Chapter 4 Flashcards

1
Q
  1. Categories of billing schemes include which of the following?
    a. Shell company schemes
    b. Larceny billing schemes
    c. Fictitious disbursements schemes
    d. All of the above
A

a. Shell company schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. When a billing scheme is occurring, the company’s expenses appear lower than they should, causing the financial statements to show falsely inflated profits.
    a. True
    b. False
A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. In a ______________ scheme, the perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose.
    a. Purchasing
    b. Skimming
    c. Larceny
    d. Billing
A

d. Billing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. In the Fraud Tree, all of the following are categories of fraudulent disbursements except:
    a. Payroll schemes
    b. Cash larceny
    c. Check tampering
    d. Billing schemes
A

b. Cash larceny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Fictitious entities created for the sole purpose of committing fraud are called:
    a. Ghost companies
    b. Non-accomplice vendors
    c. Shell companies
    d. “Rubber stamp” companies
A

c. Shell companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Most shell company schemes involve the purchase of goods rather than services.
    a. True
    b. False
A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Invoices that are submitted by shell companies can be for fictitious goods or services or for items that were actually sold to the victim company.
    a. True
    b. False
A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. In order to start up a shell company, the fraudster will most likely need which of the following?
    a. Certificate of incorporation
    b. Mailing address
    c. Bank account
    d. All of the above
A

d. All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Producing an invoice that looks professional is the most difficult part of a shell company scheme.
    a. True
    b. False
A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Warning signs of a shell company scheme include which of the following?
    a. Invoices lacking details of the items purchased
    b. A vendor that is not listed in the phone book
    c. An unexpected and significant increase in “consulting expenses”
    d. All of the above
A

d. All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. A pass-through scheme is usually undertaken by someone who works in which department?
    a. Accounts payable
    b. Receiving
    c. Purchasing
    d. Accounts receivable
A

c. Purchasing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which of the following actions is least likely to help prevent and detect schemes involving fraudulent invoices from non-accomplice vendors?
    a. Marking “paid” on every voucher that has been paid
    b. Verifying vendor address changes before disbursements are issued
    c. Matching all bank statement items to canceled checks
    d. Separating the duties of purchasing, authorizing, and distributing payments
A

c. Matching all bank statement items to canceled checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. ____________________ are schemes in which the employee intentionally mishandles payments that are owed to legitimate vendors.
    a. Pass-through schemes
    b. Pay-and-return schemes
    c. Shell company schemes
    d. Switch-and-swap schemes
A

b. Pay-and-return schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. In a shell company scheme, which of the following methods might a fraudster use to get a phony invoice approved for payment?
    a. Collusion
    b. A “rubber stamp” supervisor
    c. Falsification of purchase orders and receiving reports
    d. Any of the above
A

d. Any of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Purchasing personal items using an organization’s money is what type of scheme?
    a. Larceny scheme
    b. Billing scheme
    c. Pay-and-return scheme
    d. Skimming scheme
A

b. Billing scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which of the following controls can be used to prevent or detect personal purchases on company credit cards?
    a. Having credit card statements sent directly to someone with signature authority on the account for review and payment
    b. Requiring employees to receive store credits rather than cash when returning items they purchased with the company’s credit card
    c. Monitoring credit card expenses for unexplained increases in purchasing levels
    d. All of the above
A

c. Monitoring credit card expenses for unexplained increases in purchasing levels

17
Q
  1. According to the 2012 Report to the Nations on Occupational Fraud and Abuse, the most common fraudulent disbursement schemes were:
    a. Billing schemes
    b. Check tampering schemes
    c. Payroll schemes
    d. Register disbursement schemes
A

a. Billing schemes

18
Q
  1. According to the 2012 Report to the Nations on Occupational Fraud and Abuse, billing schemes were the second most costly type of fraudulent disbursements schemes.
    a. True
    b. False
A

a. True

19
Q
  1. Which of the following computer audit tests can be used to detect billing schemes?
    a. Extracting manual checks and summarizing by vendor and issuer
    b. Extracting a sample of vendor open invoices for confirmation with the vendor
    c. Extracting delivery addresses that do not correspond to company locations
    d. All of the above
A

d. All of the above

20
Q
  1. Sally Fuller is a buyer for GWA publishing company. Her job is to purchase supplies and services for the printing of technical manuals. Her brother sets up a printing company, and Sally hires him to print most of these manuals for GWA. However, rather than actually printing the manuals, her brother hires another printer to do the work, then sells the printed manuals to GWA at a 50 percent markup. As a result, his prices are much higher than the other printers who serve GWA. This type of scheme is most likely a:
    a. Pay-and-return scheme
    b. Pass-through scheme
    c. Inventory-markup scheme
    d. Non-accomplice vendor scheme
A

b. Pass-through scheme

21
Q
  1. Eli Adams is an accounts payable clerk for MJF Productions. By forging signatures, he was able to procure a company credit card. He recently bought home stereo equipment and put it on his company credit card. When the credit card statement arrived at MJF, Eli prepared a check to the credit card company and buried the purchase in the monthly expenses of the company’s largest cost center, knowing that his manager is generally inattentive when approving payments. What type of fraud is this?
    a. Larceny
    b. Pass-through scheme
    c. Personal purchases scheme
    d. Forged maker scheme
A

c. Personal purchases scheme

22
Q
  1. Charles Dieter and Joey Davis worked together to steal nearly $50,000 from Valdosta Medical Supply. Charles, an accounts payable clerk, deliberately overpaid a few of the company’s vendors. He then called the vendors, explained the “mistake,” and asked for the excess to be refunded. Joey, a mailroom employee, intercepted the incoming refund checks and cashed them. The two men split the proceeds. What type of scheme did Charles and Joey commit?
    a. Shell company
    b. Larceny
    c. Pass-through
    d. Pay-and-return
A

d. Pay-and-return

23
Q
  1. Abby Watkins works in the accounts payable department for SVX Company. Recently, she set up a payment to Pacific Industries for invoice number 7001a, which is unlike any invoice number she has seen from Pacific in the past. The voucher contains a purchase order that backs up the invoice, but it looks like a photocopy. Additionally, the accounting system shows that invoice number 7001 from Pacific was for a slightly different amount and has already been paid. Pacific Industries is an established vendor with SVX, but the payment address has recently been changed to a P.O. Box in the vendor file. What type of fraud does this situation most likely indicate?
    a. Personal purchases scheme
    b. Shell company scheme
    c. Non-accomplice vendor scheme
    d. False purchase requisition scheme
A

c. Non-accomplice vendor scheme

24
Q
  1. The internal auditor for the Bremer Group recently ran a computer audit test that showed that Ouetzen Company, one of the company’s listed vendors, doesn’t have a telephone number or a tax ID number. Of the choices given, what type of fraud does this situation most likely indicate?
    a. Larceny scheme
    b. Shell company scheme
    c. Non-accomplice vendor scheme
    d. Personal purchases scheme
A

b. Shell company scheme

25
Q
  1. Nicolas Hill, CFE, has been hired to look into suspicious activity at Mason & Jefferson, LLC. The company’s controller has reason to believe that the company has fallen victim to a shell company scheme. As part of his investigation, Nicolas should do which of the following?
    a. Match the vendor master file to the accounts receivable file
    b. Review payments with little or no sequence between invoice numbers
    c. Extract all employees without a social security number
    d. All of the above
A

b. Review payments with little or no sequence between invoice numbers

26
Q
  1. In one of the case studies in the textbook, a Southeastern medical college was plagued with fraudulent activity. What started as an investigation into some suspicious expense reimbursement activity eventually led to the discovery of a fictitious company that was set up to fraudulently bill the college for supplies that never existed. What was the first sign that there were more problems than the initial expense reimbursement fraud?
    a. The auditors found an usually high number of new unapproved vendors.
    b. The administrative assistant suddenly left town when requested to be interviewed.
    c. The supervisor resigned his position immediately.
    d. A tip was received by internal auditors.
A

b. The administrative assistant suddenly left town when requested to be interviewed.

27
Q
  1. In one of the case studies in the textbook, a Southeastern medical college was plagued with fraudulent activity. What started as an investigation into some suspicious expense reimbursement activity eventually led to the discovery of a fictitious company that was set up to fraudulently bill the college for supplies that never existed. Which of the following red flags were found during the investigation?
    a. Some vendors didn’t have street addresses or telephone numbers.
    b. Invoices were received for just under the amount that required two authorized signatures.
    c. Some of the checks were cashed at check cashing companies.
    d. All of the above
A

d. All of the above

28
Q
  1. In one of the case studies in the textbook, a Southeastern medical college was plagued with fraudulent activity. What started as an investigation into some suspicious expense reimbursement activity eventually led to the discovery of a fictitious company that was set up to fraudulently bill the college for supplies that never existed. How was the case resolved?
    a. The perpetrator was terminated, and the funds were recovered.
    b. The perpetrator was convicted and placed on probation, and partial restitution was ordered.
    c. The perpetrator left the state and was caught pulling the same scam at another company.
    d. A civil suit was filed and restitution was ordered.
A

b. The perpetrator was convicted and placed on probation, and partial restitution was ordered.

29
Q
  1. In one of the case studies in the textbook, Albert Miano, the facilities supervisor for a popular magazine, submitted phony invoices. When Miano received the checks for the phony invoices, he forged the contractor’s signature. He then endorsed the check in his own name. How was the fraud caught?
    a. The auditors found a discrepancy in the invoices that were submitted.
    b. The new chief of internal audit found it by accident.
    c. A vendor received a check by mistake and called the accounts payable department.
    d. The external audit found it in an audit sample of canceled checks.
A

b. The new chief of internal audit found it by accident.

30
Q
  1. In one of the case studies in the textbook, Albert Miano, the facilities supervisor for a popular magazine, submitted phony invoices. When Miano received the checks for the phony invoices, he forged the contractor’s signature. He then endorsed the check in his own name. What controls weaknesses did the company have that facilitated Miano’s scheme?
    a. Employees in the accounts payable department did not follow departmental procedures.
    b. Accounts payable never checked signatures on the invoices against the authorized signatures on file.
    c. Miano was allowed to pick up the approved invoices from the administrative vice-president’s office and deliver them to the accounts payable department.
    d. All of the above
A

d. All of the above