Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Certified Fraud Examiner CFE-Financial-Transactions-and-Fraud-Schemes Full Course Free

Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers

Question 41

According to the recommended methodology for responding to cybersecurity incidents, which of the following activities should occur during the detection and analysis step?

Options:

A.

Limiting the damage caused by the attack

B.

Creating an incident response plan

C.

Restoring control of the systems that were affected

D.

Identifying all breaches that occurred

Question 42

The principal way to detect omitted credits from books of account is through:

Options:

A.

Forced Balance

B.

Trend analysis

C.

Expense account

D.

None of all

Question 43

Which of the following methods is NOT used to detect conflicts of interest?

Options:

A.

Tips & Complaints

B.

Review of vendor ownership files

C.

Underbillings of assets

D.

Interviews with purchasing personnel

Question 44

The most basic skimming scheme occurs when:

Options:

A.

An employee sells goods or services to a customer, collects the customer’s payment, but makes no record of the sale.

B.

An employee buys goods or services from a customer, drops the customer’s payment, but makes no record of the purchase.

C.

An employee sells goods or services to a stakeholder, collects the stakeholder’s payment and makes record of the sale too.

D.

An employee buys goods or services from a stakeholder, drops the stakeholder’s payment and makes record of the purchase too.