CFE Exam Section 1 - Financial Transactions and Fraud Schemes Test #1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/150

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

151 Terms

1
New cards

Cash theft schemes fall into which of the following two categories?

A. Skimming and cash larceny

B. Unrecorded sales and false discounts

C. Skimming and unrecorded sales

D. Register manipulation and understated sales

A. Skimming and cash larceny

2
New cards

Which of the following types of transactions is LEAST likely to use a person-to-person (P2P) payment system?

A. A person transferring money to a friend abroad

B. A person buying groceries at a supermarket

C. A person making an online donation to a charity

D. A person paying for an item on an online auction site

B. A person buying groceries at a supermarket - this is typically an in person transaction

3
New cards

In a _________, a bank buys, sells, and swaps its bad loans for the bad loans of another bank, creating new documentation in the process.

A. Linked financing arrangement

B. Daisy chain

C. Reciprocal loan arrangement

D. False swap scheme

B. Daisy chain

4
New cards

A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a:

A. Network virus

B. Direct-action virus

C. Boot sector virus

D. None of the above

B. Direct-action virus

5
New cards

Which of the following is a method by which contractors can inflate labor costs in negotiated contracts?

Subcontract to affiliated companies at inflated rates.

6
New cards

Defective pricingarises when

contractors intentionally use inaccurate cost or pricing data to inflate costs in negotiated contracts (i.e., the contracting method that permits negotiations between the procuring entity and prospective contractors). A contractor can use various defective pricing schemes to increase the cost of the contract and thereby its profits, but generally, defective pricing schemes involve inflated labor costs or inflated material costs

7
New cards

Which of the following health care frauds would be best described as a fictitious provider scheme?

A thief steals a health care provider's identifier and bills a government health care program under the name of a fake clinic

8
New cards

___________targets groups of individuals who have some social connection. Neighborhoods chiefly populated by racial minorities, especially immigrant groups, are often the site of affinity frauds, and the elderly and language minorities are frequent targets as well. In addition, religious and professional ties are often exploited.

affinity fraud

9
New cards

All of the following are types of expense reimbursement schemes EXCEPT:

Ghost expense reports

10
New cards

Which of the following situations is often present in real estate fraud schemes?

false appraisal forms

11
New cards

Generally speaking, under U.S. GAAP, _________________ is the proper basis for recording a piece of equipment on a company's books

A. Current market value

B. Estimated replacement value

C. Historical cost

D. Appraised value

historical cost

12
New cards

Vertical analysis can best be described as a technique for analyzing a percentage change from one accounting period to the next.

true or false?

false

13
New cards

A skimming scheme is easier to detect than a cash larcenyscheme because it leaves an audit trail. true or false

false

14
New cards

compliance with generally accepted accounting principles (GAAP) would be significantly more expensive than a different method that isn't GAAP, use of an alternative method is permitted.

false

15
New cards

Which of the following are information security goals that an e-commerce system should endeavor to meet for its users and asset holders?

I. Penetrability of data

II. Materiality of data

III. Integrity of data

IV. Availability of data

B. III and IV only

16
New cards

What happens when an employee records a fictitious refund of goods at the employee's cash register?

A. The victim company's inventory is overstated

B. Inventory is returned to the store

C. The register total is out of balance with the register log

D. None of the above

A. The victim company's inventory is overstated

17
New cards

All of the following measures are recommended to help mitigate the risk of billing schemes EXCEPT:

A. Implement a hotline function.

B. Prohibit competitive bidding.

C. Separate the purchasing function from the payment function.

D. Provide objective compensation for purchasing staff.

prohibit competitive bidding

18
New cards

Which of the following situations would be MOST indicative of a customer committing new account fraud at a bank?

A. A customer opens a new personal account and immediately requests two ATM cards.

B. A customer opens a business account and soon after has payroll transactions on the account.

C. An invalid address or phone number is listed in the customer's account information.

D. A customer deposits a substantial amount of funds in a new personal account and does not spend or withdraw them for several months.

c An invalid address or phone number is listed in the customer's account information

19
New cards

Which of the following is NOT a common red flag of procurement fraud schemes involving collusion among contractors?

A. There is limited competition within the industry.

B. Bid prices begin to fall when a new competitor enters the competition.

C. The same contractors bid on each project or product.

D. More competitors than usual submit bids on a project or product.

D. More competitors than usual submit bids on a project or product.

20
New cards

Jason, a server at a popular restaurant, takes a customer's credit card to process a payment. While he is on the other side of the dining area with his back turned, Jason swipes the card through a small device that he regularly uses to steal his customers' credit card information. Jason is engaging in a scheme known as credit card ________

.A. Scanning

B. Skimming

C. Pinching

D. Probing

b. skimming

21
New cards

Workers' compensation schemes are generally broken into four categories. Which of the following is NOT one of these categories?

A. Agent fraud

B. Premium fraud

C. Double duty fraud

D. Claimant fraud

c. double duty fraud

22
New cards

Which of the following is NOT one of the key phases of procurement processes that employ competitive bidding mechanisms?

A. The post-award and administration phase

B. The solicitation phase

C. The purchase and procurement phase

D. The presolicitation phase

C. The purchase and procurement phase

23
New cards

Which of the following statements is TRUE with regard to the statement of cash flows?

A. The statement of cash flows is often used in tandem with the income statement to determine a company's true financial performance.

B. There are four types of cash flows: cash flows from operating activities, from investing activities, from financing activities, and from revenue activities.

C. The statement of cash flows is not always necessary because most companies operate under cash-basis accounting rather than accrual accounting.

D. The statement of cash flows shows a company's financial position at a specific point in time.

A. The statement of cash flows is often used in tandem with the income statement to determine a company's true financial performance.

24
New cards

Password cracking is a method that attackers use to gain unauthorized access to a computer system by bypassing password security through the use of undocumented system functions. true or false

false

25
New cards

The assumption that a business will continue indefinitely is reflected in the accounting concept of:

A. Objective evidence

B. Going concern

C. Materiality

D. Cost

going concern

26
New cards

Which of the following is a means of measuring the relationship between two different financial statement amounts?

A. Statement comparison

B. Ratio analysis

C. Relational comparison

D. Transaction detail analysis

b. ratio analysis

27
New cards

Which of the following is the most accurate definition of spyware?

A. A type of software that collects and reports information about a computer user without the user's knowledge or consent

B. A program or command procedure that gives the appearance that it is useful but in fact contains hidden malicious code that causes damage

C. A self-replicating computer program that penetrates operating systems to spread malicious code to other systems

D. Any software application in which advertising banners are displayed while a program is running

A. A type of software that collects and reports information about a computer user without the user's knowledge or consent

28
New cards

A confidence scheme designed to part victims from their money by falsely promising the future delivery of a product or service in exchange for an upfront payment is called a(n):

A. Home-based business scheme

B. Advance-fee swindle

C. Scavenger scheme

D. Bait and switch

B. Advance-fee swindle

29
New cards

Which of the following is the correct calculation of the quick ratio?

A. (Cash + marketable securities) / accounts payable

B. (Cash + marketable securities + receivables) / current liabilities

C. (Cash + receivables) / current liabilities

D. Current assets / current liabilities

B. (Cash + marketable securities + receivables) / current liabilities

30
New cards

___________ involve paying individuals to undergo unnecessary medical procedures that are then billed to the patient's insurer or health care program.

A. False cost reporting schemes

B. Fictitious patient schemes

C. DRG creep schemes

D. Rent-a-patient schemes

D. Rent-a-patient schemes

31
New cards

Which of the following best describes how a baiting scheme works in the context of identity theft?

A. Fraudsters use imitation websites to trick computer users into entering sensitive data.

B. Fraudsters trick victims into inserting malware-infected data storage devices into their computers.

C. Fraudsters impersonate the victim's bank to persuade the victim into releasing information.

D. Fraudsters use telephone calls or voice messages to manipulate targets into revealing personal or business information.

B. Fraudsters trick victims into inserting malware-infected data storage devices into their computers.

32
New cards

_______________ is a system by which the bank verifies checks presented for payment against the list provided by the company of approved checks written on the account.

A. Verification control

B. Payment patrol

C. Check matching

D. Positive pay

D. Positive pay

33
New cards

The debt-to-equity ratio is computed by dividing current liabilities by total equity.

A. True

B. False

False

34
New cards

Which of the following is most indicative that the winning bid on an original construction project was not feasible?

A. Missing documentation

B. Increasing trend in the number of change orders

C. Draw requests

D. High turnover in developer's personnel

B. Increasing trend in the number of change orders

35
New cards

Non-repudiation refers to a method used to guarantee that parties involved in an e-commerce transaction cannot deny their participation in it.

A. True

B. False

T

36
New cards

Matthew receives a voice mail message telling him that his credit card might have been used fraudulently. He is asked to call a phone number. When he calls the number, he hears a menu and a list of choices that closely resembles those used by his credit card company. The phone number even appears to be similar to that of his card issuer. Of which of the following types of schemes has Matthew become the target?

A. SMiShing or tishing

B. Pharming

C. Vishing

D. Spear phishing

C. Vishing

37
New cards

_________________ is the most common type of identity theft.

A. Business identity theft

B. Financial identity theft

C. Criminal identity theft

D. Medical identity theft

B. Financial identity theft

38
New cards

Which of the following activities is included in the post-award and administration phase of procurements involving open and free competition?

A. The procuring entity develops the bid specifications.

B. The procuring entity issues the solicitation document.

C. The procuring entity performs its contractual obligations.

D. The procuring entity evaluates the bids or proposals.

C. The procuring entity performs its contractual obligations.

39
New cards

Which of the following is an information security goal that an e-commerce system should endeavor to meet for its users and asset holders?

A. Access authority

B. Systems reliability

C. Exactness

D. Non-repudiation

D. Non-repudiation

40
New cards

The most common giveaway scheme, in which a postcard arrives in the mail telling the recipient he has already won a prize such as a luxurious vacation or cash, is known as:

A. The "1-in-5"

B. The "Fly and Buy"

C. The "Bait and Switch"

D. None of the above

A. The "1-in-5"

41
New cards

Ed Smith, a city commissioner, negotiated a land development deal with a group of private investors. After the deal was approved, the investors rewarded Smith with an all-expenses-paid trip, even though giving such rewards to government officials is prohibited by law. Which of the following is the most appropriate term to describe what has taken place?

A. Collusion

B. Illegal gratuity

C. Need recognition

D. Economic extortion

B. Illegal gratuity

42
New cards

Michael, a medical provider, performs an appendectomy, a procedure that is supposed to be billed as one code. Instead, he intentionally submits two codes for the same procedure, one for an abdominal incision and one for removal of the appendix. Which of the following best describes Michael's scheme?

A. Decompressing

B. Procedure compounding

C. Unbundling

D. Fictitious services

C. Unbundling

43
New cards

At the end of each fiscal year, the accounts reflected on the income statement are reduced to a zero balance.

A. True

B. False

True

44
New cards

Implementing privilege escalation and using buffer overflow exploits are examples of administrative controls used for securing computer systems and communication networks.

A. True

B. False

false

45
New cards

Which of the following statements is TRUE with regard to a fictitious revenue scheme?

A. The debit side of a fictitious sales entry usually goes to accounts payable.

B. Fictitious revenues must involve sales to a fake customer.

C. If a fictitious revenue scheme has taken place, there will typically be no accounts receivable on the books.

D. Uncollected accounts receivable are a red flag of fictitious revenue schemes

D. Uncollected accounts receivable are a red flag of fictitious revenue schemes

46
New cards

The asset turnover ratio is used to assess a company's ability to meet sudden cash requirements.

A. True

B. False

false

The asset turnover ratio measures the efficiency of a company's assets to generate revenue or sales.

47
New cards

Why is the health care industry concerned about the potential effect of the Electronic Data Interchange (EDI) on fraudulent activity?

A. The efficiency of EDI allows for more vendors and thus more claims to process

B. The tools required to detect EDI fraud are difficult to use

C. Only a few types of health care transactions can be processed by EDI

D. All of the above

A. The efficiency of EDI allows for more vendors and thus more claims to process

48
New cards

The statement of cash flows includes the following categories: cash flows from strategic activities, cash flows from operating activities, cash flows from investing activities, and cash flows from financing activities.

A. True

B. False

False

49
New cards

Which of the following is the best definition of the automobile insurance scheme known as ditching?

A. An insured falsely reports a vehicle as stolen to collect on an insurance policy.

B. An insured has two insurance policies in place and files claims with both.

C. An agent collects a customer's premium, but he does not remit the payment to the insurance company.

D. An agent inflates his commissions by pressuring customers to unnecessarily replace existing policies for new ones

A. An insured falsely reports a vehicle as stolen to collect on an insurance policy.

50
New cards

Which of the following is the most accurate definition of a Trojan horse?

A. A program or command procedure that gives the appearance that it is useful but in fact contains hidden malicious code that causes damage

B. A type of software that collects and reports information about a computer user without the user's knowledge or consent

C. A virus that changes its structure to avoid detection

D. A software program that contains various instructions that are carried out every time a computer is turned on

A. A program or command procedure that gives the appearance that it is useful but in fact contains hidden malicious code that causes damage

51
New cards

Heidi, a Certified Fraud Examiner and internal auditor for a health care program, has been asked to review the program's system of internal controls in the claims processing area. Heidi has decided to present the management of the unit with a list of general indicators for fraud that are applicable to many health insurance fraud schemes by program beneficiaries. All of the following would be included on Heidi's list EXCEPT:

A. Individuals who mail their claim and ask for their claim payment to be sent through direct bank transfer

B. Threats of legal action when a claim is not paid quickly

C. Anonymous telephone or email inquiries regarding the status of a pending claim

D. Pressure by a claimant to pay a claim quickly

A. Individuals who mail their claim and ask for their claim payment to be sent through direct bank transfer

52
New cards

Which of the following is NOT a method that a fraudster might use to conceal inventory shrinkage?

A. Physical padding of inventory

B. Falsely increasing the perpetual inventory figure

C. Altering the perpetual inventory records to decrease the balance

D. Writing off stolen inventory as scrap

B. Falsely increasing the perpetual inventory figure

53
New cards

The most effective way to prevent and detect electronic payment fraud is through proper separation of duties.

A. True

B. False

True

54
New cards

How does positive pay help prevent check fraud?

A. Positive pay controls which vendors the company's bank can deposit checks from.

B. The bank scans all checks presented for payment to determine whether the signatures are forged.

C. The bank verifies checks presented for payment against a list of approved checks provided by the company.

D. Positive pay establishes a maximum amount above which the company's bank will not accept checks drawn against the account.

C. The bank verifies checks presented for payment against a list of approved checks provided by the company.

55
New cards

Which of the following is the term used to describe the method of gaining unauthorized access to a computer system in which attackers use an automated process to guess a system user's passwords?

A. Password cracking

B. Password sniffing

C. Password engineering

D. Password logging

A. Password cracking

56
New cards

The emerging environment of everyday objects that use embedded sensors to collect and transmit data through the Internet is best known as:

A. The Internet of Things

B. The Emerging Technology Domain

C. The Deep Web

D. The Smart Technology Network

A. The Internet of Things

57
New cards

Implementing privilege escalation and using buffer overflow exploits are examples of administrative controls used for securing computer systems and communication networks.

A. True

B. False

false

58
New cards

A forged maker scheme is a check tampering scheme in which an employee intercepts a company check intended for a third party and converts the check by signing the third party's name on the check's endorsement line.

A. True

B. False

False

59
New cards

DRG creep occurs when staff members at medical institutions intentionally manipulate diagnostic and procedural codes in a pattern to increase claim reimbursement amounts.

A. True

B. False

A. True

60
New cards

In a take-the-money-and-run scheme, fraudsters lure potential victims using fake vacation rental listings or websites advertising properties that do not actually exist.

A. True

B. False

A. True

61
New cards

Karl finds a residential property with a non-resident owner. He then forges contractual property documents showing that the owner is transferring ownership of the property completely to Karl, such as would normally happen during a property sale. The property owner is unaware that Karl has created and filed the documents. Later, Karl takes the falsified documents to a lender and borrows money against the property. Which of the following best describes Karl's scheme?

A. Unauthorized draw on home equity line of credit

B. Air loan

C. Fraudulent sale

D. Property flipping

C. Fraudulent sale

62
New cards

Sales and cost of goods sold almost always move together, unless there have been changes in purchase prices, quantities purchased, or quality of products being purchased.

True or false?

True

63
New cards

For the purpose of fraud detection, procurement processes that employ competitive bidding mechanisms can be reduced to four basic stages:

The presolicitation phase

•The solicitation phase

•The bid evaluation and award phase

•The post-award and administration phase

64
New cards

Publicly available information that anyone can lawfully obtain by request, purchase, or observation is known as which of the following?

A. Open-source information

B. Free-source information

C. Confidential-source information

D. Wide-source information

open source info

65
New cards

A medical provider billed an insurance company for a name-brand drug, while providing the patient with a generic version of the drug. This inflated billing scheme is known as which of the following?

A. Unbundling

B. Upcoding

C. Undercharging

D. Replacement fraud

b. upcoding

66
New cards

Pass-through schemes are usually undertaken by employees who receive inventory on the victim company's behalf. true or false?

false - Instead of buying merchandise directly from a vendor, the employee sets up a shell company and purchases the merchandise through that fictitious entity. He then resells the merchandise to his employer from the shell company at an inflated price, thereby making an unauthorized profit on the transaction.

67
New cards

The statement of changes in owners' equity acts as the connecting link between which two financial statements?

A. Balance sheet and statement of retained earnings

B. Income statement and balance sheet

C. Income statement and statement of cash flows

D. Statement of cash flows and balance sheet

IS and balance sheet

68
New cards

Which of the following statements is TRUE with regard to factoring companies?

A. Factoring is illegal in all jurisdictions.

B. Factoring companies approach banks on a telemarketer's behalf in order to secure credit card processing services.

C. Factoring companies in Asian and European countries tend to charge more for their services than factoring companies in other countries.

D. Factoring groups buy credit card receipts from telemarketing operations at a discount.

D. Factoring groups buy credit card receipts from telemarketing operations at a discount.

69
New cards

Excessive write-offs are a form of concealment for which of the following schemes?

A. Conflicts of interest

B. Embezzlement

C. Phantom loans

D. All of the above

d.all of the above

70
New cards

Which of the following best describes social engineering?

A. A method for gaining unauthorized access to a computer system in which an attacker searches through large quantities of available data to find sensitive information that he can use to facilitate his intended scheme

B. A method for gaining unauthorized access to a computer system in which an attacker hides near the target to obtain sensitive information that he can use to facilitate his intended scheme

C. A method for gaining unauthorized access to a computer system in which an attacker bypasses a system's security through the use of an undocumented operating system and network functions

D. A method for gaining unauthorized access to a computer system in which an attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker's intended scheme

D. A method for gaining unauthorized access to a computer system in which an attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker's intended scheme

71
New cards

In a take-the-money-and-run scheme, fraudsters lure potential victims using fake vacation rental listings or websites advertising properties that do not actually exist.

A. True

B. False

true

72
New cards

All of the following are types of expense reimbursement schemes EXCEPT:

A. Mischaracterized expenses

B. Fictitious expenses

C. Ghost expense reports

D. Multiple reimbursements

C. Ghost expense reports

73
New cards

Which of the following situations can constitute health care fraud committed by an insurance company?

A. Failing to follow procedures to detect fraudulent claims when acting as an intermediary for another insurance program

B. Failing to pay a claim because the claim is missing required information

C. Submitting cost data to health care regulators to justify rate increases

D. All of the above

A. Failing to follow procedures to detect fraudulent claims when acting as an intermediary for another insurance program

74
New cards

All of the following are payroll scheme types EXCEPT:

A. Ghost employees

B. Falsified hours and salary

C. Commission schemes

D. Stolen paychecks

D. Stolen paychecks - If an employee stole paychecks, this would fall under check tampering, not payroll fraud.

75
New cards

All of the following are measures that would be helpful in preventing cash larceny schemes EXCEPT:

A. Ensuring that the duties of making bank deposits and performing bank reconciliations are assigned to different individuals

B. Having all employees use the same cash register for their transactions

C. Sending out a company-wide communication informing employees of the company's surprise cash count policy

D. Assigning an employee's duties to another individual when that employee goes on vacation

B. Having all employees use the same cash register for their transactions

76
New cards

One method competitive intelligence professionals commonly use to gather data about a competitor involves posing as a job applicant and interviewing with key employees at the competing company. This practice is best described as conducting surveillance.

A. True

B. False

false - intelligence?

77
New cards

All of the following are types of medical provider fraud EXCEPT:

A. Fictitious services

B. Rolling labs

C. Fictitious providers

D. Smurfing

d. smurfing - Smurfing is a scheme to launder funds through financial institutions.

78
New cards

Which of the following lists the information security goals that an e-commerce system should achieve for its users and asset holders?

A. Penetrability, accuracy, availability, authentication, and systems reliability

B. Penetrability, accuracy, exactness, materiality, and systems reliability

C. Confidentiality, integrity, availability, authentication, and non-repudiation

D. Exactness, invulnerability, accuracy, materiality, and data/systems response

C. Confidentiality, integrity, availability, authentication, and non-repudiation

79
New cards

Matthew receives a voice mail message telling him that his credit card might have been used fraudulently. He is asked to call a phone number. When he calls the number, he hears a menu and a list of choices that closely resembles those used by his credit card company. The phone number even appears to be similar to that of his card issuer. Of which of the following types of schemes has Matthew become the target?

A. Pharming

B. Spear phishing

C. SMiShing or tishing

D. Vishing

D. Vishing

80
New cards

Physical access controls refer to the process by which users are allowed access to computer programs, systems, and networks.

A. True

B. False

False - Physical access controls refer to the process by which users are allowed access to physical objects (e.g., buildings). In contrast, logical access controls are tools used to control access to computer information systems and their components.

81
New cards

Falsified prescriptions for equipment, excessive supplies, noncovered supplies, and scooter scams are forms of fraud commonly involving what type of health care entity?

A. Hospitals

B. Out-patient services groups

C. Reusable medical equipment suppliers

D. Special care facilities

C. Reusable medical equipment suppliers

82
New cards

Both falsely increasing the perpetual inventory balance and failing to reconcile inventory records are ways a fraudster might conceal inventory shrinkage.

A. True

B. False

B. False - Falsely increasing the perpetual inventory record would only worsen the shrinkage problem. Instead, a fraudster seeking to conceal shrinkage would falsely decrease the perpetual inventory record to match the lower physical inventory count. In addition, failing to reconcile inventory records would likely cause more suspicion to arise.

83
New cards

The method of concealing a receivables skimming scheme whereby one customer account is credited for a payment that was made on another account is called which of the following?

A. Currency substitution

B. Altered payee designation

C. Inventory padding

D. Lapping

D. Lapping

84
New cards

Which of the following best describes the difference between a flipping scheme and a flopping scheme in the context of mortgage fraud?

A. In a flopping scheme, the lender is not one of the potential victims of the scheme.

B. In a flopping scheme, the original seller always ends up as the final owner of the property.

C. In a flopping scheme, the value of the first transaction is deflated instead of inflating the second transaction.

D. In a flopping scheme, the second transaction in the scheme usually occurs several years after the first.

C. In a flopping scheme, the value of the first transaction is deflated instead of inflating the second transaction.

85
New cards

Jason, a server at a popular restaurant, takes a customer's credit card to process a payment. While he is on the other side of the dining area with his back turned, Jason swipes the card through a small device that he regularly uses to steal his customers' credit card information. Jason is engaging in a scheme known as credit card ________.

A. Probing

B. Skimming

C. Scanning

D. Pinching

B. Skimming

86
New cards

_________ is an attack in which a user is fooled into entering sensitive data into a malicious website that imitates a legitimate website.

A. Phishing

B. Pharming

C. SMiShing

D. Spear phishing

B. Pharming

87
New cards

Victims of consumer fraud are more likely to be organizations or businesses rather than individuals. true or false?

true

88
New cards

For the purpose of fraud detection, procurement processes that employ competitive bidding mechanisms can be reduced to four basic stages:

The presolicitation phase

The solicitation phase

The bid evaluation and award phase

The post-award and administration phase

89
New cards

Which of the following is NOT one of the key phases of procurement processes that employ competitive bidding mechanisms?

The purchase and procurement phase

90
New cards

The purchase and procurement phase

A. Lien releases from subcontractors

B. Change orders, if applicable

C. Expenses from similar contracts

D. Inspection reports

C. Expenses from similar contracts

91
New cards

ooper is an intelligence professional for Whetstone Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about Cryptic Global, the major competitor of Whetstone's biggest client. To gather the intelligence, Cooper infiltrates Cryptic Global's office by posing as a member of its cleaning crew and collects information left around employees' computers and desks. Cooper's approach is an example of:

A. Dumpster diving

B. Shoulder surfing

C. Spoofing

D. Scavenging

D. Scavenging

92
New cards

___________ involve paying individuals to undergo unnecessary medical procedures that are then billed to the patient's insurer or health care program.

A. False cost reporting schemes

B. Rent-a-patient schemes

C. Fictitious patient schemes

D. DRG creep schemes

So-called rent-a-patient schemes involve

B. Rent-a-patient schemes

93
New cards

Which of the following health care frauds would be best described as a fictitious services scheme?

A. A doctor uses the identifying information of patients he has never serviced to bill an insurer.

B. A patient who is not insured pretends to be an insured party to receive medical services.

C. A doctor intentionally submits a bill to an insurer using improper codes for the services provided.

D. A patient fraudulently reports symptoms he does not actually have to receive a prescription.

A. A doctor uses the identifying information of patients he has never serviced to bill an insurer.

94
New cards

Samantha operates a medical lab from a mobile trailer. Her business model is to go to an area, recruit patients for an array of unnecessary tests, and bill health care programs for those tests. She also typically bills for services never actually performed using the patient data collected. Soon after, she moves the trailer to a new location and starts the process again. Which of the following best describes Samantha's scheme?

A. Rolling lab

B. Fictitious provider scheme

C. DME fraud

D. Front organization

A. Rolling lab

95
New cards

Which of the following is NOT a common red flag of a bid tailoring scheme?

A. Competitive awards vary among several suppliers.

B. A contract is not rebid even though fewer than the minimum number of bids are received.

C. Only a few bidders respond to bid requests.

D. There are unusually broad specifications for the type of goods or services being procured.

A. Competitive awards vary among several suppliers.

96
New cards

Which of the following is NOT a method that is used to conceal inventory shrinkage?

A. Selling merchandise without recording the sale

B. Writing off stolen inventory as scrap

C. Placing empty boxes on warehouse shelves

D. Performing a forced reconciliation of the inventory records

A. Selling merchandise without recording the sale

97
New cards

Which of the following types of procurement fraud schemes involves procurement employees who convince their employer, the procuring entity, that it needs excessive or unnecessary products or services?

A. Need recognition schemes

B. Bid manipulation schemes

C. Nonconforming goods schemes

D. Bid tailoring schemes

A. Need recognition schemes

98
New cards

Brittany, a cash register teller, signed onto her register, rang a "no sale" transaction to open the drawer, and then removed a large sum of money. Which of the following schemes has taken place?

A. A register disbursement scheme

B. A cash larceny scheme

C. A skimming scheme

D. None of the above

B. A cash larceny scheme

99
New cards

White, an employee of ABC Corporation, intentionally issued two payments for the same invoice. After the checks had been mailed, White called the vendor and explained that a double payment had been made by mistake. She asked the vendor to return one of the checks to her attention. When the vendor returned the check, White took it and cashed it. This is an example of:

A. A pay and return scheme

B. A receivables skimming scheme

C. A shell company scheme

D. A pass-through scheme

A. A pay and return scheme

100
New cards

The quick ratio is used to determine the efficiency with which a company uses its assets.

A. True

B. False

false

The quick ratio is a measure of how well a company can meet its short-term financial liabilities