Q: 1. Which of the following types of disbursement fraud occurs least
1. Which of the following types of disbursement fraud occurs least frequently? a. Expense tampering. b. Payroll schemes. c. Register disbursement schemes. d. Billing schemes. 2. Which of the foll...
See AnswerQ: 1. Phishing is the method of: a. Using
1. Phishing is the method of: a. Using e-mail or other Internet applications to deceive people into disclosing valuable personal information. b. Convincing a person to divulge personal information o...
See AnswerQ: 1. Consumers should provide credit card numbers or bank account information
1. Consumers should provide credit card numbers or bank account information over the telephone only when: a. They initiated the call and are purchasing a legitimate product. b. They are asked to giv...
See AnswerQ: 1. Which of the following is not a type of tax
1. Which of the following is not a type of tax fraud? a. Using a false SSN. b. Overstating income. c. Keeping two sets of financial books. d. Claiming a dependent when you do not have one. 2. Wh...
See AnswerQ: 1. The retention of a fraud investigator in a bankruptcy proceeding
1. The retention of a fraud investigator in a bankruptcy proceeding must be approved by the bankruptcy judge unless: a. The debtor's estate pays the investigator. b. The trustee pays the investigato...
See AnswerQ: 1. Which of the following is not a fraud risk unique
1. Which of the following is not a fraud risk unique to e-business transactions? a. Innovative technologies where security lags process development. b. Selling new products. c. Complex information...
See AnswerQ: Jim has been a faithful employee of Daddy's Denture, Inc.
Jim has been a faithful employee of Daddy's Denture, Inc. (DO) for four years. He has held various positions where he handles receipts, credit memos, and other accounting records. Along with recently...
See AnswerQ: 1. Using a subtly different Internet host name to mimic another
1. Using a subtly different Internet host name to mimic another business is known as: a. Spoofing. b. Sniffing. c. Web-visit hijacking. d. Falsified identity. 2. Passwords and biometrics are both...
See AnswerQ: Mr. Bill is the sole proprietor of a small play-
Mr. Bill is the sole proprietor of a small play-dough production company. Over the last few months, he noticed revenues dropping and started wondering what is going on. After giving it much thought, h...
See AnswerQ: A Wall Street bond trader turned on the television one day and
A Wall Street bond trader turned on the television one day and saw a news report accusing him of committing a large securities scam. This trader learned that his employer had accused him of creating $...
See Answer