in name only. Green submitted the invoices from Acme Consulting to his employer, ABC Corporation. When ABC made payment on the false invoices, Green collected and deposited them. What type of scheme has Green committed?
Answer : A
Which of the following is a recommended activity that organizations should engage in to protect their proprietary information from threats?
Answer : B
To detect health care provider fraud, a fraud examiner should be alert for which of the following red flags?
Answer : C
Natalie, a Certified Fraud Examiner (CFE), is tasked with overseeing cybersecurity protocols for her employer, including identifying potential indicators of intrusion, or unauthorized access, to the organization’s computer network. Which of the following could potentially indicate that the organization’s network has been accessed or compromised?
Answer : D
Vertical analysis can BEST be described as:
Answer : C
Which of the following statements is FALSE with regard to counterfeit credit and debit cards?
Answer : B
What type of fraud scheme would an analysis of payroll withholdings be MOST LIKELY to reveal?
Answer : B
All of the following methods would be helpful in detecting a skimming scheme EXCEPT:
Answer : C
All of the following measures would help prevent the theft of company inventory EXCEPT:
Answer : D
Which of the following statements regarding financial statement disclosures is FALSE?
Answer : C
June, a 76-year-old woman, receives a phone call from a man impersonating one of her relatives. He claims to have a lot of debt and asks her to secretly send him money so that the rest of the family will not find out. June has MOST LIKELY been victimized by which of the following schemes?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us