Question

Question 1

To prevent fraudulent shipments of merchandise, organizations should:match every outgoing shipment to a sales order.all of the above.make sure that all increases to perpetual inventory records are supported by proper source documents.match every receiving slip to an approved purchase order.

Question 2

According to the 2012 Report to the Nations on Occupational Fraud and Abuse, non-cash schemes occur more frequently than cash schemes. TrueFalse

Question 3

The unaccounted-for reduction in the companys inventory that results from theft is called:physical defalcation.shrinkage.spoilage.misappropriation of intangible assets.

Question 4 0 / 1 point

According to the 2012 Report to the Nations on Occupational Fraud and Abuse, cash schemes have a higher median loss than non-cash schemes. TrueFalse

Question 5

Which of the following methods can be used to conceal inventory shrinkage on a companys books?Writing off inventory as obsoleteCreating fictitious sales and receivables Physical padding All of the above

Question 6

Borrowing a company asset for personal use without permission, even if it is returned unharmed, is a form of non-cash asset misappropriation. TrueFalse

Question 7

Nicolette Garrison works part-time at an independent record store. Whenever her friend, Jacob Barker, comes into the store during one of her shifts, he picks up a CD and brings it to the register where Nicolette is stationed. After ringing a œno sale transaction on the cash register, Nicolette pretends to swipe Jacobs credit card for payment. She puts the CD in a bag and gives it to Jacob, who walks out without actually paying for the merchandise. What kind of scheme is being committed?Cash larcenySales skimming Fake saleFalse refund

Question 8

To deter inventory theft schemes, organizations should install security cameras in the warehouses without the employees knowledge. TrueFalse

Question 9

According to the 2012 Report to the Nations on Occupational Fraud and Abuse, the theft of which type of non-cash asset was the least common but caused the highest median loss?Equipment Proprietary information Inventory Securities

Question 10

Which of the following is not a method used to conceal false shipments of inventory?Writing off the inventory as scrap Physical padding Creating false sales orders Falsely increasing the perpetual inventory

Question 11

Running a computer program that identifies shipping documents with no associated sales order can detect which of the following non-asset cash misappropriation schemes?Purchasing and receiving schemes Unconcealed inventory larceny Asset requisition schemes False shipments

Question 12

Which of the following procedures would be least helpful in preventing larceny of non-cash assets?Employing security guards at the entrance of the warehouse Creating access logs to track employees that enter restricted areas Installing surveillance cameras in the warehouse and on sales floors Segregating the duties of sales and accounts payable

Question 13

An employee causes his organization to purchase merchandise that it does not need. This is an example of what type of scheme?Unconcealed larceny schemePurchasing and receiving scheme Asset requisition scheme False billing scheme

Question 14

Manually altering entries in an organizations books in order to conceal fraud is called:fictitious reconstruction.shrinkage.forced reconciliation.padding the books.Subsection

Question 15

To facilitate a bribery scheme, a fraudster might divert company funds to a non-company account from which the illegal payments can be made. This account is called a:bid pool.slush fund.petty cash fund.none of the above.

Question 16

The offering, giving, receiving, or soliciting of something of value for the purpose of influencing a business decision without the knowledge or consent of the principal is known as:conflict of interest.illegal gratuity.commercial bribery.official bribery.

Question 17

Which of the following is a type of kickback scheme?Improper disclosure Extortion Overbilling Turnaround sale

Question 18

The primary approach for preventing conflicts of interest schemes is to develop and implement which of the following?An anonymous reporting mechanism to receive tips and complaintsA document retention programA voucher systemA company ethics policy

Question 19

If a government employee agrees to award a contract to a vendor in exchange for a promise of future employment, this is considered to be an illegal gratuity. TrueFalse

Question 20

Ben Rogers works as a cashier for Tillis Sporting Goods. One afternoon, he asked his sister Dawn to come into the store. When she arrived, Ben put three watches, two fishing reels, and four pairs of sunglasses in a sack and gave it to her. Dawn walked out of the store, sold two of the watches, and returned to the store later to return the other items for a refund. What type of asset misappropriation has been committed?Pay-and-return schemeSales skimmingInventory larceny schemeFalse refund schemeQuestion 21Which of the following is not a type of corruption scheme?Concealed paymentsConflict of interestBriberyIllegal gratuitiesQuestion 22The key component to most kickback schemes is:price inflation.counterfeit invoices.stealing customer statements.forged endorsements.

Question 23

The typical bid-rigging scheme committed during the need recognition phase of the contract negotiation process involves defining a œneed that can be met only by a certain supplier or contractor.TrueFalseQuestion 24Which of the following is a red flag that might indicate that a bid-rigging scheme is occurring?A high bid is followed by amendments that reduce the payments to the contractor.The contract price is unusually low.The losing bidders become sub-contractors on the project.Many more bidders responded to the request for proposals than expected.Question 25To safeguard against kickback schemes, which of the following procedures should an organization implement?All of the above.Establish a written policy specifying that employees cannot accept more than $500 annually in gifts from customers or suppliers.Have an employee in the purchasing department review the organizations payment patterns on a quarterly basis.Prohibit employees from engaging in any transaction on behalf of the organization when they have an undisclosed personal interest in the transaction.Question 26Which of the following would likely not be a potential target for accepting bribes in a big-rigging scheme?A contracting officialThe engineer in charge of the projects technical specificationsA product assurance representativeAn accounts payable clerkQuestion 27In one of the cases in the textbook, Swainlers Technology discovered that someone had stolen 1,400 hard drives from its computer warehouse.In order to collect on its theft insurance policy, the company had to show that the theft was an outside job. Before the insurance company paid Swainlers claim, it hired an independent investigator, who ultimately found that the hard drives were stolen and sold by Swainlers marketing manager, Frederic Boucher. Which of the following control weaknesses were present in the company?The surveillance cameras on the loading dock didnt work.Background checks were required only on senior executives and accounting personnel.All of the above.Because the company was run primarily on trust, many transactions were conducted without any documentation or controls.SubsectionQuestion 28Johanna Pye is a hair stylist at Mamon Salon. The salons policy states that stylists receive 40 percent of the revenue they generate as their compensation. Johanna grew tired of sharing her income with the salon and decided she wanted to make more money. She continued seeing her existing clients at the salon, but when new clients called for an appointment, Johanna lied and told them the salon was completely booked for the next few months. She then offered to come to their homes and cut their hair for 10 percent less than what the clients would be charged at the salon. She did not report the house call appointments to the salon, and was therefore able to keep all the income she generated from these side clients. This is an example of what type of scheme?Resource diversionBusiness diversionShell companyDouble dealingQuestion 29Identifying trends in over-purchased and/or obsolete inventory over several periods is a proactive computer audit test that can be used to detect which of the following schemes?CorruptionOverstated expensesFalse purchasesNone of the aboveQuestion 30Julius Smith is a purchasing agent for a Louisiana state agency. He has a project budgeted for $24,000 that he would like to hire RGS Consultants to handle. Unfortunately for Julius and RGS Consultants, the state has a requirement that all projects over $10,000 must be sent out for competitive bids. In order to avoid the bidding process, Julius breaks the project into three component projects worth $8,000 each. RGS Consultants is subsequently awarded the contracts for all three projects. What type of bid-rigging scheme is this?Bid poolingBid splittingUnderbiddingBid diversionQuestion 31Which of the following schemes can be detected by identifying vendor addresses that are not designated as a business address?Shell company schemesConflicts of interestKickback schemesAll of the aboveQuestion 32Stanley Block works in the IT department at Towery, Inc. After finding out that the company is planning to purchase four more computers for the accounting department, Stanley bought four computers from a friend for $1,200. Then, using his brothers name and address as vendor information, he resold the computers to Towery for $2,300. This type of scheme is known as a(n):double-sided sale.over-purchase sale.turnaround sale.resource diversion sale.Question 33In one of the case studies in the textbook, Rita Mae King was a purchasing agent at an electronics and appliance chain. She frequently worked with travel vendors and managed to put Spicewood Travel on the top of the preferred vendor list. Upon investigation, the fraud examiners discovered that she ran her own travel agency out of her office at the store and received kickbacks from Spicewood Travel in return for having her company use them to book trips. What triggered the investigation of Rita Mae Kings activities?Her supervisor found an invoice for a trip that she booked showing she received an employee discount from Spicewood Travel.An employee from Spicewood Travel called Kings office and left an urgent message for King to call them concerning a travel problem with a group she booked to the Cayman Islands.Her former boyfriend called the loss prevention departments hotline and informed them that she was receiving kickbacks from Spicewood Travel.Another employee of her company found a business card that she had left in a fishbowl for a drawing showing that she was an employee of Spicewood Travel.Question 34According to the 2010 Report to the Nations on Occupational Fraud and Abuse, schemes involving corruption were the least common of the three types of occupational fraud schemes.TrueFalseQuestion 35In one of the case studies in the textbook, Rita Mae King was a purchasing agent at an electronics and appliance chain. She frequently worked with travel vendors and managed to put Spicewood Travel on the top of the preferred vendor list. Upon investigation, the fraud examiners discovered that she ran her own travel agency out of her office at the store and received kickbacks from Spicewood Travel in return for having her company use them to book trips. Why didnt the company pursue legal action against King?Spicewood Travel agreed to reimburse the company for overcharges if they wouldnt pursue criminal action against King.There was not enough evidence to pursue a conviction.The vice president of loss prevention recommended against criminal action because of Kings age and her husbands ill health.The company didnt want the publicity so they quietly let her resign.Question 36According to the 2012 Report to the Nations on Occupational Fraud and Abuse, the median loss due to corruption schemes was the highest of the three types of occupational fraud schemes.TrueFalseQuestion 37Fred Weaver is the contracts manager for a city government. In order for anyone to do business with the municipality, he or she must pay Fred 10 percent of the total amount of the contract. This type of corruption is known as:a conflict of interest.economic extortion.bid-rigging.bribery.Question 38Donna Boyd is an internal auditor for GDP, Inc., an electronics manufacturer. While conducting a routine review of the companys inventory costing, she discovers that the cost of one of the parts they use in manufacturing DVD players has been steadily increasing over the last six months and is now much higher than the general market price. Additionally, she notices that the company has been heavily favoring one specific supplier for that part. Based on these circumstances, what type of fraud scheme may be occurring at GDP?KickbacksShell companyConflict of interestAny of the aboveQuestion 39In one of the case studies in the textbook, the General Services Administration (GSA), the federal governments bookkeeping agency, purchased more than $200 million worth of defective and useless furniture from a New Jersey furniture manufacturer. After reviewing the books of the furniture manufacturer, it was clear that the company was paying off GSA inspectors. What happened to the furniture manufacturing company?It lost its contract with the GSA and went bankrupt.It was charged with making false certifications and fined $2 million.It was bought by another company.All of the above.Question 40In one of the case studies in the textbook, the General Services Administration (GSA), the federal governments bookkeeping agency, purchased more than $200 million worth of defective and useless furniture from a New Jersey furniture manufacturer. After reviewing the books of the furniture manufacturer, it was clear that the company was paying off GSA inspectors. The investigators eventually focused on one particular regional inspector because:he purchased eleven race horses.he paid cash for a new home on the Jersey shore.he vacationed in Europe with the vendor and charged the trip back to the government as a business related trip.he had credit card charges of more than twice his annual salary during a six-month period.


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"