MBA 710: Spr 2023 - Xiang (Gail) Gao - Modules 1-3

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/62

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:10 AM on 4/5/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

63 Terms

1
New cards

The following data can be used to perform benchmarking.

a. Industry data

b. Budget data

c. All the other three choices are correct.

d. Historical data

c. All the other three choices are correct.

2
New cards

Match social security number to the employee name to see if there are multiple names under one social security number. This is a _________.

a. Compliance verification

b. Duplicate testing.

c. Bench-marking

b. Duplicate testing.

3
New cards

Why do we need to identify the amounts just below the threshold?

a. Fraudster creates random number.

b. Fraudster try to avoid internal control by using the number lower than threshold and maximize his/her benefit from fraud.

c. Fraudster always use large number.

b. Fraudster try to avoid internal control by using the number lower than threshold and maximize his/her benefit from fraud.

4
New cards

Why do we need to look into the round-dollar payment?

a. Round dollar payment should happen frequently.

b. Fraudster does not want to conceal the transaction.

c. Real transactions do not occur in simple round numbers.

c. Real transactions do not occur in simple round numbers.

5
New cards

Benford's law can be used to detect fraud because:

a. The fraudster can easily replicate the nature pattern.

b. The frequency of the nature numbers has pattern.

c. The frequency of the nature numbers are random.

b. The frequency of the nature numbers has pattern.

6
New cards

Why do we need to understand how the data is generated when we perform the analysis?

a. (Garbage in, garbage out.) If the data is not generated or structured properly, the results are meaningless.

b. We need to interview before run the analysis.

c. We can look the data randomly.

a. (Garbage in, garbage out.) If the data is not generated or structured properly, the results are meaningless.

7
New cards

Data analytics is the best way of detecting fraud or fraud prevention.

True or False

False

8
New cards

Prevention is more important than detection.

True or False

True

9
New cards

Which category of occupational fraud is the most common fraud?

a. Corruption

b. Financial statement fraud

c. Asset misappropriation

c. Asset misappropriation

10
New cards

Which category of fraud is the costliest occupational fraud?

a. Financial statement fraud

b. Asset misappropriation

c. Corruption

a. Financial statement fraud

11
New cards

Please match the fraud detection method to active/passive method.

IT controls

Active

12
New cards

Please match the fraud detection method to active/passive method.

By police

Passive

13
New cards

Please match the fraud detection method to active/passive method.

Confession

Passive

14
New cards

Please match the fraud detection method to active/passive method.

Surveillance/Monitoring

Active

15
New cards

Please match the fraud detection method to active/passive method.

Management review

Active

16
New cards

Please match the fraud and its definition

A scheme in which an incoming payment is stolen from an organization before it is recorded on the organization's books and records (e.g., employee accepts payment from a customer but does not record the sale and instead pockets the money)

Skimming

17
New cards

Please match the fraud and its definition

A fraudulent disbursement scheme in which an employee causes his or her employer to issue a payment by making false claims for compensation (e.g., employee claims overtime for hours not worked; employee adds ghost employees to the payroll)

Payroll Scheme

18
New cards

Please match the fraud and its definition

A scheme in which an employee misuses his or her influence in a business transaction in a way that violates his or her duty to the employer in order to gain a direct or indirect benefit (e.g., schemes involving bribery or conflicts of interest)

Corruption

19
New cards

Please match the fraud and its definition

A fraudulent disbursement scheme in which an employee makes a claim for reimbursement of fictitious or inflated business expenses (e.g., employee files fraudulent expense report, claiming personal travel, nonexistent meals)

Expense Reimbursements Scheme

20
New cards

Which of the fraud is not a sub-schemes under asset misappropriation?

a. Conflict of interest

b. Expense reimbursements

c. Check and payment tampering

d. Cash larceny

a. Conflict of interest

21
New cards

The most common way of detection of occupational fraud initially is?

a. Internal audit

b. By accident

c. Account reconciliation

d. Tips

d. Tips

22
New cards

What is the top one control weakness in nonprofit organizations?

a. lack of management review

b. lack of internal audit

c. override of existing internal controls

d. lack of internal controls

d. lack of internal controls

23
New cards

Created fraudulent physical documentation, altered physical documents, create fraudulent transactions in the accounting system are common ways used to conceal the frauds.

True or False

True

24
New cards

What type of organization is the most often victims of occupational fraud?

a. Private company

b. Public company

c. Government

d. Nonprofit

a. Private company

25
New cards

What level of authority committed the most occupational fraud?

a. Other

b. Employee

c. Manager

d. Owner/executive

b. Employee

26
New cards

Most perpetrators have a degree of?

a. Postgraduate degree

b. University degree

c. High school

d. Some university

b. University degree

27
New cards

More than half of frauds were committed by two or more fraudsters working in collusion.

True or False

True

28
New cards

Internal control weaknesses were responsible for nearly half of the frauds.

True or False

True

29
New cards

Please match the items to the elements of the fraud triangle.

The employee complains the salary is below the average of the industry.

Rationalization

30
New cards

Please match the items to the elements of the fraud triangle.

The company does not separate the role of order and payment in the purchasing department.

Opportunity

31
New cards

Please match the items to the elements of the fraud triangle.

The employee has too many medical bills and student loans to pay.

Pressure

32
New cards

Which of the following schemes is the theft of cash from a company before the transaction is entered into the accounting system?

a. Larceny

b. False reimbursement

c. Skimming

d. A fictitious disbursement

c. Skimming

33
New cards

Which of the following is the method used as skimming sales?

a. Conducting unauthorized sales after hours

b. Rigging the cash register so that the sale is not recorded

c. Posting a sale for less than the amount collected

d. All of the above

d. All of the above

34
New cards

Which of the following methods is NOT used to conceal sales skimming?

a. Inventory padding

b. Lapping

c. Destroying records of transaction

d. Record false voids

d. Record false voids

35
New cards

Please match the terms to their definition

A method used to conceal cash larceny. The perpetrator processes false transactions to void a sale or to refund cash, which causes sales records to reconcile to the amount of cash on hand after the theft.

Reversing transactions

36
New cards

Please match the terms to their definition

A method of concealing the theft of cash designed for accounts receivable by crediting one account while abstracting money from a different account. This process must be continuously repeated to avoid detection.

Lapping

37
New cards

Please match the terms to their definition

A method of concealing receivables skimming whereby the fraudster falsifies accounts totals to conceal the theft of funds.

Force balancing

38
New cards

Please match the terms to their definition

A method of concealing deposit theft that occurs when an employee steals part or all of the deposit from one day and then replaces it with receipts from subsequent days.

Deposit lapping

39
New cards

Mike is the bookkeeper for ABC company. One afternoon while she was preparing the bank deposit, a customer came in to the office and paid his account in full with a $57 check. Rather than adding the check to the deposit, Mike pocketed $57 cash from the previously recorded amount and included the customer's check in the money to be taken to the bank. What type of scheme did Mike commit?

a. Larceny

b. Skimming

c. Force balancing

d. Kiting

b. Skimming

40
New cards

Lily was an accounts receivable clerk for an insurance broker. When premium payments were received, she would steal the check of every tenth customer and cash it at a liquor store. To conceal her scheme, she would credit the account of the customer that she stole from with a payment that was received from another customer's account. This is an example of:

a. Understate sales

b. Lapping

c. Force balancing

d. False reimburse

b. Lapping

41
New cards

Procedures that can be used to prevent and/or detect receivables skimming include which of the following?

a. Reconciling the bank statement regularly

b. Mandating that employees take annual vacations

c. Performing a trend analysis on the aging of customer accounts

d. All of the above

d. All of the above

42
New cards

What are the analytical procedures to detect larceny?

a. Review the accounts

b. Analyze returns and allowance and match these transactions to inventory

c. Analyze return and allowance, and match against the numbers with total sales to the the variation

d. All of the above

d. All of the above

43
New cards

What are the internal controls to prevent larceny?

a. Mandatory vacation and rotation of roles

b. Surprise cash counts

c. Segregation of cash receipt, bank deposit, deposit reconciliation, posting of deposit and cash disburse

d. All of the above

d. All of the above

44
New cards

The two categories of cash receipts schemes are:

a. Skimming and billing schemes

b. Cash larceny and skimming

c. Lapping and skimming

d. Lapping and cash larceny

b. Cash larceny and skimming

45
New cards

How cash larceny can be concealed?

a. Falsifying the cash count

b. Destroying the register tape

c. Stealing from another employee's register

d. All of the above

d. All of the above

46
New cards

How receivable larceny can be concealed?

a. Lapping

b. Stolen statements

c. Reversing entries

d. All of the above

d. All of the above

47
New cards

The most effective way to prevent cash larceny from the deposit is:

a. Having a visible management presence in the mailroom

b. Having two employees deliver the deposit to the bank

c. Separating the duties of the deposit function

d. None of the above

c. Separating the duties of the deposit function

48
New cards

James stole $500 from the company deposit while on the way to the bank. He can conceal the theft by recording the missing amount on the bank reconciliation as a(n):

a. Larceny when deposit in transit

b. Outstanding check

c. None of the above

d. Credit memo

a. Larceny when deposit in transit

49
New cards

Mike works in a store. He had a bad habit of helping himself to cash from the deposit on the way to the bank. He covered his tracks by substituting a check from the next day's deposit for the amount he stole from the previous day's deposit. This is an example of what type of concealment?

a. Force balancing

b. None of the above

c. Deposits in transit

d. Deposit lapping

d. Deposit lapping

50
New cards

If discrepancies are found between the sales records and the cash on hand, which of the following schemes might be occurring?

a. Sales skimming

b. Fraudulent disbursements

c. Cash larceny from the deposit

d. Cash larceny at the point of sale

d. Cash larceny at the point of sale

51
New cards

Check tampering is unique from other fraudulent disbursement schemes because in a check tampering scheme:

a. The perpetrator physically prepares the fraudulent check.

b. The perpetrator must have access to a signature stamp in order to conceal the crime.

c. The perpetrator submits a phony document in order to generate the fraudulent payment.

d. The perpetrator must endorse the check in order to cash or deposit it.

a. The perpetrator physically prepares the fraudulent check.

52
New cards

Which of the condition(s) should be met when the fraudster successfully carries out and conceal a check tampering scheme?

a. Access to the check stock

b. Access to the bank statements

c. The ability to forge signatures or alter other information on the check

d. All of the above

d. All of the above

53
New cards

David intercepted and converted a company check made payable to a third party. This is a ___scheme?

a. Forged maker scheme

b. Authorized maker scheme

c. Altered payee scheme

d. Concealed check scheme

c. Altered payee scheme

54
New cards

Which of the following is(are) an effective control(s) to prevent and detect forged maker scheme?

a. Separate the duties of check preparation and check signing.

b. Rotate authorized check signers.

c. Maintain a usage log for the signature stamp.

d. All of the above

d. All of the above

55
New cards

Please match the terms to the definitions.

A check tampering scheme in which an employee with signatory authority on a company account writes fraudulent checks for his own benefit and signs his own name as the maker.

Authorized maker scheme

56
New cards

Please match the terms to the definitions.

A check tampering scheme in which an employee intercepts a company check intended for a third party and converts the check by signing the third party's name and converts the check by signing the third party's name on the endorsement line of the check.

Forged endorsement scheme

57
New cards

Please match the terms to the definitions.

A check tampering scheme in which an employee intercepts a company check intended for a third party and alters the payee designation so that the check can be converted by the employee or an accomplice.

Altered payee scheme

58
New cards

Please match the terms to the definitions.

A method of concealing a check tampering scheme by manipulating the bank reconciliation so that the bank balance and the book balance match.

Forced reconciliation

59
New cards

How could electronic payments be manipulated?

a. Abusing legitimate access to the employer's payment system

b. Gaining access to the employer's payment system through social engineering

c. Exploiting weaknesses in the employer's internal control over its electronic payment system

d. All of the above

d. All of the above

60
New cards

Lily works in the accounts payable department at ABC Company. When checks are returned to the company for incorrect vendor addresses, she is supposed to research them, correct them, and then forward them to the proper address. Instead, Lily decided to convert some of the returned checks for her own use. Based on the information provided, what type of check tampering scheme is this likely to be?

a. Authorized maker

b. Forged maker

c. Forged endorsement

d. Concealed check

c. Forged endorsement

61
New cards

What are the red flags for check tampering?

a. Void checks

b. Missing checks

c. Checks payable to employees

d. All of the above

d. All of the above

62
New cards

In the case study in the textbook, Ernie Phillips was a CPA who had fallen on hard times both financially and personally. He eventually got a job as a controller for a friend who had just been named as the receiver for a financial services company. Within a short period of time Phillips began writing checks to himself that had nothing to do with payroll. Control weaknesses that facilitated the commission of this fraud include which of the following?

a. The bank statements were sent directly to Phillips.

b. Phillips had check signing authority.

c. There was no separation of duties between accounts payable and the treasury department.

d. All of the above

a. The bank statements were sent directly to Phillips.

63
New cards

In one of the case studies in the textbook, Melissa Robinson, who worked as an executive secretary for a worldwide charitable organization and was active in her children's school, was also a thief. As one of two people allowed to sign checks on the organization's bank accounts, she learned early on that she could forge the second person's signature without anyone becoming suspicious. How was she finally caught?

a. A co-worker contacted the organization's executive director when she found that a company check had been written to the children's school for Robinson's personal items.

b. The auditors discovered her fraud during an annual audit of the books.

c. Robinson's husband tipped off the audit committee after he became suspicious of some of Robinson's purchases.

d. New officers were elected, and they took the accounting books from her.

d. New officers were elected, and they took the accounting books from her.

Explore top notes

note
Lecture 13A: Paleozoic Life
Updated 236d ago
0.0(0)
note
Gravitation and Circular Motion
Updated 1083d ago
0.0(0)
note
Chapter 11: Stockholders' Equity
Updated 812d ago
0.0(0)
note
chapter 4: a&p (tissues)
Updated 661d ago
0.0(0)
note
APES Unit 2 - Biodiversity
Updated 546d ago
0.0(0)
note
Lecture 13A: Paleozoic Life
Updated 236d ago
0.0(0)
note
Gravitation and Circular Motion
Updated 1083d ago
0.0(0)
note
Chapter 11: Stockholders' Equity
Updated 812d ago
0.0(0)
note
chapter 4: a&p (tissues)
Updated 661d ago
0.0(0)
note
APES Unit 2 - Biodiversity
Updated 546d ago
0.0(0)

Explore top flashcards

flashcards
global Quiz
39
Updated 1053d ago
0.0(0)
flashcards
ap psych unit 7
73
Updated 1143d ago
0.0(0)
flashcards
Westward Expansion
29
Updated 1139d ago
0.0(0)
flashcards
latin vocab 1-30
28
Updated 754d ago
0.0(0)
flashcards
Chem Ch.4 Element Info
30
Updated 1283d ago
0.0(0)
flashcards
global Quiz
39
Updated 1053d ago
0.0(0)
flashcards
ap psych unit 7
73
Updated 1143d ago
0.0(0)
flashcards
Westward Expansion
29
Updated 1139d ago
0.0(0)
flashcards
latin vocab 1-30
28
Updated 754d ago
0.0(0)
flashcards
Chem Ch.4 Element Info
30
Updated 1283d ago
0.0(0)