Questions from Fraud Examination


Q: 1. Which of the following types of disbursement fraud occurs least

1. Which of the following types of disbursement fraud occurs least frequently? a. Expense tampering. b. Payroll schemes. c. Register disbursement schemes. d. Billing schemes. 2. Which of the foll...

See Answer

Q: 1. Phishing is the method of: a. Using

1. Phishing is the method of: a. Using e-mail or other Internet applications to deceive people into disclosing valuable personal information. b. Convincing a person to divulge personal information o...

See Answer

Q: 1. Consumers should provide credit card numbers or bank account information

1. Consumers should provide credit card numbers or bank account information over the telephone only when: a. They initiated the call and are purchasing a legitimate product. b. They are asked to giv...

See Answer

Q: 1. Which of the following is not a type of tax

1. Which of the following is not a type of tax fraud? a. Using a false SSN. b. Overstating income. c. Keeping two sets of financial books. d. Claiming a dependent when you do not have one. 2. Wh...

See Answer

Q: 1. The retention of a fraud investigator in a bankruptcy proceeding

1. The retention of a fraud investigator in a bankruptcy proceeding must be approved by the bankruptcy judge unless: a. The debtor's estate pays the investigator. b. The trustee pays the investigato...

See Answer

Q: 1. Which of the following is not a fraud risk unique

1. Which of the following is not a fraud risk unique to e-business transactions? a. Innovative technologies where security lags process development. b. Selling new products. c. Complex information...

See Answer

Q: Jim has been a faithful employee of Daddy's Denture, Inc.

Jim has been a faithful employee of Daddy's Denture, Inc. (DO) for four years. He has held various positions where he handles receipts, credit memos, and other accounting records. Along with recently...

See Answer

Q: 1. Using a subtly different Internet host name to mimic another

1. Using a subtly different Internet host name to mimic another business is known as: a. Spoofing. b. Sniffing. c. Web-visit hijacking. d. Falsified identity. 2. Passwords and biometrics are both...

See Answer

Q: Mr. Bill is the sole proprietor of a small play-

Mr. Bill is the sole proprietor of a small play-dough production company. Over the last few months, he noticed revenues dropping and started wondering what is going on. After giving it much thought, h...

See Answer

Q: A Wall Street bond trader turned on the television one day and

A Wall Street bond trader turned on the television one day and saw a news report accusing him of committing a large securities scam. This trader learned that his employer had accused him of creating $...

See Answer