Forensic Accounting Exam 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is a typical benchmark for calculating lost profits?

industry averages

For a ghost employee, which of the following is NOT one of the 4 primary steps needed to make this scheme work?

input a valid home address for the ghost

lapping

is a method of concealing the theft of cash which involves the crediting of one account through the abstraction of money from another account

segregation of duties

is the internal control procedure that is most effective in preventing skimming

a final concealment strategy with stolen deposits

is to carry the missing money as deposits in transits

Which of the following is indicative of the actions of the forged maker perpetrator?

issues two checks for the same invoice and fraudlently signs and cashes the second

Which of the following best describes the key attribute of kickback schemes?

kickback schemes always involve at least one person inside the organization and one person outside the organization

Which of the following is not a method for committing and concealing a sales skimming scheme?

lapping

Which of the following is NOT correct regarding bid-rigging schemes?

lost bids are always part of a bid-rigging scheme

Which of the following is NOT a type of commercial damages?

lost expenditures

Which of the following is NOT a methodology by which financial statement fraud is committed?

manipulation of accounting regulations

Which of the following is NOT a fictitious revenue schemes?

matching expenses to revenues

Which of the following is an integral step in a pay-and-return scheme?

misappropriate the incoming check related to returned good and desposit it in a bank account other than the company's

From the conceptual framework for financial reporting, which concept permits management to account for transactions in any manner they please?

none of the above (materiality, consistency, historical cost)

Which of the following is the first step to form a shell company?

obtain a certificate of incorporation from the state

bribery may be defined as

offering, giving, receiving, or solicitng anything of value to influence an offical act

Which of the following red flags is commonly associated with fictitious expense reimbursement schemes?

patterns when expense reimbursements are for the same amount

What is the main purpose of practice aids in forensic and valuation services?

provide useful information and guidance to practicing professionals

Which of the following best describes the contribution of ratio analysis to a forensic accounting or fraud examination engagement?

ratio analysis may provide red flags or symptoms of fraudulent activity

Which of the following is NOT likely to deter financial statment fraud?

reducing the amount of inventory on-hand

Related to financial reporting disclosures, even when reported, which of the following still requires careful examination by the anti-fraud professional?

related party transactions

Which of the following is likely the least effective methodology to detect sales or accounts receivable skimming?

review the accounts receivable employee personnel records for prior terminations for fraudulent activity

Which of the following best describes skimming?

skimming involves the theft of cash prior to the cash entering the company's bank account and accounting system

Which of the following is likely to be least effective in detecting noncash misappropriations?

summarizing inventory items valued at less than the retail price

Which of the following is NOT a decision that needs to be made with regard to quantifying lost revenues and increased expenses?

the appropriate regression software

generally, in order to pursue a claim for legal damages successfully,

the injured party must prove liability and damages

What is the best way to prevent and detect conflicts of interest?

transparent and full disclosure

Which of the following is a non-cash asset misappropriation scheme?

using a company computer to operate an Internet commerce site after business hours

Which improper asset valuation may inflate the current ratio?

valuing inventory at current retail prices

Which of the following is most likely the least effective methodology to detect cash larceny?

visit the store and interview customers concerning their shopping experience

Which of the following is not a methodology for the skimmy of receivables and its related concealment?

voiding a sale after the customer leaves the premises

Which of the following is not typically a methodology to conceal the misuse of noncash assets?

voiding sales at the warehouse liquidation location

economic extortion schemes are committed

when one person demands payment from another, typically with the implication that harm will come if the payment isn't made

Which of the following is an activity NOT usually associated with forensic accounting and fraud examination consulting and litigation support?

writing an audit report

A pass through scheme is a sub-category under shell company schemes. Perpetrating a pass through scheme requires the abilit to add vendors to the vendor master file

acutal goods or services are purchased by the shell company and resold, at an inflated price, to the victim organization

Which of the following is NOT a typical method that employees use to overstate legitimate expenses on their expense reports?

altering the delivery paperwork for inventory receipts at the warehouse

the discounted cash flows method (DCF) requires

an estimate of future earnings or cash flows, and understanding of the duration of those cash flows, and the determination of an appropriate risk adjusted discount rate in determing Present Value (PV)

Which of the following is most consistent with illegal gratuities?

an illegal gratuity is not received as a result of an agreement to facilitate an action in advance of that action

Which of the following generally is NOT considered "something of value?"

an obligation to make up hours derived from accidentally over-using "banked" vacation hours

Which of the following best describes the difference between skimmy and cash larceny?

cash larceny is an "on-the-books" scheme while skimming is an "off-the-books" scheme

Which of the following is NOT one of the 5 major classifications of financial statement fraud?

channel stuffing

Which of the following is a key attribute of corruption schemes?

corruption schemes other than conflicts of interest usually involve at least one person outside (non-employee) of the organization acting to obtain some advantage inconsistent with their duties, responsibilities, and relationship with the organization

Which of the following is not a technique to conceal inventory shrinkage?

counting and valuing the physical inventory at the end of each year

The legal framework for damages does NOT include which of the following?

damages that can be converted to lost cash flows directly attributable to the act of the liable party

Which of the following most accurately indicates why conflicts of interest create concern?

decision makers can be influenced by a person with a conflict of interest without understanding the underlying motivations of the person

register disbursement fraud in the form of falsified returns can be

detected by physical inventories

Given the 4 criteria necessary for a sale to be complete which of the following is NOT one of those conditions?

documentation exists that can serve as evidence of a sale

in a forensic accounting investigation,

documents are not only subjected to confirmation with external parties, but may also be subjected to fingerprint analysis

Which of the following is most accurate with regard to the time value of money?

each engagement requires its own development and defense of the discount rate

subsequent events

events occuring or becoming knowing after the close of the period that may have a significant effect on the financial statements should be disclosed

Which of the following forensic accountant's work product is least likely to provide relevant evidence for an investigation?

examination of the employee handbook

A sales employee created a "dummy" customer record. The sales employee then recorded phony refunds and then pocketed the cash. What procedure might catch this fraud?

extract customers with no telephone numbers or tax ID number

Of the following, choose the one that depicts a situation where liabilities and expenses are manipulated to make a company appear more profitable?

failure to record payroll earned by employees but not paid as of period end

Which of the following is NOT a type of damages that may ensue as a result of personal injury, wrongful death and survivor actions?

family member medical costs

Which of the following most accurately identifies the significance of the "perception of detection"?

fear of getting caught is a critical aspect of effective deterrence

Which of the following is most accurate with regard to fraud prevention and fraud deterrence?

fraud deterrence is about creating an envrionment where fraud is less likely to occur

Which of the following is NOT a method to prevent and detect the theft and alteration of outgoing company checks?

hand each paycheck to the employee while checking appropriate identification

Which of the following is NOT a common reason why senior management might overstate or understate business performance?

high levels of personal debt leading to a need for the executive to generate cash

Which of the following red flags is seldom associated with cash register frauds?

higher than expected uncollectible receivables

Explain what is meant by the human factor?

human failings have led trusted people to violate that trust

force balancing

if a fraudster has a hand in both ends of the receipting process, he or she can falsify records to conceal the theft of receivables payments

all areas of concern in determining incremental costs

-allocated costs -accounting estimates -the time value of money

fixed assets are subject to manipuplation through several different schemes, including:

-booking fictitious assets -misrepresenting asset valuation -improperly capitalizing items that should be expensed

some ways to detect altered expense schemes is to:

-compare the expenses claimed to the credit card statement -require a company issued credit card for all expense purchases -require a full printed receipt, as opposed to a "summary receipt"

the venues where the fraud examiner or forensic accountant can expect to be evaluated, scrutinized, and challenged includes:

-deposition testimony -trial testimony -meetings with counsel where they determine how to proceed with the case

two of the most common fraud scheme(s) involving accounts receivable

-fictitious receivables -failure to write-off accounts receivable as bad debts

valuations can be developed to address a number of issues, relating to:

-liquidations -mergers and acquisitions -bankruptcy -divorce

public records include:

-real and personal property records -criminal and civil litigation records -stock trading activites for public companies by executives

all of these are red flags that fraudulent expense reporting is occuring

-receipt numbers from the same establishment that are consecutive even though they occur over a period of time -expense amount ending in "0" -expense amounts consistently under the threshold for requiring a receipt

red flags associated with improper asset valuation:

-reocurring negative cash flows from operations, or an inability to generate cash flows from operations, while reporting earnings and earnings growth -significant declines in customer demand and increasing business failures in either the industry or the overall economy while company reports earnings and earnings growth -unusual increase in gross margin or margin in excess of industry peers

reasons senior managers issue fraudulent financial statements include:

-to conceal true business performance -to preserve personal status/control -to maintain personal income/wealth flowing from salary, bonus, stock and stock options

Which of the following is one of the 5 principal categories of check tampering?

Creating of a check and altering the payee after the check is signed

Which of the following is NOT one of the 5 major categories of fradulent disbursements?

Shell Company schemes

an example of fictitious maker

a check on which the signature is forged

related-party transactions occur when

a company does business with another entity whose management or operating policies can be controlled, or significantly influenced, by the company or by some other common party


Conjuntos de estudio relacionados

chapter 15 - human resource cycle

View Set

Bible Bowl 2017 - Revelation Chapter 17

View Set

4801 Adaptive Quizzing Review (Cardiac)

View Set

Ch 11: State Laws, Rules, and Regulations

View Set

Feminist Art/Postmodern Art&Contemporary Art as Political Weapon/New Technologies in Art

View Set