Chapter 10 Flashcards
- Which of the following is not a type of corruption scheme?
a. Bribery
b. Conflict of interest
c. Illegal gratuities
d. Concealed payments
d. Concealed payments
- ___________________ is the offering, giving, receiving, or soliciting of something of value as a reward for a favorable decision.
a. Business diversion
b. Economic extortion
c. Illegal gratuity
d. Commercial bribery
c. Illegal gratuity
- The offering, giving, receiving, or soliciting of something of value for the purpose of influencing a business decision without the knowledge or consent of the principal is known as:
a. Official bribery
b. Commercial bribery
c. Conflict of interest
d. Illegal gratuity
b. Commercial bribery
- Which of the following is a type of kickback scheme?
a. Improper disclosure
b. Overbilling
c. Turnaround sale
d. Extortion
b. Overbilling
- A corruption scheme in which several bidders conspire to split contracts, thereby ensuring that each gets a certain amount of work, is known as:
a. Bid pooling
b. Bid rigging
c. Bid division
d. Bid diversion
a. Bid pooling
- To deter kickback schemes, an organization should implement which of following procedures?
a. Separate the purchasing, authorization, and cash disbursements functions.
b. Track purchase levels by vendor.
c. Compare the prices paid for goods and services to market rates.
d. All of the above
d. All of the above
- The key component to most kickback schemes is:
a. Forged endorsements
b. Counterfeit invoices
c. Price inflation
d. Stealing customer statements
c. Price inflation
- Which of the following is a red flag indicating that an employee may be receiving kickbacks?
a. The purchase of inferior-quality inventory or merchandise
b. An unusually high volume of purchases from a particular vendor
c. The payment of purchase amounts that are frequently above market rates
d. All of the above
d. All of the above
- To facilitate a bribery scheme, a fraudster might divert company funds to a non-company account from which the illegal payments can be made. This account is called a:
a. Slush fund
b. Petty cash fund
c. Bid pool
d. None of the above
a. Slush fund
- To safeguard against kickback schemes, which of the following procedures should an organization implement?
a. Have an employee in the purchasing department review the organization’s payment patterns on a quarterly basis.
b. Establish a written policy specifying that employees cannot accept more than $500 annually in gifts from customers or suppliers.
c. Prohibit employees from engaging in any transaction on behalf of the organization when they have an undisclosed personal interest in the transaction.
d. All of the above
c. Prohibit employees from engaging in any transaction on behalf of the organization when they have an undisclosed personal interest in the transaction.
- Which of the following would likely not be a potential target for accepting bribes in a big-rigging scheme?
a. A product assurance representative
b. An accounts payable clerk
c. A contracting official
d. The engineer in charge of the project’s technical specifications
b. An accounts payable clerk
- The typical bid-rigging scheme committed during the need recognition phase of the contract negotiation process involves defining a “need” that can be met only by a certain supplier or contractor.
a. True
b. False
a. True
- Which of the following is a red flag that might indicate that a bid-rigging scheme is occurring?
a. The contract price is unusually low.
b. A high bid is followed by amendments that reduce the payments to the contractor.
c. The losing bidders become sub-contractors on the project.
d. Many more bidders responded to the request for proposals than expected.
c. The losing bidders become sub-contractors on the project.
- If a government employee agrees to award a contract to a vendor in exchange for a promise of future employment, this is considered to be an illegal gratuity.
a. True
b. False
b. False
- The primary approach for preventing conflicts of interest schemes is to develop and implement which of the following?
a. A voucher system
b. A company ethics policy
c. A document retention program
d. An anonymous reporting mechanism to receive tips and complaints
b. A company ethics policy
- If an employee approves payment on an invoice that originates from a real company in which he or she has a hidden economic interest, this is considered to be a conflict of interest scheme.
a. True
b. False
a. True
- Which of the following schemes can be detected by identifying vendor addresses that are not designated as a business address?
a. Shell company schemes
b. Kickback schemes
c. Conflicts of interest
d. All of the above
a. Shell company schemes
b. Kickback schemes
c. Conflicts of interest
d. All of the above
The correct answer is D
- Extracting round-dollar payments and summarizing them by vendor can help detect both corruption and billing schemes.
a. True
b. False
a. True
- Identifying trends in over-purchased and/or obsolete inventory over several periods is a proactive computer audit test that can be used to detect which of the following schemes?
a. False purchases
b. Corruption
c. Overstated expenses
d. None of the above
b. Corruption
- Matching the vendor master file to the employee master file is a proactive computer audit test that can be used to detect which type of fraud scheme(s)?
a. Bribery
b. Shell company
c. Both bribery and shell company
d. None of the above
c. Both bribery and shell company
- According to the 2012 Report to the Nations on Occupational Fraud and Abuse, schemes involving corruption were the least common of the three types of occupational fraud schemes.
a. True
b. False
b. False
- According to the 2012 Report to the Nations on Occupational Fraud and Abuse, the median loss due to corruption schemes was the highest of the three types of occupational fraud schemes.
a. True
b. False
b. False
- According to the 2012 Report to the Nations on Occupational Fraud and Abuse, bribery schemes occurred more often than other types of corruption schemes.
a. True
b. False
a. True
- Stanley Block works in the IT department at Towery, Inc. After finding out that the company is planning to purchase four more computers for the accounting department, Stanley bought four computers from a friend for $1,200. Then, using his brother’s name and address as vendor information, he resold the computers to Towery for $2,300. This type of scheme is known as a(n):
a. Over-purchase sale
b. Resource diversion sale
c. Double-sided sale
d. Turnaround sale
d. Turnaround sale