<< Prev Question Next Question >>

Question 76/87

Skimming is:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (87q)
Question 1: Martin worked in the warehouse of a large electronics distri...
Question 2: ____________ is a process by which a bookkeeper records all ...
Question 3: Which of the following statements is TRUE with regard to the...
Question 4: __________ is required if and when officers, executives or o...
Question 5: A financial manager who pressures investors to take regular ...
Question 6: Which of the following is an insurance fraud detection tool ...
Question 7: Hamed works as an intelligence professional for Iriam intell...
Question 8: The _______________ cost method of pricing would carry an as...
Question 9: One final means of concealing a register scheme, as with man...
Question 10: Which of the following is FALSE concerning methods corporate...
Question 11: Which of the following is one of the categories on the state...
Question 12: Which of the following statements regarding new account frau...
Question 13: Undisclosed payments made by vendors to employees of purchas...
Question 14: Which of the following is NOT the phase of the bidding proce...
Question 15: When a victim company purchases unnecessary goods or service...
Question 16: Because sales skimming is an off-book fraud scheme, it is un...
Question 17: The essential elements of a ________ are an actual or constr...
Question 18: Which of the following actions could management take to make...
Question 19: According to fraud tree, cash has three following schemes:...
Question 20: Bid-rigging scheme occurs when:...
Question 21: Which of the following would NOT be considered a conflict of...
Question 22: A technique by which checks are numbered using a new techniq...
Question 23: Which of the following statements is FALSE with regard to co...
Question 24: _________ is defined as a person who works for the victim or...
Question 25: A person is said to be in ________ act, when the business wh...
Question 26: Asset misappropriation schemes were the "middle children" of...
Question 27: Inventory shrinkage is the unaccounted-for reduction in the ...
Question 28: Assets that are long-lived and that differ from property, pl...
Question 29: Which of the following must be present for a fraud to exist?...
Question 30: Bank cut-off statements should be requested for 10-15 days a...
Question 31: Which of the following is the MOST ACCURATE statement about ...
Question 32: Which of the following scenarios describes an electronic fun...
Question 33: The principal way to detect omitted credits from books of ac...
Question 34: A __________ is a day-by-day, or chronological, record of tr...
Question 35: In which phase of competitive bidding process, fraudsters at...
Question 36: To help prevent fraudulent billing schemes, it is recommende...
Question 37: Verify supporting documentation on outstanding checks writte...
Question 38: The person or persons who have access to __________ are ofte...
Question 39: __________ inventory and other assets is relatively common w...
Question 40: Physical tampering prevention is a check tampering technique...
Question 41: Theft of incoming checks usually occurs when ________ is (ar...
Question 42: ____________ is a summary of the account balances carried in...
Question 43: When an employee processes a fictitious refund of goods, the...
Question 44: Which of the following scenarios is an example of an electro...
Question 45: Which of the following is not the skimming scheme?...
Question 46: A typical issue involving material and fraud would be:...
Question 47: After a government health care program pays for Marco's appe...
Question 48: Which of the following is a common red flag of a bid tailori...
Question 49: The fraudsters' interest lies with an employer other than a ...
Question 50: Which of the following factors is NOT included in most finan...
Question 51: The most basic skimming scheme occurs when:...
Question 52: Which sale occurs when the accomplice of the employee-frauds...
Question 53: Which of the following statements describes a best practice ...
Question 54: Bayan finds a residential property with an owner who lives f...
Question 55: The price of an asset on which the asset is selling at on th...
Question 56: In ___________ scheme, an employee creates false vouchers or...
Question 57: A fabricated name and the post office box that an employee u...
Question 58: The scheme in which the same vendor is receiving favorable t...
Question 59: Which of the following is NOT a way that dishonest contracto...
Question 60: Revenue is recognized when it is:...
Question 61: Neil, a Certified Fraud Examiner (CFE), discovers that a bor...
Question 62: Depreciation is especially applicable when companies try to ...
Question 63: Persuasive evidence of an arrangement does not exist when:...
Question 64: In which of the following process, all bidders are legally s...
Question 65: According to Marshall, ______ are probable future economic b...
Question 66: What is sometimes used to overcome well-designed internal co...
Question 67: _____________ involves purposeful misreporting of financial ...
Question 68: One reason employees might be hesitant to use PO boxes in sh...
Question 69: Which of the following is NOT the type of billing scheme?...
Question 70: Which of the following fraud schemes is MOST LIKELY to targe...
Question 71: All of the following are basic methods used to prove corrupt...
Question 72: A running count that records how much inventory should be on...
Question 73: Asset misappropriations have an effect on the liabilities an...
Question 74: A tangible asset is one which is:...
Question 75: Which of the following is the MOST APPROPRIATE technique for...
Question 76: Skimming is:
Question 77: In physical tampering prevention technique, hidden images ca...
Question 78: Vertical analysis can BEST be described as:...
Question 79: Which of the following is NOT a measure commonly taken by fr...
Question 80: ____________ corrupt employees can cause inventory to be fra...
Question 81: To keep the accounting equation in balance, which of the fol...
Question 82: The principle behind full disclosure is:...
Question 83: Which of the following is an example of a technical security...
Question 84: ______________ is required not only for theft, but for proce...
Question 85: Schemes in which an employee physically misappropriates cash...
Question 86: _________ normally are carried on an organization's books as...
Question 87: Which of the following is NOT a method of identity theft pre...