In Cressey’s fraud triangle, its three of the legs are Opportunity, Pressure and


Which of the following offender types in which people who take the money and run away.


When situational pressures and perceived opportunities are low and personal integrity is high,occupational fraud ...


In Fraud scale pressure, opportunity and integrity variables all results in a list of ___ possible red flags or i ...


__________ can be defined as conduct detrimental to the organization and to the employee.


Perceived certainty of detection is directly related to employee theft for respondents in all industry sectors,th ...


According to a survey, in principal perpetrator, males in a majority of cases, accounting for ___ percent offraud ...


The principal way to detect omitted credits from books of account is through:


People commit financial statement fraud to:


Which of the following is NOT the reason why senior management will overstate business statement.


Which of the four basic measures, if properly installed and implemented may help prevent inventory fraud.


The act of an official or fiduciary person who unlawfully and wrongfully uses his station or character toprocure ...


Which of the following are the classifications for the Corruption.


__________ may be defined as the offering, giving, receiving or soliciting anything of value to influence anoffic ...


Which of the following can constitute a bribe, even if the illicit payment is never actually made.


The most common method of detection in corruption cases is:


Undisclosed payments made by vendors to employees of purchasing companies are referred to as:


Bid rigging scheme occurs when:


Every bribe is a two sided transaction, in which where a vendor bribes a purchaser, there is someone onthe vendo ...


In which of the following process, all bidders are legally supposed to be placed on the same plane ofequality, bi ...


The more power a person has over the bidding process, the more likely the person can influence theselection of a ...


Which of the following is NOT the phase of the bidding process.


When a victim company purchases unnecessary goods or services from a supplier at the direction of thecorrupt empl ...


In ____________ scheme, a supplier pays an employee of the purchasing company to write specificationsthat will re ...


In which phase of competitive bidding process, fraudsters attempt to influence the selection of a contractorby re ...


A process by which several bidders conspire to split contracts up and ensure that each gets a certainamount of wo ...


Another way to eliminate competition in the solicitation phase of the selection process is to:


The person or persons who have access to __________ are often the targets of unethical vendors seekingan advantag ...


Which of the following is NOT the reason to bribe employees of the purchaser.


Placing any restriction in the solicitation documents that tend to restrict competition is called prebidsolicitat ...


Which of the following is the criterion for bid solicitation.


Collusion or bid rigging between bidders is called


The behavior profile of employees who are involved in bribery schemes may include:


Which of the following is NOT the example of bribery prevention policies.


A ___________ occurs when an employee, manager or executive has an undisclosed economic orpersonal interest in a ...


A scheme is classified as a Conflict of interest:


The fraudsters’ interest lies with an employer other than a company.


A special scheme in which employees know their employer is seeking to purchase a certain asset and takeadvantage ...


__________ is required if and when officers, executives or other persons in trusted positions becomesubjects of a ...


Which of the following method is NOT used to detect conflicts of interest.


Conflict of interest cases are more easily prevented than detected.


Which are check tempering frauds in which an employee prepares a fraudulent check and submits itusually along wit ...


Multiple cashiers operate from a single cash drawer without separate access codes is a red flag for:


Maintain the presence of a manager or supervisor near the area of the cash register as a deterrent to theftis a p ...


The scheme which reduces victim companies to issue fraudulent payments for goods or services that theyhave not re ...


The most common method for billing scheme is:


Which of the following is NOT the type of billing scheme.


In ___________ scheme, an employee creates false vouchers or submits false invoices to the employer.


A voucher is:


A fabricated name and the post office box that an employee uses to collect disbursements from falsebillings is ca ...


One reason employees might be hesitant to use PO boxes in shell company schemes is that somebusinesses are specia ...


What is sometimes used to overcome well designed internal controls of a victim company.


Most of the shell company schemes involve the purchase of goods rather than services.


A shell company scheme in which actual goods or services are sold to the victim company is known as:


A person is said to be in ________ act, when the business which he transacts, or the money or propertywhich he ha ...


The essential elements of a ________ are an actual or constructive taking away of the goods or propertyof another ...


Larceny by Fraud or deception means that:


The seller’s price to the buyer is not fixed or determinable when:


Which of the following are not of Basic types of non sharable problems.


_____________ involves purposeful misreporting of financial information about the organization that isintended to ...


Asset misappropriation schemes were the “middle children” of the study; they were more common than fr ...


According to Marshall, ______ are probable future economic benefits obtained or controlled by a particularentity ...


Assets that are long lived and that differ from property, plant and equipment hat has been purchasedoutright or ...


A tangible asset is one which is:


_________ normally are carried on an organization’s books as expenses because they tend to beconsumed by th ...


__________ are the amounts which are owned to other entities:


Asset misappropriations have an effect on the liabilities and do also have an indirect effect on the equityaccoun ...


The difference between assets and liabilities is called:


___________ is to allow the owner, investors, creditors and others with an interest to know the appropriatebook w ...


Occupational fraud and abuse is a (an) __________ of doing business, in much the same way that we payexpenses for ...


When expenses used to produce income all of them should be matched in a consistent manner againstthat income, ...


Depreciation is especially applicable when companies try to overvalue their assets and net worth; thelower their ...


Any expenses that are incurred but not paid by the end of the year are counted in our records of profit andloss, ...


The heart of book keeping system is the ___________.


____________ is a summary of the account balances carried in a ledger.


____________ is a process by which a bookkeeper records all transactions and can adjust the books.


________ increase assets and expenses and/or decrease liabilities and/or equity


________ decrease assets and expenses and/or increase liabilities and/or equity


The excess credits (or debits) on the income statement are used to decrease (or increase) the equityaccount.


Delivery has not occurred or services have not been rendered when:


___________ and __________ are used to increase (or decrease) the equity account.


By removing a tangible asset from the business (a debit), the books will be ___________ by the exactamount of the ...


Once the expense account is closed, it becomes a historical item and probably will never be reviewedagain.


When an incorrect total is carried from the journal to the ledger or from ledger to the financial statements,this ...


Skimming is:


Which of the following is not the skimming scheme.


According to fraud tree, cash has three following schemes:


Skimming cases can more likely to be detected by:


The most basic skimming scheme occurs when:


The amount of cash on hand in a register may be compared to the amount showing in the register tape inorder to de ...


BACD434CCAFA8D24B56238B9The prime targets for skimming schemes which are hard to monitor and predict such as late ...


What can make it easy for an employee to skim sales or receivables.


Entering a sales total lower than the amount actually paid by the customer is called:


Employees with the authority to grant discounts in order to skim revenues may use which authority.


Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail andrecording the rec ...


Which of the following are used in a short term skimming scheme.


Employees steal an incoming payment and then place the incoming funds in an interest bearing accountfor:


Financial statement fraud is committed by:


Fraudsters use the accounting system as a tool to generate the results they want in ___________approach:


In which approach, fraudsters produce whatever financial statements they wish, perhaps using just atypewriter or ...


Which of the following is NOT standard of generally accepted accounting principles.


A typical issue involving material and fraud would be:


By what accountant means that the financial figures presented by the company are at least as much asreflected in ...


“Anticipate possible losses and omit potential profits”, this results in:


_________ assumes the business will go on indefinitely in the future.


The price of an asset on which the asset is selling at on the open market in a transaction between a willingbuyer ...


SIMULATIONThe _______________ cost method of pricing would carry an asset’s value on the financial statemen ...


Accounting records are designed to be kept on subjective rather than objective evidence.


Which of the following is the amount of money that would be realized upon the sale of the asset at somepoint in t ...


Which of the following factors is NOT included in most financial statement schemes.


How many accounts are affected in fraudulent accounting entries and therefore same number ofcategories on the fin ...


_________ revenues involve the recording sales of goods or services hat did not occur.


Revenue is recognized when it is:


According to SAB 104, for the revenue to be typically considered realized or realizable and earned, whichof the f ...


Which of the following is true for Red flags associated with fictitious revenues.


According to accounting principles, ________ and ________ should be recorded or atched in the sameaccounting peri ...


Physical assets including _________ and ________ are the most commonly misappropriated noncashasset in our study. ...


Which of the following is NOT the method for stealing inventory and other assets.


Larceny is the scheme in which an employee simply takes inventory from the company premises withoutattempting to ...


Which sale occurs when the accomplice of the employee fraudster “buys” merchandise, but the employee ...


The forms that allow noncash assets to be moved from one location in a company to another can be usedto facilitat ...


BACD434CCAFA8D24B56238B9False billing scheme states that:


If the assets are intentionally purchased by the company but simply misappropriated by the fraudster, thisis refe ...


____________ corrupt employees can cause inventory to be fraudulently delivered to themselves oraccomplices.


A variation between the physical inventory and the perpetual inventory totals is called:


Inventory shrinkage is the unaccounted for reduction in the company’s inventory that does not results from ...


A running count that records how much inventory should be on hand is referred to:


Forced reconciliation of the account says:


__________ inventory and other assets is relatively common way for fraudsters to remove assets from thebooks befo ...


SIMULATION______________ is required not only for theft, but for procedures to detect errors, avoid waste and ins ...


According to Hollinger and Clark for Policy development, management must pay attention to:


Organizations that had external audits actually had higher median losses and longer lasting fraud schemesthan tho ...


A __________ is a day by day, or chronological, record of transactions


A journal in which all sales made on credit or cash are listed is:


The principle behind full disclosure is:


SIMULATION___________ allows the fraud examiner to inspect key attributes on a smaller portion (or sample) of tho ...


Statistical sampling enables the examiner to predict the occurrence rate for the population and thereforedetermin ...


Which counts sometimes can give rise to inventory theft detection.


Which of the following is NOT the aspect of inventory purchase.


The scheme in which the same vendor is receiving favorable treatment can be found in purchases byvendor searches. ...


Which of the following search is used for unusually high incidence of returns and allowances scheme.


Bank cut off statements should be requested for 10 15 days after the closing date of the balance sheet.


Verify supporting documentation on outstanding checks written for a material amount is a test used toconduct for: ...


Which check tampering red flag may indicate employees have embezzled cash and charged theembezzlement to expense ...


___________ should be examined to see that all are properly documented and that inappropriatepayments have not be ...


BACD434CCAFA8D24B56238B9Bank statement are diligently reviewed to ensure that amounts and signature have not been ...


Physical tampering prevention is a check tampering technique that is used to secure bank assistedcontrols.


A technique by which checks are numbered using a new technique that is revealed by a colored highlighterpen or by ...


In physical tampering prevention technique, hidden images can be seen only when the check is held at anangle thro ...


When employees committing the fraud removes cash from the register and also the item allegedly beingreturned is d ...


When employees avoid detection in a refund scheme to keep the sizes of the disbursement low, is referredto:


One final means of concealing a register scheme, as with many kinds of fraud, is to destroy all records ofthe tra ...


______________ can be detected by closely examining the documentation submitted with the cashreceipts.


________, one of the Fraud synonyms implies that deceiving so thoroughly as to obscure the truth:


Which of the following must be present for a fraud to exist.


Persuasive evidence of an arrangement does not exist when: