Chapter 5 Flashcards
1
Q
- Check tampering is unique from other fraudulent disbursement schemes because in a check tampering scheme:
a. The perpetrator physically prepares the fraudulent check.
b. The perpetrator must have access to a signature stamp in order to conceal the crime.
c. The perpetrator submits a phony document in order to generate the fraudulent payment.
d. The perpetrator must endorse the check in order to cash or deposit it.
A
a. The perpetrator physically prepares the fraudulent check.
2
Q
- Check tampering includes both fraudulently preparing a company check for one’s own benefit and intercepting a company check that is intended for a third party and converting it for one’s own benefit.
a. True
b. False
A
a. True
3
Q
- To successfully carry out and conceal a check tampering scheme, the fraudster must have:
a. Access to the check stock
b. Access to the bank statements
c. The ability to forge signatures or alter other information on the check
d. All of the above
A
d. All of the above
4
Q
- Check tampering schemes involving checks made payable to “cash” are extremely difficult to resolve, as there is no way to tell who converted the check.
a. True
b. False
A
b. False
5
Q
- Which of the following choices is not a category of check tampering?
a. Forged maker schemes
b. Altered payee schemes
c. Unauthorized endorsement schemes
d. Concealed check schemes
A
c. Unauthorized endorsement schemes
6
Q
- The person who prepares and signs the check is known as the ______________ of the check.
a. Author
b. Endorser
c. Payer
d. Maker
A
d. Maker
7
Q
- In which of the following schemes does the fraudster intercept and convert a company check made payable to a third party?
a. Forged maker scheme
b. Authorized maker scheme
c. Altered payee scheme
d. Concealed check scheme
A
c. Altered payee scheme
8
Q
- In a forged maker scheme, the perpetrator fraudulently affixes the signature of an authorized maker to a check.
a. True
b. False
A
a. True
9
Q
- Producing a counterfeit check using the company’s logo and bank account number is one type of concealed check scheme.
a. True
b. False
A
b. False
10
Q
- Which of the following is not an effective control mechanism to safeguard an organization’s check stock?
a. Boxes of blank checks should be sealed with security tape.
b. Organizations should use check stock that is high-quality and distinctly marked.
c. The employee in charge of the check preparation function should periodically verify the security of unused checks.
d. Voided checks should be promptly destroyed.
A
c. The employee in charge of the check preparation function should periodically verify the security of unused checks.
11
Q
- To prevent and detect forged maker schemes, an organization should:
a. Separate the duties of check preparation and check signing.
b. Rotate authorized check signers.
c. Maintain a usage log for the signature stamp.
d. All of the above
A
d. All of the above
12
Q
- Which of the following procedures can help prevent and detect the theft and conversion of outgoing company checks?
a. Train employees to look for dual endorsements on canceled checks.
b. Chart the date of mailing for every outgoing check.
c. Track changes made to vendor records.
d. All of the above
A
d. All of the above
13
Q
- Which of the following is not a type of altered payee scheme?
a. “Tacking” on
b. Forged maker
c. Using erasable ink
d. Leaving the payee designation blank
A
b. Forged maker
14
Q
- To prevent altered payee schemes, the person who prepares the check should also review the check after it has been signed.
a. True
b. False
A
b. False
15
Q
- Which of the following computer audit tests can be used to detect forged maker schemes?
a. Extract checks that are out of sequence
b. Extract manual checks and summarize by vendor and issuer
c. Extract all checks payable to “cash” and summarize by issuer for reasonableness
d. All of the above
A
d. All of the above