Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

New Release CFE-Financial-Transactions-and-Fraud-Schemes Certified Fraud Examiner Questions

Certified Fraud Examiner - Financial Transactions and Fraud Schemes Exam Questions and Answers

Question 37

People commit financial statement fraud to:

Options:

A.

Conceal false business performances

B.

Preserve personal status/control

C.

Maintain personal income

D.

Stand outside the accounting system

Question 38

Hannah is a manager at a financial institution. To safeguard the bank and its customers from electronic funds transfer (EFT) fraud, Hannah is implementing several preventive measures. Which of the following is NOT a measure Hannah should take to prevent EFT fraud?

Options:

A.

If a customer reports the loss or theft of an access device, then cancel the existing card, PIN, or other form of access and issue a new one.

B.

Send a welcome letter to new customers to determine if the address submitted on the account application is valid.

C.

Separate the duties of bank employees so that the responsibilities for the issuance of access devices are separate from the issuance of PINs.

D.

Mail PINs and other associated account information together to reduce the chance of those items being lost during transit.

Question 39

A scheme is classified as a Conflict of Interest:

Options:

A.

when an employee must have some kind of ownership or employment interest in the vendor submitting the invoice.

B.

when a salesman must have some kind of ownership or employment interest in the vendor submitting the sales.

C.

when a purchaser must have some kind of ownership or employment interest in the vendor submitting the purchase.

D.

when a dealer must have some kind of dealership interest in the vendor submitting the stock.

Question 40

Georgina works for TAK Intelligence, a competitive intelligence firm. She is tasked with gathering intelligence about ERO Corp., a competitor of one of TAK's clients. To gather the intelligence, Georgina poses as a customer and contacts ERO. She then elicits sensitive information from an ERO employee. Georgina's approach is an example of:

Options:

A.

Human intelligence

B.

Baiting

C.

Scavenging

D.

Open-source intelligence