Accounting Concepts * Flashcards

1
Q

Generally speaking, _________________ is the proper basis for recording a piece of equipment on a company’s books.

A

Historical Cost
Although some exceptions exist, generally historical cost is the proper basis for the recording of assets, expenses, equities, etc. For example, a piece of operational machinery should be shown on the balance sheet at initial acquisition cost (historical cost) and not at current market value, appraised value, or an estimated replacement value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Income Statement vs Balance Sheet vs Statement of Owner’s Equity

A

Whereas the balance sheet shows a company’s financial position at a specific point in time, the income statement details how much profit (or loss) a company earned during a period of time, such as a quarter or a year.

The statement of owners’ equity details the changes in the total owners’ equity amount listed on the balance sheet. The statement of cash flows reports a company’s sources and uses of cash during a particular period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is considered acceptable practice to deviate from GAAP in which of the following circumstances?

A

The question of when it is appropriate to stray from GAAP is a matter of professional judgment; there is no clear-cut set of circumstances that justify such a departure. It can be assumed that adherence to GAAP will almost always result in financial statements that are fairly presented. However, the standard setting bodies recognize that, upon occasion, there might be an unusual circumstance when the literal application of GAAP would render the financial statements misleading. In these cases, a departure from GAAP is the proper accounting treatment.

Departures from GAAP can be justified in the following circumstances:
• It is common practice in the entity’s industry for a transaction to be reported a particular way.
• The substance of the transaction is better reflected (and, therefore, the financial statements are more fairly presented) by not strictly following GAAP.
• If a transaction is considered immaterial (i.e., it would not affect a decision made by a prudent reader of the financial statements), then it need not be reported.
• There is concern that assets or income would be overstated (the conservatism constraint requires that when there is any doubt, one should avoid overstating assets and income).
• An accountant may depart from GAAP if the results of departure appear reasonable under the circumstances, especially when strict adherence to GAAP will produce unreasonable results and the departure is properly disclosed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a fraudster wanted to conceal the misappropriation of cash, which of the following actions would result in a balanced accounting equation?

A

The accounting equation, Assets = Liabilities + Owners’ Equity, is the basis for all double-entry accounting. If an asset (e.g., cash) is stolen, the equation can be balanced by increasing another asset, reducing a liability, reducing an owners’ equity account, reducing revenues (and thus retained earnings), or creating an expense (and thus reducing retained earnings).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When looking at a set of financial statements, on which statement would you find notes payable, current assets, retained earnings, and accumulated depreciation?

A

Notes payable, current assets, retained earnings, and accumulated depreciation can all be found on the balance sheet. The balance sheet is an expansion of the accounting equation, Assets = Liabilities + Owners’ Equity. That is, it lists a company’s assets on one side and its liabilities and owners’ equity on the other side. Assets are classified as either current or noncurrent. Current assets consist of cash or other liquid assets that are expected to be converted to cash, sold, or used up, usually within a year or less. Current assets listed on the balance sheet include cash, accounts receivable, inventory, supplies, and prepaid expenses.

Following the current assets are the long-term assets, or those assets that will likely not be converted to cash in the near future, such as fixed assets and intangible assets. A company’s fixed assets are presented net of accumulated depreciation, an amount that represents the cumulative expense taken for wear-and-tear on a company’s property.

Liabilities are presented in order of maturity. Like current assets, current liabilities are those obligations that are expected to be paid within one year, such as accounts payable (the amount owed to vendors by a company for purchases on credit), accrued expenses (e.g., taxes payable or salaries payable), and the portion of long-term debts that will come due within the next year. Those liabilities that are not due for more than a year are listed under the heading long-term liabilities. The most common liabilities in this group are bonds, notes, and mortgages payable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following types of accounts are increased by credits?

A

Entries to the left side of an account are referred to as debits, and entries to the right side of an account are referred to as credits. Debits increase asset and expense accounts, whereas credits decrease these accounts. On the other side of the equation, credits increase liabilities, revenue, and owners’ equity accounts. Conversely, debits decrease liabilities, revenues, and owners’ equity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If a fraudster wanted to conceal the removal of a liability from the books, which of the following actions would balance the accounting equation?

A

The accounting equation, Assets = Liabilities + Owners’ Equity, is the basis for all double-entry accounting. Suppose that in order to make an organization appear that it has less debt, an accountant fraudulently removes a liability. This would leave the accounting equation unbalanced since the assets side would be greater than liabilities plus owners’ equity. In this particular case, the equation can be balanced by decreasing an asset, increasing a different liability, increasing an owners’ equity account, increasing revenues (and thus retained earnings), or reducing an expense (and thus increasing retained earnings). Increasing an asset would only make the equation further out of balance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

At the end of each fiscal year, the accounts reflected on the income statement are reduced to a zero balance? T/F

A

The accounts reflected on the income statement are temporary; at the end of each fiscal year, they are reduced to a zero balance (closed), with the resulting net income (or loss) added to (or subtracted from) retained earnings on the balance sheet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The statement of owners’ equity acts as the connecting link between which two financial statements?

A

The statement of owners’ equity details the changes in the total owners’ equity amount listed on the balance sheet. Because it shows how the amounts on the income statement flow through to the balance sheet, it acts as the connecting link between the two statements. The balance of the owners’ equity at the beginning of the year is the starting point for the statement. The transactions that affect owners’ equity are listed next and are added together. The result is added to (or subtracted from, if negative) the beginning-of-the-year balance, which provides the end-of-the-year balance for total owners’ equity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Purpose of Cash flow and period?

A

The statement of cash flows reports a company’s sources and uses of cash during the accounting period. This statement is often used by potential investors and other interested parties in tandem with the income statement to determine the true financial performance of a company during the period being reported.
The statement of cash flows is broken down into three sections:
cash flows from operating activities,
cash flows from investing activities, and cash flows from financing activities.

The balance sheet shows a company’s financial position at a specific point in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the matching principle

A

The matching principle requires that expenses be recorded in the same accounting period as the revenues they help generate. Estimates, accruals, and allocations are often needed to meet this requirement. When a sale is recorded, the appropriate charges for cost of goods sold, or other expenses directly corresponding to the sale, should be recorded in the same accounting period. In this example, since the expenses will not be incurred until David caters the event in February, the revenue David received should not be recorded until February as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Going concern

A

Management is required to provide disclosures when existing events or conditions indicate that it is more likely than not that the entity might be unable to meet its obligations within a reasonable period of time after the financial statements are issued. There is an assumption that an entity will continue as a going concern; that is, the life of the entity will be long enough to fulfill its financial and legal obligations. Any evidence to the contrary must be reported in the entity’s financial statements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Income Statement (basic) layout

A

Two basic types of accounts are reported on the income statement—revenues and expenses. Revenues represent amounts received from the sale of goods or services during the accounting period. Most companies present net sales as the first line item on the income statement. The term net means that the amount shown is the company’s total sales minus any sales refunds, returns, discounts, or allowances.

From net sales, an expense titled cost of goods sold or cost of sales is deducted. Regardless of the industry, this expense denotes the amount a company spent (in past, present, and/or future accounting periods) to produce the goods or services that were sold during the current period. The difference between net sales and cost of goods sold is called gross margin, or gross profit, which represents the amount left over from sales to pay the company’s operating expenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Statement of Owner’s Equity

A

The statement of owners’ equity details the changes in the total owners’ equity amount listed on the balance sheet. Because it shows how the amounts on the income statement flow through to the balance sheet, it acts as the connecting link between the two statements. The balance of the owners’ equity at the beginning of the year is the starting point for the statement. The transactions that affect owners’ equity are listed next and are added together. The result is added to (or subtracted from, if negative) the beginning-of-the-year balance, which provides the end-of-the-year balance for total owners’ equity.

The statement of owners’ equity is a summary overview of the effects of owner investment and company net income on the owners’ equity balance. It does not name any shareholders or their individual ownership stake in the company.

Some companies present a statement of retained earnings rather than a statement of owners’ equity. Similar to the statement of owners’ equity, the statement of retained earnings starts with the retained earnings balance at the beginning of the year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which of the following types of accounts are increased by credits?
 A. Revenue 
 B. Liability	
 C. Owners’ equity	
 D. All of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credits decrease asset and expense accounts. T/F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following statements is TRUE regarding the balance sheet?
A. The balance sheet shows the financial performance of a company over a certain period of time, such as a quarter or a year.
B. The accounts that appear on the balance sheet include revenues and expenses.
C. Balance sheets are usually manipulated by understating assets or overstating liabilities.
D. Assets are generally presented on the balance sheet in order of liquidity.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following statements is NOT true regarding the statement of cash flows?
A. The statement of cash flows shows a company’s financial position at a specific point in time.
B. The statement of cash flows reports a company’s sources and uses of cash during the accounting period.
C. There are three types of cash flows: cash flows from operating activities, from investing activities, and from financing activities.
D. The statement of cash flows is often used in tandem with the income statement to determine a company’s true financial performance.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
If a fraudster wanted to conceal the removal of a liability from the books, which of the following actions would NOT balance the accounting equation?
 A. Increasing a different liability 
 B. Increasing an asset 
 C. Increasing revenue	
 D. Increasing owners’ equity
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
Which of the following types of accounts are increased by credits?
 A. Revenue 
 B. Liability	
 C. Owners’ equity	
 D. All of the above
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
If a fraudster wanted to conceal the misappropriation of cash, which of the following actions would NOT result in a balanced accounting equation?
 A. Decreasing another asset 
 B. Creating an expense	
 C. Reducing owners’ equity 
 D. Decreasing a liability
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which GAAP principle requires corresponding expenses and revenue to be recorded in the same accounting period?
 A. Full disclosure	
 B. Consistency	
 C. Matching 
 D. Conservatism
A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
The assumption that a business will continue indefinitely is reflected in the accounting concept of:
 A. Cost	
 B. Objective evidence	
 C. Materiality 
 D. Going concern
A

D (verify)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The concept of consistency prohibits any change in an accounting principle previously employed. T/F

A

F
Entities should employ consistent accounting procedures from period to period. However, the concept of consistency does not completely prohibit changes in the accounting principles used. Changes are permissible when it is believed that the use of a different principle will result in a more fair financial presentation of the entity. The change in accounting principle must be justifiable, however; the desire to project an artificially strong performance, for example, is not a justifiable reason for a change in accounting principle.
Examples of changes in accounting principles include a change in the method of inventory pricing, a change in the depreciation method for previously recorded assets, and a change in the method of accounting for long-term construction contracts. The disclosure for a change in accounting principles should include the justification for the change, and should explain why the newly adopted principle is preferable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

All of the following are common methods that fraud examiners can use to uncover an employee who has an undisclosed financial interest with an outside vendor EXCEPT:
A. Review tips and complaints from employees or vendors.
B. Compare customer account balances to billing files.
C. Compare vendor addresses with employee addresses.
D. Review exit interviews.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
Which of the following is an example of an "off-book" fraud?
 A. Skimming 
 B. Billing schemes	
 C. Cash larceny 
 D. Ghost employee schemes
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Performing a physical inventory count is an effective way to detect a skimming scheme. T/F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Skimming schemes can involve the theft of cash sales or the theft of accounts receivable payments. T/F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following is NOT an effective control to protect against skimming schemes?
A. Installing visible video cameras to monitor a store’s cash registers
B. Restricting the accounts receivable clerk from preparing the bank deposit
C. Reconciling the physical inventory count with the perpetual inventory records
D. Reconciling the sales records to the cash receipts

A

D

30
Q

Off-book sales of goods always cause shrinkage. T/F

A

T

31
Q
In a financial statement fraud scheme in which capital expenditures are recorded as expenses rather than assets, the transactions will have the following effect on the organization's financial statements:
 A. Net income will be overstated	
 B. Total assets will be understated 
 C. Sales revenue will be overstated	
 D. All of the above
A

B

32
Q

Which of the following financial statement manipulations is NOT a type of improper asset valuation scheme?
A. Inflated inventory valuation
B. Recording expenses in the wrong period
C. Booking of fictitious assets
D. Overstated accounts receivable

A
B
Most improper asset valuations involve the fraudulent overstatement of inventory or receivables, with the goal being to strengthen the appearance of the balance sheet and/or certain financial ratios. Other improper asset valuations include manipulation of the allocation of the purchase price of an acquired business in order to inflate future earnings, misclassification of fixed and other assets, or improper capitalization of inventory or start-up costs. Improper asset valuations usually take the form of one of the following classifications:
Inventory valuation
Accounts receivable
Business combinations
Fixed assets
33
Q

In investigating whether financial statements have been manipulated to make a company appear more profitable, a Certified Fraud Examiner should look for liabilities that have been overstated. T/F

A

F
Understating liabilities and expenses is one of the ways financial statements can be manipulated to make a company appear more profitable. Because pre-tax income will increase by the full amount of the expense or liability not recorded, this financial statement fraud method can significantly affect reported earnings with relatively little effort by the fraudster. There are three common methods for concealing liabilities and expenses:
Omitting liabilities and/or expenses
Improperly capitalizing costs rather than expensing them
Failing to disclose warranty costs and liabilities

34
Q

A company must disclose all contingent liabilities in the financial statements, regardless of the liabilities’ materiality. T/F

A

F

35
Q

Which of the following statements is TRUE with regard to a fictitious revenue scheme?
A. The debit side of a fictitious sales entry usually goes to accounts payable.
B. If a fictitious revenue scheme has taken place, there will typically be no accounts receivable on the books.
C. Fictitious revenues must involve sales to a fake customer.
D. Uncollected accounts receivable are a red flag of fictitious revenue schemes.

A

D

36
Q
All of the following are classifications of financial statement fraud EXCEPT:
 A. Improper disclosures	
 B. Improper asset valuations	
 C. Lapping accounts 
 D. Fictitious revenues
A

C

37
Q

Financial statement fraud is the intentional or erroneous misrepresentation of the financial condition of an enterprise. T/F

A

F
Financial statement fraud is the deliberate misrepresentation of the financial condition of an enterprise accomplished through the intentional misstatement or omission of amounts or disclosures in the financial statements to deceive financial statement users.
Note that financial statement fraud, much like all types of fraud, is an intentional act. As stated in the AICPA’s Auditing Standard AU 240, Consideration of Fraud in a Financial Statement Audit, “misstatements in the financial statements can arise from either fraud or error. The distinguishing factor between fraud and error is whether the underlying action that results in the misstatement of the financial statements is intentional or unintentional.”

38
Q
Which financial ratio is calculated by dividing current assets by current liabilities?
 A. Profit margin	
 B. Quick ratio	
 C. Receivable turnover 
 D. Current ratio
A

D

39
Q

ABC Corporation guaranteed a large personal loan taken out by its chief financial officer. ABC will only be liable if the CFO defaults on the loan. To date, the CFO has made all scheduled loan payments on time. The loan term runs for two more years. ABC does NOT have to disclose this loan arrangement in its financial statements. T/F

A

F
Typical liability omissions include the failure to disclose loan covenants or contingent liabilities. Loan covenants are agreements, in addition to or as part of a financing arrangement, that a borrower has promised to keep as long as the financing is in place. The agreements can contain various types of covenants, including certain financial ratio limits and restrictions on other major financing arrangements.
Contingent liabilities are potential obligations that will materialize only if certain events occur in the future. A corporate guarantee of personal loans taken out by an officer or a private company controlled by an officer is an example of a contingent liability. This liability must be disclosed if it is material.

40
Q

Failing to record bad debt expense for the period will result in fraudulently overstated accounts receivable. T/F

A

T

Failing to record bad debt expense for the period will result in fraudulently overstated accounts receivable.

41
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is a system by which the bank verifies checks presented for payment against the list provided by the company of approved checks written on the account. 
 A. Verification control 
 B. Payment patrol	
 C. Check matching	
 D. Positive pay
A

D

42
Q
Baker, the managing partner in a small law firm, is the authorized signer on all company checks. When his personal phone bill arrived last month, Baker prepared and signed a company check to pay the bill. He did not disclose this payment to his partners. Baker committed:
 A. An authorized maker scheme 
 B. A mischaracterized expense scheme	
 C. A forged maker scheme	
 D. A false billing scheme
A

A

43
Q

Baker used his company credit card to pay for a business dinner at which he was entertaining a client, knowing the credit card bill would be paid by Baker’s employer. Baker saved the receipt and later filed an expense report seeking reimbursement for the cost of the meal, attaching the receipt as support. This is an example of what kind of fraud?
A. Multiple reimbursement scheme
B. Mischaracterized expense scheme
C. Personal purchases with company funds
D. False billing scheme

A

A

44
Q
All of the following are payroll scheme types EXCEPT:
 A. Ghost employees	
 B. Falsified hours and salary	
 C. Stolen paychecks
 D. Commission schemes
A

C

45
Q

Skimmed checks and false voids are types of check tampering schemes. T/F

A

F
Neither skimmed checks nor false voids are types of check tampering schemes. Skimmed checks are a form of theft of incoming cash. False voids are a type of register disbursement scheme.
The four major categories of check tampering schemes include:
Forged maker schemes
Forged endorsements
Altered payees
Authorized maker schemes

46
Q
Jacob was on a business trip in Las Vegas. One night, he met up with some friends (unrelated to his work) at an expensive restaurant and paid for the group's entire tab on his credit card, announcing that “it would be on the company.” He submitted the receipt for the dinner along with the rest of his legitimate business receipts from the trip and described the dinner as “client entertainment.” What type of scheme did Jacob commit?
 A. A fictitious expense scheme I
 B. A multiple reimbursement scheme	
 C. An overstated expense scheme	
 D. A mischaracterized expense scheme
A

D

47
Q

The warehouse supervisor at South Corp. has stolen $50,000 worth of inventory over the last year. He has made no effort to conceal his theft in any of the inventory records. During an analytical review of the financial statements, which of the following red flags might South Corp.’s auditors find that would indicate the inventory theft?
A. The percentage change in cost of goods sold was significantly higher than the percentage change in sales.
B. The percentage change in sales was significantly higher than the percentage change in cost of goods sold.
C. Sales and cost of goods sold moved in tandem.
D. None of the above possible outcomes would indicate inventory theft.

A

A

48
Q
Jackson is a receiving clerk at a warehouse. His job is to count the number of units in incoming shipments, record the figures in receiving reports, and forward copies of the reports to the accounts payable department. One day, Jackson received a box of 20 laptop computers at the warehouse. His wife’s computer just broke, so he stole one of the computers from the box. To conceal his scheme, Jackson sent a receiving report to accounts payable that 20 computers arrived, but he only recorded 19 on the copy of the receiving report used for the inventory records. What type of scheme did Jackson commit?
 A. An asset transfer scheme	
 B. A purchasing and receiving scheme 
 C. A non-cash larceny scheme 
 D. None of the above
A

B

49
Q

Both falsely increasing the perpetual inventory balance and failing to reconcile inventory records are ways a fraudster might conceal inventory shrinkage.

A

F
Falsely increasing the perpetual inventory record would only exacerbate the shrinkage problem. Instead, a fraudster seeking to conceal shrinkage would falsely decrease the perpetual inventory record to match the lower physical inventory count. In addition, failing to reconcile inventory records would likely cause more suspicion to arise.
One of the simplest methods for concealing shrinkage is to change the perpetual inventory record so that it will match the physical inventory count. This is also known as a forced reconciliation of the account. The perpetrator simply changes the numbers in the perpetual inventory to make them match the amount of inventory on hand. For example, the employee might credit (decrease) the perpetual inventory and debit (increase) the cost of sales account to lower the perpetual inventory numbers so that they match the actual inventory count. Instead of using correct entries to adjust the perpetual inventory, some employees simply delete or cover up the correct totals and enter new numbers.

50
Q

To decrease the likelihood that a fraudster will be able to successfully wash a check, check issuers should write with colored inks and ballpoint pens. T/F

A

F
As checks issued using colored inks and ball-point pens tend to be most susceptible to the chemicals used in check washing schemes, experts recommend using black ink and gel pens when issuing checks.

51
Q
Which of the following are information security goals that an e-commerce system should be designed to provide its users and asset holders?
I. Penetrability of data
II. Materiality of data
III. Integrity of data
IV. Availability of data
 A. II and III only	
 B. I, II, and III only	
 C. III and IV only 
 D. I, II, III, and IV
A

C

52
Q
Matthew receives a voicemail message telling him that his credit card might have been used fraudulently. He is asked to call a phone number. When he calls the number, he hears a menu and a list of choices that closely resembles those used by his credit card company. The phone number even appears to be similar to that of his card issuer. Of which of the following types of schemes has Matthew become the target?
 A. Vishing 
 B. Spear phishing	
 C. SMiShing or tishing	
 D. Pharming
A

A
Voice phishing, or vishing, is the act of leveraging Voice over Internet Protocol (VoIP) in using the telephone system to falsely claim to be a legitimate enterprise in an attempt to scam users (both consumers and businesses) into disclosing personal information. Government and financial institutions, as well as online auctions and their payment services, can be targets of voice phishing.
A vishing scheme is generally transmitted as an incoming recorded telephone message that uses a spoofed (fraudulent) caller ID matching the identity of a misrepresented organization. The message uses an urgent pretext to direct unsuspecting users to another telephone number. The victim is invited to punch his personal information on his telephone keypad. The criminals capture the key tones and convert them back to numerical format.

53
Q

Rock phishing is the type of phishing scheme that uses text messages or other short message systems to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, ISP, or other entity. T/F

A

F
SMiShing is a hybrid of phishing and short message service (text messaging). These schemes use text messages or other short message systems to conduct phishing activities. That is, in SMiShing schemes, the attacker uses text messages or other short message systems to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, ISP, or other entity with which the target does business.
Rock phishers use botnets to send massive amounts of phishing emails to huge volumes of Internet users. The emails contain a message from a financial institution, enticing users to click on a fraudulent URL. There is some indication that rock phishers cycle through multiple email lists and attempt to reach the Internet users most likely to use the brands that they are targeting.

54
Q

Which of the following best describes social engineering?
A. A method for gaining unauthorized access to a computer system in which an attacker searches through large quantities of available data to find sensitive information that he can use to facilitate his intended scheme
B. A method for gaining unauthorized access to a computer system in which an attacker hides near the target to obtain sensitive information that he can use to facilitate his intended scheme
C. A method for gaining unauthorized access to a computer system in which an attacker bypasses a system’s security through the use of an undocumented operating system and network functions
D. A method for gaining unauthorized access to a computer system in which an attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme

A

D

55
Q

Implementing privilege escalation and using buffer overflow exploits are examples of administrative controls used for securing computer systems and communication networks.
A. True
B. False

A

False

56
Q

Which of the following best describes phishing?
A. A method for gaining unauthorized access to a computer system in which an attacker searches through large quantities of available data to find sensitive information that he can use to facilitate his intended scheme
B. A method for gaining unauthorized access to a computer system in which an attacker bypasses a system’s security through the use of an undocumented operating system and network functions
C. A method for gaining unauthorized access to a computer system in which an attacker dupes a target into providing sensitive data by falsely claiming to be from an actual business, bank, ISP, or other entity with which the target does business
D. A method for gaining unauthorized access to a computer system in which an attacker hides near the target to obtain sensitive information that he can use to facilitate his intended scheme

A

C

57
Q

Which of the following is a technical or administrative control for securing computer systems and communication networks?
A. Implementing privilege escalation
B. Installing a network address prevention system
C. Implementing logical access controls
D. Using an intrusion admission system

A

C

58
Q

A Ponzi scheme can best be described as an illegal business structure that might offer merchandise or services, but generates almost all of its revenues from the relentless recruitment of new members. T/F

A

F

59
Q

What is the primary difference between a Ponzi scheme and a pyramid scheme?
A. All pyramid schemes are legal, whereas all Ponzi schemes are illegal.
B. A pyramid scheme promotes itself as a pyramid, whereas a Ponzi scheme promotes itself as an investment opportunity.
C. In a pyramid scheme, old investors are paid with money from new investors.
D. A Ponzi scheme is promoted by encouraging victim members to recruit new members.

A

B

60
Q
Which of the following types of procurement fraud schemes involves a procurement employee who convinces his employer, the procuring entity, that it needs excessive or unnecessary products or services?
 A. Need recognition schemes 
 B. Bid manipulation schemes	
 C. Bid tailoring schemes 
 D. Non-conforming goods schemes
A

A

61
Q

Which of the following is NOT a common red flag of a bid tailoring scheme?
A. There are unusually broad specifications for the type of goods or services being procured.
B. Competitive awards vary among several suppliers.
C. A contract is not re-bid even though fewer than the minimum number of bids is received.
D. Only a few bidders respond to bid requests.

A

B

62
Q

Which of the following situations is often present in real estate fraud schemes?
A. A false appraisal report
B. The services of an arms-length attorney
C. No expert assistance at closing
D. All of the above

A

A

63
Q

Which of the following is NOT a problem situation regarding a construction loan that might be concealed using change orders?
A. Shortcuts are shoring up other problems.
B. Design changes were requested.
C. Collusive bidding is occurring.
D. The original project is not feasible.

A

B

64
Q

James finds a residential property with an out-of-state owner. He then forges a deed showing that the property owner is transferring ownership of the property completely to James, such as would normally happen during a property sale. The property owner is unaware that James has filed the deed. Later, James takes the falsified deed to a lender and borrows money against the property. Which of the following best describes James’s scheme?
A. Air loan
B. Fraudulent sale
C. Unauthorized draw on home equity line of credit
D. Property flipping

A

B

65
Q

Generally, if the dollar amount of an embezzlement scheme at a financial institution is small enough such that the targeted entity’s financial statements will not be materially affected, the scheme can be most effectively detected through which of the following methods?
A. Conducting a financial statement analysis
B. Conducting a review of source documents
C. Reviewing all disbursements below the approval limit
D. Educating employees who are responsible for handling currency

A

B

66
Q

An insurance company might be guilty of fraud if it fails to pass on the fee breaks it negotiates with its providers to its consumers. T/F

A

T

67
Q
A health care provider's practice of charging a comprehensive code, as well as one or more component codes, by billing separately for subcomponents of a single procedure is known as \_\_\_\_\_\_\_\_\_\_\_\_\_\_.
 A. Segregating 
 B. Unbundling 
 C. Subdividing	
 D. None of the above
A

B

68
Q
Lindsey, a medical provider, launched a promotion where she waived the insurance copayment of all new patients. However, her contract with the insurance company requires patients to make copayments. Which of the following best describes Lindsey’s scheme?
 A. Insured fraud 
 B. Phantom billing	
 C. Kickback
 D. Deductible forfeiture
A

C

69
Q
The largest amount of insurance fraud occurs in the area of:
 A. Flood insurance	
 B. Life insurance	
 C. Health care 
 D. Auto insurance
A

C

70
Q

The provisions of a noncompetition agreement continue after the employee leaves the company where he signed the agreement. T/F

A

T