Exam 3 Flashcards

1
Q

What are the two ways to commit fraud with inventory and other non-cash assets?

A
  1. Misuse
  2. Larceny
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 ways to commit larceny involving inventory and non-cash assets?

A
  1. Asset req. & transfers
  2. False sales & shipping
  3. Purchasing and receiving
  4. Unconcealed larceny
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Misuse - “borrowed” but not stolen non-cash assets is….

A

Non-cash tangible asset misappropriations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 4 typical misused - borrowed but not stolen - non-cash tangible assets?

A
  1. Company vehicles
  2. Company supplies
  3. Computers
  4. Other office equipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False?
Unauthorized use of a company asset does amount to fraud, even when a false statement doesn’t accompany the use.

A

False.
It is considered fraud when a false statement accompanies the use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are 4 costs of inventory misuse?

A
  1. Loss of productivity
  2. Need to hire more
  3. Lost business
  4. Wear and tear
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The most basic type of theft…

A

Larceny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where an employee takes property from the company premises without attempting to conceal it in the books and records.

A

Unconcealed Larceny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or false?
Most unconcealed larceny schemes are complex, done by the least trusted employees.

A

False.
Most unconcealed larceny schemes are very simple, usually done by the most trusted employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An asset misappropriation that can involve an employee and a customer. The employee bags the merchandise and may act as though a transaction is being entered on the register, but in fact, the “sale” is not recorded.

A

Fake Sale

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 4 ways to prevent and detect unconcealed larceny of non-cash tangible assets?

A
  1. Separation of duties
  2. Physical security
  3. Track access logs
  4. Security cameras
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When documentation enables non-cash assets to be moved from one location to another. Internal documents can be used to fraudulently gain access to merchandise. Example: Requisition materials for project, steal materials or overstate amount of supplies, and keep excess.

A

Asset Requisitions and Transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Assets were intentionally purchased by the company but misappropriated (noncash scheme.) Falsifying incoming shipments, may also reject portion of shipment, where perpetrator keeps the “substandard” merchandise.

A

Purchasing and receiving schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

False shipping and sales documents are created to make it appear that the inventory was sold. False packing slips can allow the inventory to be delivered to fraudster or accomplice. Fake “old” receivable is written off.

A

False shipments of inventory and other assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Assets are written off in order to make them available for theft.

A

Other noncash scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Assets are declared as scrap and given to the employee.

A

Other noncash scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

New Equipment is ordered for the company to replace old - new equipment is sent to employee’s home leaving old equipment in place.

A

Other noncash scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the key issue with inventory theft concealment?

A

Shrinkage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

When an employee forces a reconciliation or/and deletes or covers up the correct totals and entering new totals related to inventory.

A

Altered inventory records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When an employee charges a sale to an existing account and write-offs to discounts and allowances or bad debt expenses.

A

Fictitious sales and accounts receivable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a way to eliminate the problem of shrinkage finding concealment?

A

Write off inventory or other assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

When an employee makes it appear that there are more assets present than there actually are.

A

Physical padding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are 3 ways to prevent and detect thefts of non-cash tangible assets? (Refer to notes to review 9 other ways to prevent and detect)

A
  1. Separation of duties
  2. Match invoices to reports
  3. Match packing slip to purchase order
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Includes theft of competitively sensitive information, can undermine value and result in legal liabilities.

A

Misappropriation of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Internal controls fail, where investment portfolios are stolen or adjusted in a way to benefitthe perpetrator.

A

Misappropriation of securities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the 4 different examples of corruption?

A
  1. Conflicts of interest
  2. Bribery
  3. Illegal Gratuities
  4. Economic Extortion
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Offering, giving, receiving, or soliciting any thing of value to influence an official act. Example: Commercial, kickbacks, bid-rigging

A

Bribery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Involve submission of invoices for goods and services that are either overpriced or completely fictitious, allowing the perpetrator to make a gain from the accomplice accepting invoice.

A

Kickback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Kickbacks are classified as________ schemes rather than _______ _________ because they involve collusion between employees and vendors.

A
  1. Corruption
  2. Asset misappropriation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are 3 things brought on by kickback schemes?

A
  1. No economic pressure
  2. no incentive for quality
  3. Overpaying
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

With an employee with approval authority, vendor submits inflated invoice to employee of victim company, where employee approves.

A

Overbilling Scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Regarding overbilling schemes, what are 3 ways an employee without authority could make it work?

A
  1. False voucher
  2. Forge signature
  3. Slip fake invoice into real ones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are 2 other kickback schemes?

A
  1. Discount bribery
  2. Slush funds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are 3 ways to detect kickbacks?

A
  1. Price inflations
  2. Trends in COGS or services
  3. Excessive purchases
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are 3 ways to prevent kickbacks?

A
  1. Independent employee reviews purchases
  2. Right to audit clause
  3. No soliciting or gifts received for employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

When a bidder has more power over the bidding process, influencing others during the selection of the winning bid.

A

Bid-Rigging Schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Where a conspiracy between the buyer and contractor whereby an employee of the buyer receives something of value and, in return, recognizes a “need” for a particular product or service. (Look for trends)

A

Pre-Solicitation Phase

38
Q

Includes listing of element materials, dimensions, and other relevant requirements. Uses “prequalification” procedures to eliminate certain vendors.

A

Specification schemes

39
Q

Federal law requires competitive bidding on projects over a certain dollar value, so the project is broken into smaller projects below the mandatory bidding level.

A

Bid Splitting

40
Q

Restricting the pool of vendors from which to choose.

A

The Solicitation phase

41
Q

Process by which several bidders conspire to split up contracts and ensure that each gets a certain amount of work.

A

Bid pooling

42
Q

Using quotes from fake companies to demonstrate that pricing is reasonable.

A

Fictitious suppliers

43
Q

When the last bid is submitted is awarded the contract. Winner bidder finds out what the other bids are, allowing them to adjust their bid to win.

A

Fraud in the sealed bid process

44
Q

What are 4 things of value used for bid-rigging schemes?

A
  1. Cash
  2. Promised things
  3. Gifts
  4. Bill payments or loans
45
Q

Given to reward a decision rather than influence it.

A

Illegal gratuities

46
Q

Employee demands payment from a vendor in order to make a decision in the vendor’s favor. “Pay up or else”.

A

Economic extortion

47
Q

Who commits financial statement fraud?

A
  1. Senior management
  2. Mid/lower level employees
  3. Organized criminals
48
Q

What are 3 ways people commit financial statement fraud?

A
  1. Playing the accounting system
  2. Beating the accounting system
  3. Going outside the accounting system
49
Q

What are the 4 recognition and measurement concepts?

A
  1. Economic entity
  2. Going concern
  3. Monetary unit
  4. Periodicity
50
Q

What are the 4 principles of recognition and measurement concepts?

A
  1. Historical cost
  2. Revenue recognition
  3. Matching
  4. Full disclosure
51
Q

What are the 4 constraints of recognition and measurement concepts?

A
  1. Cost-benefit
  2. Materiality
  3. Industry practice
  4. Conservatism
52
Q

Fraud occurs when ____ is intentionally avoided to show false profits.

A

Consistency

53
Q

What are the 4 qualitative characteristics?

A
  1. Relevance & reliability
  2. Comparability and consistency
54
Q

Who is responsible for financial statements?

A

Management

55
Q

Who is responsible for the code of conduct?

A

Board of directors

56
Q

Who is responsible for the companies ethics?

A

All employees

57
Q

Established higher standards, responsibilities, qualities and protection for corporate companies.

A

SOX

58
Q

Where public accounting firms that audit publicly traded companies register. This group inspects registered public accounting firms.

A

PCAOB

59
Q

What are 3 duties of the PCAOB?

A
  1. Investigate registered public accounting firms
  2. Perform other duties to promote professional standards
  3. Enforce compliance with SOX
60
Q

What is the difference of when corporate officers KNOWLINGLY or WILLFULLY violate certification requirements? (Criminal certifications)

A

Knowingly: $1 million and 10 years
Willfully: $5 million and 20 years

61
Q

Which CEO/CFO certification is involved with reports being reviewed, doesn’t contain MM, and fairly represents the companies financial conditions?
Also, they design controls and notify when changes are made and disclose info to auditors and committee

A

Civil certifiications

62
Q

What are the 2 things control reports are supposed to include?

A
  1. Management responsibilities
  2. Assessment of effectiveness
63
Q

All annual reports are supposed to include what?

A

Control reports

64
Q

What are 4 standards for auditor independence?

A
  1. Mandatory audit partner rotation
  2. Conflict of interest provisions
  3. Auditor reports to audit committees
  4. Auditors attestation to internal controls
65
Q

What are 3 ways to enhanced financial disclosure requirements?

A
  1. Off-balance sheet transactions included
  2. Pro forma financial info
  3. Prohibitions of loans to officers
66
Q

Makes it a crime to knowingly, with the intent to retaliate, take any harmful action against a person for providing truthful information relating to the commission or possible commission of a federal offense.

A

Criminal liability whistleblower protection

67
Q

Makes it a crime to knowingly, with the intent to retaliate, take any harmful action against a person for providing truthful information relating to the commission or possible commission of a federal offense.

A

Criminal liability whistleblower protection

68
Q

What are 3 enhanced penalties for White-Collar Crime

A
  1. Securities fraud
  2. Freezing of assets
  3. Document destruction
69
Q

Deliberate misstatements or omissions of amounts or disclosures of financial statements to deceive financial statement users.

A

Financial statement fraud

70
Q

What are 3 costs of financial statement fraud?

A
  1. Legal costs
  2. Loss of productivity
  3. Loss of customer goodwill
71
Q

What are 3 things that financial statement fraud bring?

A
  1. Regulatory oversight
  2. Doubt in efficacy of operations
  3. Destroy public confidence
72
Q

Recording income from goods or services that did not occur.

A

Fictitious revenues

73
Q

Recording revenue and/or expenses in improper periods.

A

Timing differences

74
Q

Liability and expense omissions. Capitalized expenses as well.

A

Concealed liabilities

75
Q

Liability omissions, subsequent events, etc. Not explaining negative issues with the company.

A

Improper disclosures

76
Q

What 4 things are involved with improper asset valuation?

A
  1. Inventory valuation
  2. Accounts payable
  3. Business Combinations
  4. Fixed assets
77
Q

The auditor has a responsibility to plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement, whether cause by error or fraud.

A

Consideration of fraud in a financial statement audit (Au 240)

78
Q

What are the 2 characteristics of fraud involved in public companies? (Misstatements)

A

Misstatements arising from:
1. Fraudulent financial reporting
2 Misappropriation of assets

79
Q

Obtaining information needed to identify _____ of material misstatement due to ________.

A
  1. Risks
  2. fraud
80
Q

What are the 4 attributes of risk to identify?

A
  1. Type
  2. Significance
  3. Likelihood
  4. Pervasiveness
81
Q

What are the 3 results to respond to after an assessment?

A
  1. RMM
  2. NET
  3. Override of controls risk
82
Q

What are the 3 things we need to reduce to help deter financial statement fraud?

A
  1. Pressures
  2. Opportunity
  3. Rationalization
83
Q

Analyzes RELATIONSHIPS between ITEMS on an income statement, balance sheet, etc.

A

Vertical analysis

84
Q

Analyzes the percentage CHANGE in individual financial statement items.

A

Horizontal analysis

85
Q

Measures the RELATIONSHIP between two different financial statement amounts.

A

Ratio analysis

86
Q

Employee, manager, or executive has a _____ ___ ______ or personal interest in a transaction that adversely affects the company.

A

Conflicts of Interest

87
Q

What are two examples of purchasing schemes?

A
  1. Overbilling
  2. Turnaround sales
88
Q

The employee knows that the company is seeking to purchase a particular asset and purchases it himself. Then, sells it to the company at a higher price.

A

Turnaround sales

89
Q

Goods are sold below fair market value to a customer in which the perpetrator has a hidden interest.

A

Underbilling

90
Q

Purchases are made from the victim company and credit memos are later issued.

A

Writing off sales