Next Question >>

Question 1/87

Martin worked in the warehouse of a large electronics distributor. When a shipment of five hundred cameras arrived, Martin stole one hundred of the units. He sent a receiving report to accounts payable indicating that all five hundred cameras arrived. However, he altered the copy used for the inventory records to indicate that only four hundred of the units were received so that the available inventory would match the perpetual inventory records. What type of scheme did Martin commit?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (87q)
Question 1: Martin worked in the warehouse of a large electronics distri...
Question 2: ____________ is a process by which a bookkeeper records all ...
Question 3: Which of the following statements is TRUE with regard to the...
Question 4: __________ is required if and when officers, executives or o...
Question 5: A financial manager who pressures investors to take regular ...
Question 6: Which of the following is an insurance fraud detection tool ...
Question 7: Hamed works as an intelligence professional for Iriam intell...
Question 8: The _______________ cost method of pricing would carry an as...
Question 9: One final means of concealing a register scheme, as with man...
Question 10: Which of the following is FALSE concerning methods corporate...
Question 11: Which of the following is one of the categories on the state...
Question 12: Which of the following statements regarding new account frau...
Question 13: Undisclosed payments made by vendors to employees of purchas...
Question 14: Which of the following is NOT the phase of the bidding proce...
Question 15: When a victim company purchases unnecessary goods or service...
Question 16: Because sales skimming is an off-book fraud scheme, it is un...
Question 17: The essential elements of a ________ are an actual or constr...
Question 18: Which of the following actions could management take to make...
Question 19: According to fraud tree, cash has three following schemes:...
Question 20: Bid-rigging scheme occurs when:...
Question 21: Which of the following would NOT be considered a conflict of...
Question 22: A technique by which checks are numbered using a new techniq...
Question 23: Which of the following statements is FALSE with regard to co...
Question 24: _________ is defined as a person who works for the victim or...
Question 25: A person is said to be in ________ act, when the business wh...
Question 26: Asset misappropriation schemes were the "middle children" of...
Question 27: Inventory shrinkage is the unaccounted-for reduction in the ...
Question 28: Assets that are long-lived and that differ from property, pl...
Question 29: Which of the following must be present for a fraud to exist?...
Question 30: Bank cut-off statements should be requested for 10-15 days a...
Question 31: Which of the following is the MOST ACCURATE statement about ...
Question 32: Which of the following scenarios describes an electronic fun...
Question 33: The principal way to detect omitted credits from books of ac...
Question 34: A __________ is a day-by-day, or chronological, record of tr...
Question 35: In which phase of competitive bidding process, fraudsters at...
Question 36: To help prevent fraudulent billing schemes, it is recommende...
Question 37: Verify supporting documentation on outstanding checks writte...
Question 38: The person or persons who have access to __________ are ofte...
Question 39: __________ inventory and other assets is relatively common w...
Question 40: Physical tampering prevention is a check tampering technique...
Question 41: Theft of incoming checks usually occurs when ________ is (ar...
Question 42: ____________ is a summary of the account balances carried in...
Question 43: When an employee processes a fictitious refund of goods, the...
Question 44: Which of the following scenarios is an example of an electro...
Question 45: Which of the following is not the skimming scheme?...
Question 46: A typical issue involving material and fraud would be:...
Question 47: After a government health care program pays for Marco's appe...
Question 48: Which of the following is a common red flag of a bid tailori...
Question 49: The fraudsters' interest lies with an employer other than a ...
Question 50: Which of the following factors is NOT included in most finan...
Question 51: The most basic skimming scheme occurs when:...
Question 52: Which sale occurs when the accomplice of the employee-frauds...
Question 53: Which of the following statements describes a best practice ...
Question 54: Bayan finds a residential property with an owner who lives f...
Question 55: The price of an asset on which the asset is selling at on th...
Question 56: In ___________ scheme, an employee creates false vouchers or...
Question 57: A fabricated name and the post office box that an employee u...
Question 58: The scheme in which the same vendor is receiving favorable t...
Question 59: Which of the following is NOT a way that dishonest contracto...
Question 60: Revenue is recognized when it is:...
Question 61: Neil, a Certified Fraud Examiner (CFE), discovers that a bor...
Question 62: Depreciation is especially applicable when companies try to ...
Question 63: Persuasive evidence of an arrangement does not exist when:...
Question 64: In which of the following process, all bidders are legally s...
Question 65: According to Marshall, ______ are probable future economic b...
Question 66: What is sometimes used to overcome well-designed internal co...
Question 67: _____________ involves purposeful misreporting of financial ...
Question 68: One reason employees might be hesitant to use PO boxes in sh...
Question 69: Which of the following is NOT the type of billing scheme?...
Question 70: Which of the following fraud schemes is MOST LIKELY to targe...
Question 71: All of the following are basic methods used to prove corrupt...
Question 72: A running count that records how much inventory should be on...
Question 73: Asset misappropriations have an effect on the liabilities an...
Question 74: A tangible asset is one which is:...
Question 75: Which of the following is the MOST APPROPRIATE technique for...
Question 76: Skimming is:
Question 77: In physical tampering prevention technique, hidden images ca...
Question 78: Vertical analysis can BEST be described as:...
Question 79: Which of the following is NOT a measure commonly taken by fr...
Question 80: ____________ corrupt employees can cause inventory to be fra...
Question 81: To keep the accounting equation in balance, which of the fol...
Question 82: The principle behind full disclosure is:...
Question 83: Which of the following is an example of a technical security...
Question 84: ______________ is required not only for theft, but for proce...
Question 85: Schemes in which an employee physically misappropriates cash...
Question 86: _________ normally are carried on an organization's books as...
Question 87: Which of the following is NOT a method of identity theft pre...