Forensics Exam 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Fixed assets are subject to manipulation through several different schemes, including

Booking fictitious assets, misrepresenting asset valuation, improperly capitalizing items that should be expensed

Which of the following is not one of the five major classifications of financial statement fraud?

Channel Stuffing

Given the four criteria necessary for a sale to be complete which of the following is not one of those conditions?

Cash has been collected

Which of the following best describes the difference between skimming and cash larceny?

Cash larceny is an "on the books" scheme while skimming is an "off the books" scheme.

Which of the following forensic accountant's work product is last likely to provide relevant evidence for an investigation?

Examination of the employee handbook

A sales employee created a "dummy customer record. The sales employee then recorded phony refunds and then pocketed the cash. What procedure might catch this fraud?

Extracting customers with no telephone numbers or tax ID number

Of the following, choose the one that depicts a situation where liabilities and expenses are manipulated to make a company appear more profitable?

Failure to record payroll earned by employees but not paid as of period end

What is bribery defined as?

offering, giving, receiving, or soliciting anything of value of influence an official act

A final concealment strategy with stolen deposits is to carry the missing deposits in ______

transit

What are events occurring or becoming known after the close of the period that may have a significant effect on the financial statements?

Subsequent Events

Which of the following is likely to be least effective in detecting non cash misappropriations?

Summarizing inventory items valued at less than the retail price.

Which of the following is not typically a methodology to conceal the misuse of non cash assets?

Voiding sales at the warehouse liquidation location.

In a forensic accounting investigation, what are documents subjected to?

confirmation with external parties and fingerprint analysis

Which of the following is indicative of the actions of the forged maker perpetrator?

Issues two checks for the same invoice and fraudulently signs and cashes the second check.

Which of the following is an integral step in pay and return scheme?

Misappropriate the incoming check related to returned good and deposit it in a bank account other than the company's

Which improper asset valuation may inflate the current ratio

Valuing inventory at current retail prices

What are some ways to detect altered expense schemes?

1. Compare the expenses claimed to the credit card statement 2. Require a company issued credit card for all expense purchases 3. Require a full printed receipt, as opposed to a summary receipt

Red flags associated with improper asset valuation:

1. reoccurring negative cash flows from operations, or an inability to generate cash flows from operations, while reporting earnings and earnings growth 2. Significant declines in customer demand and increasing business failures in either the industry or the overall economy which there are reports of company growth 3. Unusual increase in gross margin or margin in excess of industry peers

What is an example of a ficticious maker?

A check on which the signature is forged

What is a pass through scheme?

A subcategory under shell company schemes. Perpetrating a pass-through scheme requires the ability to add vendors to the vendor master file. Actual goods or services are purchased by the shell company and resold

What are the areas of concern in determining incremental costs?

Allocated costs, accounting estimates, and the time value of money

Which of the following is not a typical method that employees use to overstate legitimate expenses of their expense reports?

Altering the delivery paperwork for inventory receipts at the warehouse

The discounted cash flows method requires what?

An estimate of future earnings or cash flows, an understanding of the duration of those cash flows, and the determination of an appropriate risk adjusted discount rate in determining Present Value

Which of the following is most consistent with illegal gratuities?

An illegal gratuity is not received as a result of an agreement to facilitate an action in advance of that action

Which of the following generally is not considered "something of value"

An obligation to make up hours derived from accidentally over using "banked" vacation hours

Which of the following is a key attribute of corruption schemes?

Corruption Schemes other than conflicts of interest usually involve at least one person outside of the organization acting to obtain some advantage inconsistent with their duties, responsibilities and relationship with the organization

Which of the following is not a technique to conceal inventory shrinkage?

Counting and valuing the physical inventory at the end of the year.

Which of the following is one of the five principal categories of check tampering?

Creation of check and altering the payee after the check is signed.

The legal framework for damages does not include which of the following?

Damages that can be converted to lost cash flows directly attributable to the act of the liable party

Which of the following is most accurately indicates why conflicts of interest create concern?

Decision makers can be influenced by a person with a conflict of interest without understanding the underlying motivations of the person

The venues where the fraud examiner or forensic accountant can expect to evaluated, scrutinized, and challenged include

Deposition testimony, trial testimony, meetings with counsel where they determine how to proceed with the case

Which of the following is most accurate with regard to the time value of money

Each engagement requires its own development and defense of the discount rate

Which of the following is not a type of damages that may ensue as a result of personal injury, wrongful death, and survivor actions

Family member medical costs

Which of the following most accurately identifies the significance of the "perception of detection"?

Fear of getting caught is a critical aspect of effective deterrence

What are two of the most common fraud schemes involving accounts receivable?

Fictitious receivables and failure to write-off accounts receivable as bad debts

Which of the following is not a method to prevent and detect the theft and alteration of outgoing company checks?

Hand each paycheck to the employee while checking appropriate identification.

Which of the following is most accurate with regard to fraud prevention and fraud deterrence?

Fraud Deterrence is about creating an environment where fraud is less likely to occur

Which of the following is not a common reason why senior management might overstate or understate business performance

High levels of personal debt leading to a need for the executive to generate cash

Which of the following red flags is seldom associated with cash register fraud?

Higher than expected uncollectible receivables

Explain what is meant by human factor?

Human Failings have led trusted people to violate that trust

Which of the following is a typical benchmark for calculating lost profits?

Industry averages

For a ghost employee, which of the following is not one of the four primary steps needed to make this scheme work?

Input a valid home address for the ghost

Which of the following best describes the key attribute of kickback schemes?

Kickback schemes always involve at least one person inside the organization and one person outside the organization

What is a method of concealing the theft of cash which involves the crediting of one account through the abstraction of money from another account?

Lapping

Which of the following is not a method for committing and concealing a sales skimming scheme

Lapping

In order to pursue a claim for legal damages successfully, the injured party must prove what?

Liability and damages

Valuations can be developed to address a number of issues, relating to:

Liquidations, mergers and acquisitions, bankruptcy, and divorce

Which of the following is not correct regarding bid rigging schemes?

Lost bids are always part of a bid rigging scheme

Which of the following is not a type of commercial damages?

Lost expenditures

Which of the following is not a methodology by which financial statement fraud is committed?

Manipulation of accounting regulations

Which of the following is not a fictitious revenue scheme?

Matching expenses to revenues

From the conceptual framework for financial reporting, which concept permits management to account from transactions in any manner they please?

No concept allows this

Which of the following is the first step to form a shell company?

Obtain a certificate of incorporation from the state.

Economic extortion schemes are committed when

One person demands payment from another, typically with the implication that harm will come if the payment isn't made

Which of the following red flags is commonly associated with fictitious expense reimbursement schemes?

Patterns when expense reimbursements are for the same amount

Which of the following is most likely the least effective methodology to detect cash larceny?

Visit the store and interview customers concerning their shopping experience.

What is the main purpose of practice aids in forensic and valuation services?

Provide useful information and guidance to practicing professionals

Which of the following best describes the contribution of ratio analysis to a forensic accounting or fraud examination engagement?

Ratio analysis may provide red flags or symptoms of fraudulent activity

Public records include

Real and personal property records, criminal and civil litigation records, stock trading activities for public companies by executives

What are red flags that fraudulent expense reporting is occurring?

Receipt numbers from the same place that are consecutive even though they occur over a long period of time, expense amounts ending in zero and expense amounts consistently under the threshold for requiring a receipt

Which of the following is not likely to deter financial statement fraud?

Reducing the amount of inventory on hand

What is the fraud in the form of falsified returns can be detected by physical inventories

Register Disbursement Fraud

Related to financial reporting disclosures, even when reported, which of the following still requires careful examination by the anti fraud professional?

Related Party Transactions

Which of the following is likely the least effective methodology to detect sales or accounts receivable skimming?

Review the accounts receivable employee personnel records for prior terminations for fraudulent activity

What is the internal control procedure that is most effective in preventing skimming?

Segregation of Duties

Which of the following is not one of the five major categories of fraudulent disbursements?

Shell Company Schemes

Which of the following best describes skimming?

Skimming involves the theft of cash prior to the cash entering the company's bank account and accounting system

Which of the following is not a methodology for the skimming of receivables and its related concealment

Voiding a sale after the customer leaves the premises

Which of the following is not a decision that needs to be made with regard to quantifying lost revenues and increased expenses

The appropriate regression software

What are some reasons senior managers issue fraudulent financial statements?

To conceal true business performance, to preserve personal status/control, To maintain personal income/wealth flowing from salary, bonus, and stock

What is the best way to prevent and detect conflicts of interest?

Transparent and full disclosure

Which of the following is a non-cash asset misappropriation scheme?

Using a company computer to operate an internet commerce site after business hours.

What is force balancing?

When a fraudster has a hand in both ends of the receipting process, he or she can falsify records to conceal the theft of receivables payments.

Related party transactions occur when

a company does business with another entity whose management or operating policies can be controlled, or significantly influenced, by the company or by some other common party


Set pelajaran terkait

NWS CHa. 2-Networking Infrastructure and Documentation

View Set

Chapter 1: The Customer Service Profession

View Set