Occupational Fraud Schemes Flashcards
Which of the following is a typical method used to make corrupt payments in corruption schemes?
A. Gifts, travel, and entertainment
B. Payment toward credit card debt
C. Checks and other financial instruments
D. All of the above
D. All of the above
See pages 1.609-1.610 in the Fraud Examiner’s Manual
Often, corruption schemes involve corrupt payments—items of value paid to procure a benefit contrary to the rights of others. There are various ways to make corrupt payments, and many do not involve money. Any tangible benefit given or received with the intent to corruptly influence the recipient can be an illegal payment, and traditional methods of making corrupt payments include:
- Gifts, travel, and entertainment
- Cash payments
- Checks and other financial instruments
- Hidden interests
- Loans
- Credit cards
- Transfers not at fair market value
- Promises of favorable treatment
The accounts receivable clerk should be responsible for preparing the bank deposit.
A. True
B. False
B. False
See pages 1.330 in the Fraud Examiner’s Manual
The bank deposit should be made by someone other than the cashier or the accounts receivable clerk. A person independent of the cash receipts and accounts receivable functions should compare entries to the cash receipts journal with:
- Authenticated bank deposit slips
- The deposit per the bank statements
There is nothing inherently wrong with a company engaging in related-party transactions if the transactions are fully disclosed.
A. True
B. False
A. True
See pages 1.233-1.234 in the Fraud Examiner’s Manual
There is nothing inherently wrong with related-party transactions if they are fully disclosed. If the transactions are not fully disclosed, the company might injure its shareholders by engaging in economically harmful dealings without their knowledge.
What financial statement fraud scheme involves recording revenues and expenses in improper periods?
A. Concealed expenses
B. Improper disclosures
C. Timing differences
D. Improper asset valuations
C. Timing differences
See pages 1.215 in the Fraud Examiner’s Manual
Financial statement fraud often involves timing differences—that is, the recording of revenues or expenses in improper periods. This can be done to move revenues or expenses between one period and the next, increasing or decreasing earnings as desired. This practice is also referred to as income smoothing.
Off-book sales of goods ALWAYS cause shrinkage.
A. True
B. False
A. True
See pages 1.316 in the Fraud Examiner’s Manual
Off-book sales of goods, otherwise known as skimming, will always leave an inventory shortage and a corresponding rise in the cost of goods sold. When a sale of goods is made, the physical inventory is reduced by the amount of merchandise sold. For instance, when a retailer sells a pair of shoes, there is one less pair of shoes in the stockroom. However, if a fraudster hands over the pair of shoes to a paying customer and keeps their cash without recording the sale, then the inventory balance on the company’s books will be higher than the physical inventory on hand. Thus, there is one less pair of shoes available than the records indicate. Such a reduction in the physical inventory without a corresponding reduction in the perpetual inventory is known as shrinkage.
Which of the following is NOT one of the three common methods for concealing liabilities and expenses on a company’s financial statements?
A. Failing to disclose warranty costs and product-return liabilities
B. Channel stuffing
C. Capitalizing expenses
D. Omitting liabilities/expenses
B. Channel stuffing
See pages 1.227 in the Fraud Examiner’s Manual
There are three common methods for concealing liabilities and expenses:
- Omitting liabilities and/or expenses
- Improperly capitalizing costs rather than expensing them
- Failing to disclose warranty costs and product-return liabilities
Which of the following scenarios BEST describes a mischaracterized reimbursement expense scheme?
A. An employee alters a receipt to show a higher cost than what the employee paid and submits it for reimbursement.
B. An employee produces a fictitious receipt and includes it with an expense report.
C. An employee submits a receipt for an item in one expense report and an email confirmation for the same item in the next period’s expense report.
D. An employee who travels frequently for business submits receipts from a hotel stay during a family vacation as a business expense.
D. An employee who travels frequently for business submits receipts from a hotel stay during a family vacation as a business expense.
See pages 1.473, 1.475, 1.478, 1.481 in the Fraud Examiner’s Manual
One of the most basic expense reimbursement schemes is perpetrated by requesting reimbursement for a personal expense, claiming that it is business related. Examples of mischaracterized expenses include claiming personal travel as a business trip or listing dinner with a friend as “business development” or “client entertainment.” Employees might submit the receipts from their personal expenses along with their expense reports and invent business reasons for the incurred costs.
Instead of seeking reimbursement for personal expenses, some employees overstate the cost of actual business expenses. This is considered an overstated expense reimbursement scheme.
In a fictitious expense reimbursement scheme, an employee seeks reimbursement for fictitious expenses. Instead of overstating a real business expense or seeking reimbursement for a personal expense, an employee invents an expense by producing a fictitious receipt to request reimbursement.
In a multiple reimbursement scheme, an employee submits several types of support for the same expense to get reimbursed multiple times.
The motivation for financial statement fraud almost always involves personal gain.
A. True
B. False
B. False
See pages 1.204-1.205 in the Fraud Examiner’s Manual
Unlike some other types of fraud (such as embezzlement), the motivation for financial statement fraud does not always involve personal gain. Most commonly, financial statement fraud is used to make a company’s earnings appear better than they are. Financial statement fraud occurs through a variety of methods, such as valuation judgments and manipulating the timing of transaction recording. These more subtle types of fraud are often dismissed as either mistakes or errors in judgment and estimation. Some of the more common reasons why people commit financial statement fraud include:
- To encourage investment through the sale of stock
- To demonstrate increased earnings per share or partnership profits interest, thus allowing increased dividend/distribution payouts
- To cover inability to generate cash flow
- To avoid negative market perceptions
- To obtain financing or to obtain more favorable terms on existing financing
- To receive higher purchase prices for acquisitions
- To demonstrate compliance with financing covenants
- To meet company goals and objectives
- To receive performance-related bonuses
Which of the following statements is TRUE regarding a fictitious revenue scheme?
A. The debit side of a fictitious sales entry usually goes to accounts payable.
B. Uncollected accounts receivable are a red flag of fictitious revenue schemes.
C. Fictitious revenues must involve sales to a fake customer.
D. If a fictitious revenue scheme has taken place, there will typically be no accounts receivable on the books.
B. Uncollected accounts receivable are a red flag of fictitious revenue schemes.
See pages 1.212 in the Fraud Examiner’s Manual
Fictitious or fabricated revenues involve the recording of sales of goods or services that did not occur. Fictitious sales most often involve fake customers but can also involve legitimate customers. At the end of the accounting period, the sale will be reversed (as will all revenue accounts), which will help to conceal the fraud.
Recording the sales revenue is easy, but the challenge for the fraudster is how to balance the other side of the entry. A credit to revenue increases the revenue account, but the corresponding debit in a legitimate sales transaction typically either goes to cash or accounts receivable. Because no cash is received in a fictitious revenue scheme, increasing accounts receivable is the easiest way to get away with completing the entry. Unlike revenue accounts, however, accounts receivable are not reversed at the end of the accounting period. They stay on the books as an asset until collected. If the outstanding accounts are never collected, they will eventually need to be written off as bad debt expense. Mysterious accounts receivable on the books that are long overdue are a common sign of a fictitious revenue scheme.
Which of the following is an example of a fictitious expense reimbursement scheme?
A. An employee alters an electronic receipt using photo-editing software to show a higher cost than what the employee paid.
B. An employee who travels frequently for business submits receipts from a hotel stay during a family vacation as a business expense.
C. An employee submits a receipt for a hotel reservation in one expense report and a copy of the credit card statement showing the same reservation in the next period’s expense report.
D. An employee generates a fake receipt using basic computer software and includes it with an expense report.
D. An employee generates a fake receipt using basic computer software and includes it with an expense report.
See pages 1.473, 1.475, 1.478, 1.481 in the Fraud Examiner’s Manual
Expense reimbursements are sometimes sought by employees for fictitious items. Instead of overstating a real business expense or seeking reimbursement for a personal expense, an employee invents a purchase to request reimbursement. One way to generate a reimbursement for a fictitious expense is to create fraudulent support documents, such as false receipts. Using basic computer software, it is easy for employees to create realistic-looking counterfeit receipts. These counterfeits are often very sophisticated, even including logos of the stores in which the goods or services were allegedly purchased.
Instead of seeking reimbursement for personal expenses, some employees overstate the cost of actual business expenses. This is considered an overstated expense reimbursement scheme.
In a multiple reimbursement scheme, an employee submits several types of support for the same expense to get reimbursed multiple times.
In a mischaracterized expense scheme, an employee requests reimbursement for a personal expense, claiming that it is business related.
Which of the following statements is TRUE?
A. Cash larceny schemes are generally more difficult to detect than skimming schemes.
B. Skimming schemes are generally more difficult to detect than cash larceny schemes.
C. Both cash larceny and skimming are equally difficult to detect.
D. Cash distraction is the most difficult type of cash receipts scheme to detect.
B. Skimming schemes are generally more difficult to detect than cash larceny schemes.
See pages 1.301, 1.320 in the Fraud Examiner’s Manual
Skimming is the removal of cash from a victim entity prior to its entry in an accounting system, meaning cash is stolen before it is recorded in the victim organization’s accounts. This aspect of skimming schemes means that there is no direct audit trail. Because the stolen funds are never recorded, the victim organization might not be aware that the cash was ever received. Consequently, it can be difficult to detect that the cash has been stolen. Cash larceny schemes involve the theft of money that has already appeared on a victim company’s books. Accordingly, cash larceny schemes are easier to detect than skimming schemes because they leave an audit trail.
Cash distraction is not a recognized type of cash receipts scheme.
A recommended practice to detect expense reimbursement schemes is to compare current period expenses to both historical expenditure amounts and budgeted expense amounts.
A. True
B. False
A. True
See pages 1.481 in the Fraud Examiner’s Manual
Generally, expense account review uses one of two methods: historical comparisons or comparisons with budgeted amounts. A historical comparison compares the balance expended this period in relation to the balance spent in prior, similar periods.
Budgets are estimates of the money or time necessary to complete a task. They are based on experience with consideration for current and future business conditions. Therefore, when comparing actual and budgeted expenses, determining excessive expenses or inaccurate budget estimates is important.
Which of the following is TRUE regarding an overstated refund scheme?
A. It is based on an entirely fictitious refund transaction.
B. It requires collusion between the customer and the employee.
C. The company’s inventory balance on the books will be understated.
D. An employee overstates the amount of a legitimate refund and keeps the excess cash.
D. An employee overstates the amount of a legitimate refund and keeps the excess cash.
See pages 1.403 in the Fraud Examiner’s Manual
Rather than create an entirely fictitious refund, some employees merely overstate the amount of a legitimate refund and steal the excess money. For example, if a customer returns $100 worth of merchandise, the employee might record a $200 return. The employee gives the customer $100 in return for the merchandise and then keeps the remaining $100. The customer might or might not be aware of the scheme taking place. This will result in shrinkage of $100 worth of inventory. In other words, the inventory balance on the books will be overstated by the amount of the excess refund.
To understate net income and lower income tax liability, an accountant could fraudulently expense costs rather than properly capitalizing them to an asset account.
A. True
B. False
A. True
See pages 1.227, 1.231 in the Fraud Examiner’s Manual
Typically, a fraudster’s goal when committing a financial statement fraud scheme is to make the entity look stronger and more profitable. This goal is often achieved by concealing liabilities and/or expenses. To do this, the fraudster might fraudulently understate liabilities or improperly capitalize a cost that should be expensed.
Just as capitalizing expenditures that should be expensed is improper, so is expensing costs that should be capitalized. The organization might do this to minimize its net income due to tax considerations. Expensing an item that should be depreciated over a period of time would help accomplish that—net income is lower and so are taxes.
Belinda used her company credit card to pay for a business dinner at which she was entertaining a client, knowing Belinda’s employer would pay the credit card bill. Belinda saved the receipt and later filed an expense report seeking reimbursement for the cost of the meal, attaching the receipt as support. This is an example of what kind of fraud?
A. Personal purchases with company funds
B. Mischaracterized expense scheme
C. Multiple reimbursement scheme
D. False billing scheme
C. Multiple reimbursement scheme
See pages 1.481 in the Fraud Examiner’s Manual
A multiple expense reimbursement scheme involves the submission of a single expense several times to receive multiple reimbursements. The most frequent example of such a scheme is the submission of several types of support for the same expense. However, rather than file two expense reports, employees might also charge an item to the company credit card, save the receipt, and attach it to an expense report as if they paid for the item themselves. The victim company therefore ends up paying twice for the same expense.
Zach was booking travel arrangements for a business trip. He purchased an airline ticket online using his own funds and obtained a receipt for the ticket via email. Using photo-editing software, Zach increased the ticket price on the electronic receipt and submitted the altered receipt to his employer for reimbursement. This is an example of what type of fraud scheme?
A. Mischaracterized expense scheme
B. Multiple reimbursement scheme
C. Overstated expense scheme
D. Personal purchases with company funds
C. Overstated expense scheme
See pages 1.475-1.477 in the Fraud Examiner’s Manual
Instead of seeking reimbursement for personal expenses, some employees overstate the cost of actual business expenses. The most fundamental example of an overstated expense reimbursement scheme occurs when an employee alters a receipt or other supporting documentation to show a higher cost than what the employee paid.
A skimming scheme is easier to detect than a cash larceny scheme because it leaves an audit trail.
A. True
B. False
B. False
See pages 1.301, 1.320 in the Fraud Examiner’s Manual
Cash receipts schemes fall into two categories: skimming and larceny. Skimming is defined as the theft of off-book funds, meaning cash is stolen before it is recorded in the victim organization’s accounts. This aspect of skimming schemes means that there is no direct audit trail. Cash larceny schemes, however, involve the theft of money that has already appeared on a victim company’s books. Cash larceny schemes are easier to detect than skimming schemes because they leave an audit trail.
Jacob was on a business trip in another city. One night, he met some friends (unrelated to his work) at an expensive restaurant, paid for the group’s meal using his credit card, and said that “the company would pay for it.” He submitted the receipt for the dinner with the legitimate business receipts from the trip and described the dinner as “client entertainment.” What type of scheme did Jacob commit?
A. A mischaracterized expense scheme
B. An overstated expense scheme
C. A fictitious expense scheme
D. A multiple reimbursement scheme
A. A mischaracterized expense scheme
See pages 1.473 in the Fraud Examiner’s Manual
One of the most basic expense reimbursement schemes is perpetrated by requesting reimbursement for a personal expense, claiming that it is business related. Examples of mischaracterized expenses include claiming personal travel as a business trip or listing dinner with a friend as “business development” or “client entertainment.” Employees might submit the receipts from their personal expenses along with their expense reports and invent business reasons for the incurred costs.
Which of the following is an example of an off-book fraud?
A. Cash larceny
B. Ghost employee schemes
C. Skimming
D. Billing schemes
C. Skimming
See pages 1.301 in the Fraud Examiner’s Manual
Skimming is the removal of cash from a victim entity prior to its entry in an accounting system. Employees who skim from their companies steal sales or receivables before they are recorded in the company books. Because of this aspect of their nature, skimming schemes are known as off-book frauds; they leave no direct audit trail. Cash larceny, billing schemes, and ghost employee schemes all involve the misappropriation of cash that has already been recorded on the victim’s books.
Which of the following statements about detecting a cash larceny scheme is TRUE?
A. Someone other than the accounts receivable clerk should prepare the bank deposit
B. If employees who handle cash go on vacation, other employees should take over their duties
C. Reconciling the cash register total to the amount of cash in the drawer is helpful in detecting a cash larceny scheme
D. All of the above
D. All of the above
See pages 1.329-1.330, 1.332 in the Fraud Examiner’s Manual
Mandatory vacations are an excellent method of detecting cash fraud. If mandatory vacations are within the company’s policies, then it is important that another individual continues to perform the normal workload of an absent employee. The purpose of mandatory vacations is lost if the work is allowed to remain undone during the employee’s time off.
In contrast to skimming schemes, the register records should not match up with the cash in the drawer when a cash larceny scheme has occurred. For this reason, cash larceny schemes are much easier to detect than skimming schemes because they leave an audit trail. To detect a cash larceny scheme, one recommended practice is to perform independent reconciliations of the register totals to the amount of cash in the drawer.
The bank deposit should be made by someone other than the cashier or the accounts receivable clerk. A person independent of the cash receipts and accounts receivable functions should compare entries to the cash receipts journal with:
- Authenticated bank deposit slips
- The deposit per the bank statements
Improperly recording an expenditure as a capitalized asset rather than recording it as an expense would have what effect on the financial statements?
A. Assets would be falsely overstated, giving the appearance of a stronger company
B. Expenses would be overstated, giving the appearance of poor financial performance
C. Net income would be falsely understated, lowering the company’s tax liability
D. None of the above
A. Assets would be falsely overstated, giving the appearance of a stronger company
See pages 1.230 in the Fraud Examiner’s Manual
Improperly capitalizing expenses is one way to increase income and assets and make the entity’s financial position appear stronger. If ineligible expenditures are capitalized as assets and not expensed during the current period, income will be overstated. As the assets are depreciated, income in following periods will be understated.
Payers can make corrupt payments by giving recipients hidden interests in profit-making enterprises.
A. True
B. False
A. True
See pages 1.609 in the Fraud Examiner’s Manual
A payer might make a corrupt payment by giving the recipient a hidden interest in a joint venture or other profit-making enterprise.
Which of the following is a basic method used to prove corrupt payments in corruption schemes?
A. Using an inside witness
B. Identifying and tracing payments through audit steps
C. Secretly infiltrating ongoing transactions
D. All of the above
D. All of the above
See pages 1.613 in the Fraud Examiner’s Manual
There are three basic ways to prove corrupt payments:
- Use an inside witness.
- Secretly infiltrate or record ongoing transactions.
- Identify and trace the corrupt payments through audit steps.
A large amount of overdue accounts receivable on the books is a red flag of a fictitious revenue scheme.
A. True
B. False
A. True
See pages 1.212 in the Fraud Examiner’s Manual
Fictitious or fabricated revenues involve the recording of sales of goods or services that did not occur. Fictitious sales most often involve fake customers but can also involve legitimate customers. Recording the sales revenue is easy, but the challenge for the fraudster is how to balance the other side of the entry. A credit to revenue increases the revenue account, but the corresponding debit in a legitimate sales transaction typically either goes to cash or accounts receivable. Because no cash is received in a fictitious revenue scheme, increasing accounts receivable is the easiest way to get away with completing the entry. However, accounts receivable stay on the books as an asset until they are collected. If the outstanding accounts are never collected, they will eventually need to be written off as bad debt expense. Mysterious accounts receivable on the books that are long overdue are a common sign of a fictitious revenue scheme.
To help detect cash larceny, the person responsible for collecting incoming cash should also prepare the bank deposits.
A. True
B. False
B. False
See pages 1.332 in the Fraud Examiner’s Manual
The primary means of preventing cash fraud is separation of duties. Whenever one individual has control over the entire accounting transaction (e.g., authorization, recording, and custody), the opportunity is present for cash fraud. Each of the following duties/responsibilities should be separated:
- Cash receipts
- Bank deposits
- Bank reconciliations
- Cash disbursements
If one person has the authority to collect the cash, deposit the receipts, record that collection, and disburse company funds, the risk of fraud is high.
All the following are types of payroll schemes EXCEPT:
A. Stolen paychecks
B. Falsified hours and salary
C. Ghost employees
D. Commission schemes
A. Stolen paychecks
See pages 1.455 in the Fraud Examiner’s Manual
In general, payroll schemes fall into one of the following categories:
- Ghost employees
- Falsified hours and salary
- Commission schemes
When an employee steals paychecks, the scheme is categorized as check tampering, not payroll fraud. The reason is that the basis of the scheme is stealing the check, not generating false payroll disbursements.
Early revenue recognition is classified as what type of financial fraud scheme?
A. Fictitious revenues
B. Timing differences
C. Improper asset valuations
D. Improper disclosures
B. Timing differences
See pages 1.215 in the Fraud Examiner’s Manual
Financial statement fraud might involve timing differences—that is, the recording of revenues or expenses in improper periods. This can be done to move revenues or expenses between one period and the next, increasing or decreasing earnings as desired. Early revenue recognition is a common type of timing difference scheme because companies often try to make themselves look as profitable as possible. This practice is also referred to as income smoothing.
Jackson is a receiving clerk at a warehouse. His job is to count the number of units in incoming shipments, record the amounts in receiving reports, and forward copies of the reports to the accounts payable department. One day, Jackson received a box of twenty laptop computers at the warehouse. His wife’s computer recently broke, so he stole one of the computers from the box. To conceal his scheme, Jackson sent a receiving report to accounts payable that twenty computers arrived, but he only recorded 19 on the copy of the receiving report used for the inventory records. What type of scheme did Jackson commit?
A. A noncash larceny scheme
B. A purchasing and receiving scheme
C. An asset transfer scheme
D. None of the above
B. A purchasing and receiving scheme
See pages 1.507 in the Fraud Examiner’s Manual
One of the most common examples of an employee abusing the purchasing and receiving functions occurs when a person charged with receiving goods on the victim company’s behalf—such as a warehouse supervisor or receiving clerk—falsifies the records of incoming shipments. If, for example, 1,000 units of a particular item are received, the perpetrator indicates that only 900 were received. By marking the shipment short, the perpetrator can steal the 100 unaccounted-for units.
The obvious problem with this kind of scheme is the fact that the receiving report does not match the vendor’s invoice, which will likely cause a problem with payment. Some employees avoid this problem by altering only one copy of the receiving report. The copy that is sent to accounts payable indicates receipt of a full shipment, so the vendor will be paid without any dispute. The copy used for inventory records indicates a short shipment so that the assets that are readily available will equal the assets in the perpetual inventory.
Which of the following is a method that would help prevent the theft of company inventory?
A. Using prenumbered shipping documents, perpetual inventory records, and inventory receiving reports
B. Restricting inventory access to authorized personnel
C. Separating responsibility for incoming shipments and completing the inventory requisition form
D. All of the above
D. All of the above
See pages 1.516-1.517 in the Fraud Examiner’s Manual
There are four basic measures that might help prevent inventory fraud, if properly installed and implemented. They are proper documentation, separation of duties (including approvals), independent checks, and physical safeguards.
Different personnel should be responsible for the following duties:
- Requisition of inventory
- Receipt of inventory
- Disbursement of inventory
- Conversion of inventory to scrap
- Receipt of proceeds from disposal of scrap
In addition, all merchandise should be physically guarded and locked; access should be limited to authorized personnel only.
Finally, the following documents should be prenumbered and controlled:
- Purchase orders
- Receiving reports
- Perpetual records
- Raw materials requisitions
- Shipping documents
- Job cost sheets
Performing a physical inventory count is an effective way to detect a skimming scheme.
A. True
B. False
A. True
See pages 1.316-1.317 in the Fraud Examiner’s Manual
In a skimming scheme, the fraudster either fails to report sales or understates them. As a result, the inventory balance on the books will be higher than the physical inventory on hand, since the fraudster is handing over inventory to paying customers and keeping their cash without recording the sales. In other words, inventory leaves the company’s possession, but the inventory balance on the books does not reflect this. This is referred to as shrinkage.
Detailed inventory control procedures can be used to detect inventory shrinkage due to unrecorded sales. In addition to physical inventory counts, inventory detection methods include statistical sampling, trend analysis, reviews of receiving reports and inventory records, and verification of material requisition and shipping documentation.
All of the following are measures that would be helpful in preventing cash larceny schemes EXCEPT:
A. Having all employees use the same cash register for their transactions
B. Ensuring that the duties of making bank deposits and performing bank reconciliations are assigned to different individuals
C. Assigning an employee’s duties to another individual when that employee goes on vacation
D. Sending out a company-wide communication informing employees of the company’s surprise cash-count policy
A. Having all employees use the same cash register for their transactions
See pages 1.331-1.333 in the Fraud Examiner’s Manual
Surprise cash counts and supervisory observations can be useful fraud prevention methods. It is important that employees know that cash will be counted on a periodic and unscheduled basis.
Having all employees use the same cash register will not deter cash larceny. However, each employee should have a unique code to the cash registers to facilitate detection of such schemes.
Mandatory vacations are an excellent method of detecting cash fraud. If mandatory vacations are within the company’s policies, then it is important that another individual continues to perform the normal workload of an absent employee. The purpose of mandatory vacations is lost if the work is allowed to remain undone during the employee’s time off.
The primary means of preventing cash fraud is separation of duties. Whenever one individual has control over the entire accounting transaction (e.g., authorization, recording, and custody), the opportunity is present for cash fraud. Each of the following duties/responsibilities should be separated:
- Cash receipts
- Bank deposits
- Bank reconciliations
- Cash disbursements
Therefore, no one person, including the accounts receivable clerk, should be responsible for both depositing cash at the bank and performing bank reconciliations.
Which of the following is NOT a method that a fraudster might use to conceal inventory shrinkage?
A. Altering the perpetual inventory records to decrease the balance
B. Falsely increasing the perpetual inventory figure
C. Writing off stolen inventory as scrap
D. Physical padding of inventory
B. Falsely increasing the perpetual inventory figure
See pages 1.510-1.512 in the Fraud Examiner’s Manual
Altering the perpetual inventory figure is one method that can be used to conceal inventory shrinkage. However, increasing the perpetual inventory record would only worsen the shrinkage problem. Instead, a fraudster should falsely decrease the perpetual inventory record to match the lower physical inventory count.
Alternatively, some employees try to make it appear as though there are more assets present in the warehouse or stockroom than there actually are by physically padding the inventory. Empty boxes or boxes filled with bricks or other inexpensive materials, for example, might be stacked on shelves to create the illusion of extra inventory.
Fraudulently writing off stolen inventory as scrap is also a relatively common way to remove assets from the books before or after they are stolen. This eliminates the problem of shrinkage that inherently exists in every case of noncash asset misappropriation.
One of the simplest methods for concealing shrinkage is to alter the perpetual inventory record so that it matches the physical inventory count. This is also known as a forced reconciliation of the account. In the case of misappropriated inventory, the physical count would be lower than the perpetual records, so the perpetual inventory figure would have to be decreased.
Which of the following types of accounting changes must be disclosed in an organization’s financial statements?
A. Changes in accounting principles
B. Changes in estimates
C. Changes in reporting entities
D. All of the above
D. All of the above
See pages 1.234-1.235 in the Fraud Examiner’s Manual
In general, three types of accounting changes must be disclosed to avoid misleading the user of financial statements: changes in accounting principles, estimates, and reporting entities. Although the required treatment for these accounting changes varies for each type and across jurisdictions, they are all susceptible to manipulation. For example, fraudsters might fail to properly restate financial statements retroactively for a change in accounting principle if the change causes the company’s financial statements to appear weaker. Likewise, they might fail to disclose significant changes in estimates such as the useful life and estimated salvage values of depreciable assets or the estimates underlying the determination of warranty or other liabilities. They might even secretly change the reporting entity by adding entities owned privately by management or by excluding certain company-owned units to improve reported results.
A register disbursement scheme is easier to conceal when cashiers are authorized to void their own transactions.
A. True
B. False
A. True
See pages 1.409 in the Fraud Examiner’s Manual
Red flags of register disbursement schemes include the following:
- There is inappropriate separation of duties for employees.
- Cashiers, rather than supervisors, have access to the controls necessary for refunds and voids.
- Cashiers are authorized to void their own transactions.
- Register refunds are not carefully reviewed.
- Multiple cashiers operate from a single cash drawer without separate access codes.
- Personal checks from cashiers are found in the cash register.
- Voided transactions are not properly documented or approved by a supervisor.
- Voided cash receipt forms (manual systems) or supporting documents for voided transactions (cash register systems) are not retained on file.
- There are gaps in the transaction numbers on the register log.
- There are excessive refunds, voids, or no-sales on the register log.
- Inventory totals appear forced.
- There are multiple refunds or voids for amounts just under the review limit.
The debt-to-equity ratio is computed by dividing current liabilities by total equity.
A. True
B. False
B. False
See pages 1.246 in the Fraud Examiner’s Manual
The debt-to-equity ratio is computed by dividing total liabilities by total equity. This financial leverage ratio is one that is heavily considered by lending institutions. It provides a better understanding of the comparison between the long-term and short-term debt of the company and the owner’s financial injection plus earnings to date. Debt-to-equity requirements are often included as borrowing covenants in corporate lending agreements.
Which of the following statements about the methods used to make corrupt payments in corruption schemes is INCORRECT?
A. Payers often make corrupt payments by making outright payments falsely described as innocent loans.
B. Payers often make corrupt payments by selling property to recipients at prices higher than the property’s market value.
C. Payers often make corrupt payments by using their credit cards to pay recipients’ transportation, vacation, and entertainment expenses.
D. Payers often make corrupt payments by buying assets from recipients and allowing the recipients to retain title or use of the items.
B. Payers often make corrupt payments by selling property to recipients at prices higher than the property’s market value.
See pages 1.610 in the Fraud Examiner’s Manual
Corrupt payments often take the form of loans. There are three types of loans often found in corruption cases:
- An outright payment that is falsely described as an innocent loan
- A legitimate loan in which a third party—the corrupt payer—makes or guarantees payments to satisfy the loan
- A legitimate loan made on favorable terms (e.g., an interest-free loan)
A corrupt payment can be in the form of credit card use or payments toward a party’s credit card debt. The payer might use a credit card to pay a recipient’s transportation, vacation, or entertainment expenses, or the payer might pay off a recipient’s credit card debt. In some instances, the recipient might carry and use the corrupt payer’s credit card.
Corrupt payments also might come in the form of promises of favorable treatment. In addition, corrupt payments might occur in the form of transfers for a value other than fair market. In such transfers, the corrupt payer might sell or lease property to the recipient at a price that is less than its market value, or the payer might agree to buy or rent property from the recipient at an inflated price. The recipient might also “sell” an asset to the payer but retain the title or use of the property.
The removal of cash from a victim organization before the cash is entered in the organization’s accounting system is:
A. A fraudulent disbursement
B. Cash larceny
C. Skimming
D. Lapping
C. Skimming
See pages 1.301 in the Fraud Examiner’s Manual
Skimming is the removal of cash from a victim entity prior to its entry in an accounting system. Employees who skim from their companies steal sales or receivables before they are recorded in the company books. Because of this aspect of their nature, skimming schemes are known as off-book frauds; they leave no direct audit trail.
Reconciling the cash register total to the amount of cash in the drawer is an ineffective method of detecting a cash larceny scheme.
A. True
B. False
B. False
See pages 1.321, 1.329-1.330 in the Fraud Examiner’s Manual
In contrast to skimming schemes, the register records should not match up with the cash in the drawer when a cash larceny scheme has occurred. For this reason, cash larceny schemes are much easier to detect than skimming schemes because they leave an audit trail. To detect a cash larceny scheme, one recommended practice is to perform independent reconciliations of the register totals to the amount of cash in the drawer.
Which of the following financial statement manipulations is NOT a type of improper asset valuation scheme?
A. Booking of fictitious assets
B. Recording expenses in the wrong period
C. Overstated accounts receivable
D. Inflated inventory valuation
B. Recording expenses in the wrong period
See pages 1.222 in the Fraud Examiner’s Manual
Most improper asset valuations involve the fraudulent overstatement of inventory or receivables, with the goal being to strengthen the appearance of the balance sheet and/or certain financial ratios. Other improper asset valuations include manipulation of the allocation of the purchase price of an acquired business to inflate future earnings, misclassification of fixed and other assets, or improper capitalization of inventory or start-up costs.
Improper asset valuations usually take the form of one of the following classifications:
- Inventory valuation
- Accounts receivable
- Business combinations
- Fixed assets
Fraud in financial statements generally takes the form of overstated assets or revenue and understated liabilities and expenses.
A. True
B. False
A. True
See pages 1.208 in the Fraud Examiner’s Manual
Fraud in financial statements takes the form of overstated assets or revenue and understated liabilities and expenses. Overstating assets or revenue falsely reflects a financially stronger company by the inclusion of fictitious asset costs or artificial revenues. Understated liabilities and expenses are shown through the exclusion of costs or financial obligations. Both methods result in increased equity and net worth for the company. This overstatement and/or understatement results in increased earnings per share or partnership profit interests or a more stable representation of the company’s financial situation.
White, an employee of ABC Corporation, intentionally issued two payments for the same invoice. After the checks had been mailed, White called the vendor and explained that a double payment had been made by mistake. White asked the vendor to return one of the checks to her attention. When the vendor returned the check, White took it and cashed it. This is an example of a:
A. Receivables skimming scheme
B. Pay and return scheme
C. Shell company scheme
D. Pass-through scheme
B. Pay and return scheme
See pages 1.442 in the Fraud Examiner’s Manual
Instead of using shell companies in their overbilling schemes, some employees generate fraudulent disbursements by using the invoices of legitimate third-party vendors who are not a part of the fraud scheme. In a pay and return scheme, an employee intentionally mishandles payments that are owed to legitimate vendors. One way to do this is to purposely pay an invoice twice. For instance, a clerk might intentionally pay an invoice twice and then call the vendor to request that one of the checks be returned. The clerk then intercepts the returned check.
Both falsely increasing the perpetual inventory balance and failing to reconcile inventory records are ways a fraudster might conceal inventory shrinkage.
A. True
B. False
B. False
See pages 1.510 in the Fraud Examiner’s Manual
Falsely increasing the perpetual inventory record would only worsen the shrinkage problem. Instead, a fraudster seeking to conceal shrinkage would falsely decrease the perpetual inventory record to match the lower physical inventory count. In addition, failing to reconcile inventory records would likely cause more suspicion to arise.
One of the simplest methods for concealing shrinkage is to change the perpetual inventory record so that it matches the physical inventory count. This is also known as a forced reconciliation of the account. The perpetrator simply changes the numbers in the perpetual inventory to make them match the amount of inventory that is available. For example, the employee might credit (decrease) the perpetual inventory and debit (increase) the cost of the sales account to lower the perpetual inventory numbers so that they match the actual inventory count. Instead of using correct entries to adjust the perpetual inventory, some employees simply delete or cover up the correct totals and enter new numbers.
Of the following, who should conduct physical observations of a company’s inventory to MOST EFFECTIVELY prevent inventory theft?
A. The purchasing agent
B. The purchasing supervisor
C. An internal auditor
D. Warehouse personnel
C. An internal auditor
See pages 1.517 in the Fraud Examiner’s Manual
Someone independent of the purchasing or warehousing functions should conduct physical observation of inventory. The personnel conducting the physical observations should also be knowledgeable about the inventory. For example, internal auditors are responsible for assessing a company’s business processes, but they typically have no access to the physical inventory, which makes them plausible candidates to conduct physical observations of a company’s inventory.
The asset turnover ratio is calculated by dividing net sales by average total assets.
A. True
B. False
A. True
See pages 1.247 in the Fraud Examiner’s Manual
The asset turnover ratio is used to determine the efficiency with which assets are used during the period. The asset turnover ratio is typically calculated by dividing net sales by average total assets (net sales / average total assets). However, average operating assets can also be used as the denominator (net sales / average operating assets).
The method of concealing a receivables skimming scheme whereby one customer account is credited for a payment that was intended for another account is called which of the following?
A. Lapping
B. Currency substitution
C. Altered payee designation
D. Inventory padding
A. Lapping
See pages 1.313 in the Fraud Examiner’s Manual
Lapping customer payments is one of the most common methods used to conceal skimming. It is a technique that is particularly useful to employees who skim receivables. Lapping is the crediting of one account through the abstraction of money from another account.
For example, suppose a company has three customers: A, B, and C. When A’s payment is received, the fraudster steals it instead of posting it to A’s account. Customer A expects that their account will be credited with the payment they have made, but this payment has actually been stolen. When A’s next statement arrives, A will see that the payment was not applied to their account and will complain. To avoid this, some action must be taken to make it appear that the payment was posted. When B’s payment arrives, the fraudster takes this money and posts it to A’s account. Payments now appear to be up to date on A’s account, but B’s account remains unpaid. When C’s payment is received, the perpetrator applies it to B’s account.
Sheila, an accounts payable supervisor for ABC Company, bought supplies for a company she owns on the side. Sheila entered vouchers in ABC’s accounts payable system for the cost of the supplies so that ABC would pay for the supplies. The supplies were then drop-shipped to a location where Sheila could collect them. What type of occupational fraud is this?
A. An expense reimbursement scheme
B. A pay and return scheme
C. An invoice kickback scheme
D. A personal purchases with company funds scheme
D. A personal purchases with company funds scheme
See pages 1.443-1.444 in the Fraud Examiner’s Manual
Instead of undertaking billing schemes to generate cash, many fraudsters purchase personal items with their company’s money. Company accounts are used to buy items for employees, their businesses, or their families. This type of scheme is classified as a fraudulent billing scheme rather than theft of inventory. The basis of the scheme is not the theft of the items but rather the purchase of them. The perpetrator causes the victim company to purchase something it did not need, so the damage to the company is the money lost in purchasing the item.
When an employee or official uses force or fear to demand money in exchange for making a particular business decision, that individual is engaging in:
A. Bribery
B. An illegal gratuity scheme
C. Economic extortion
D. A kickback scheme
C. Economic extortion
See pages 1.608 in the Fraud Examiner’s Manual
Extortion is defined as the obtaining of property from another, with the other party’s consent induced by wrongful use of actual or threatened force or fear. Economic extortion is present when an employee or official, through the wrongful use of actual or threatened force or fear, demands money or some other consideration to make a particular business decision. Thus, an example of an economic extortion scheme is if an employee or government official demands money in exchange for making a business decision. Similarly, another example of an economic extortion scheme would be if a politician threatens to close a business if it does not pay a bribe.
Most shell company schemes involve the purchase of fictitious:
A. Services
B. Inventory
C. Supplies
D. Goods
A. Services
See pages 1.441 in the Fraud Examiner’s Manual
Most shell company schemes involve the purchase of services rather than goods. The primary reason for this is that services are not tangible. If an employee sets up a shell company to make fictitious sales of goods to their employer, these goods will obviously never arrive. By comparing its purchases to its inventory levels, the victim organization might detect the fraud. It is much more difficult for the victim organization to verify that the services were never rendered. For this reason, many employees involved in shell company schemes bill their employers for “consulting services.”
The asset turnover ratio is used to assess a company’s ability to meet sudden cash requirements.
A. True
B. False
B. False
See pages 1.244, 1.247-1.248 in the Fraud Examiner’s Manual
The asset turnover ratio (net sales divided by average total assets) is used to determine the efficiency with which asset resources are used by the entity. The asset turnover ratio is one of the more reliable indicators of financial statement fraud. A sudden or continuing decrease in this ratio is often associated with improper capitalization of expenses, which increases the denominator without a corresponding increase in the numerator.
The quick ratio is used to assess a company’s ability to meet sudden cash requirements. The quick ratio, commonly referred to as the acid test ratio, compares quick assets (i.e., those that can be immediately liquidated) to current liabilities. It is calculated by dividing the total of cash, securities, and receivables by current liabilities. The quick ratio offers a more conservative view of a company’s liquidity because it excludes inventory and other current assets that are more difficult to turn into cash rapidly.
Which of the following is NOT a type of loan that frequently turns up in corruption cases?
A. A legitimate loan in which a third party makes the loan payments
B. An outright payment falsely described as an innocent loan
C. A legitimate loan made at market rates
D. A legitimate loan made on favorable terms
C. A legitimate loan made at market rates
See pages 1.610 in the Fraud Examiner’s Manual
Corrupt payments often take the form of loans. There are three types of loans often found in corruption cases:
- An outright payment that is falsely described as an innocent loan
- A legitimate loan in which a third party—the corrupt payer—makes or guarantees payments to satisfy the loan
- A legitimate loan made on favorable terms (e.g., an interest-free loan)
A legitimate loan made at market rates would not typically occur in a corruption case because the loan recipient would not be receiving anything unusual or special.
Cash theft schemes fall into which of the following two categories?
A. Skimming and unrecorded sales
B. Unrecorded sales and false discounts
C. Register manipulation and understated sales
D. Skimming and cash larceny
D. Skimming and cash larceny
See pages 1.301 in the Fraud Examiner’s Manual
Cash theft schemes fall into two categories: skimming and cash larceny. The difference between the two types of schemes depends completely on when the cash is stolen. Cash larceny is the theft of money that has already appeared on a victim organization’s books, while skimming is the theft of cash that has not been recorded in the accounting system. The way in which an employee extracts the cash might be exactly the same for a cash larceny or skimming scheme.
Traditionally, there are two methods of percentage analysis of financial statements. They are:
A. Balance sheet and income statement analysis
B. Horizontal and historical analysis
C. Vertical and historical analysis
D. Horizontal and vertical analysis
D. Horizontal and vertical analysis
See pages 1.241 in the Fraud Examiner’s Manual
Traditionally, there are two methods of percentage analysis of financial statements. Vertical analysis is a technique for analyzing the relationships among the items on an income statement, balance sheet, or statement of cash flows during a specific accounting period by expressing components as percentages of a specified base value within the statement being analyzed. Horizontal analysis is a technique for analyzing the percentage change in individual line items on a financial statement from one accounting period to the next. The first period in the analysis is considered the base period, and the changes to subsequent periods are computed as a percentage of the base period.
Jessica worked at the cash register of a department store. Her friend Molly came to the store one day to help Jessica steal a watch she wanted but could not afford. Molly took the watch to Jessica’s register and, instead of charging Molly for it, Jessica performed a No-Sale transaction on the register. Molly pretended to give Jessica cash to make it look like she was paying for the watch. Molly then took the watch out of the store and later gave it to Jessica. What type of scheme did Molly and Jessica commit?
A. A register disbursement scheme
B. A purchasing and receiving scheme
C. A skimming scheme
D. A false sale scheme
D. A false sale scheme
See pages 1.505 in the Fraud Examiner’s Manual
In many cases, corrupt employees use outside accomplices to help steal inventory. The false, or fake, sale is one method that depends upon an accomplice. Like most inventory thefts, the fake sale is not complicated. The employee-fraudster’s accomplice pretends to buy merchandise, but the employee does not record the sale. The accomplice then takes the merchandise without paying for it. To a casual observer, it will appear that the transaction is a normal sale. The employee places the merchandise in a bag and acts as though a transaction is being entered on the register when in actuality the sale is not recorded. The accomplice might even pass a nominal amount of money to the employee to complete the illusion. A related scheme occurs when an employee sells merchandise to an accomplice at an unauthorized discount.
Failing to record bad debt expense for the period will result in overstated accounts receivable.
A. True
B. False
A. True
See pages 1.223-1.224 in the Fraud Examiner’s Manual
Managers can overstate their company’s accounts receivable balance by failing to record bad debt expense. Bad debt expense is recorded to account for any uncollectible accounts receivable. The debit side of the entry increases bad debt expense, and the credit side of the entry increases the allowance (or provision) for doubtful accounts, which is a contra account that is recorded against accounts receivable. Therefore, if the controller fails to record bad debt expense, the allowance (or provision) for doubtful accounts will be understated.
Management has an obligation to disclose all events and transactions in the financial statements that are probable to have a material effect on the entity’s financial position.
A. True
B. False
A. True
See pages 1.232 in the Fraud Examiner’s Manual
Accounting principles require that financial statements include all the information necessary to prevent a reasonably discerning user of the financial statements from being misled. Disclosures only need to include events and transactions that have or are probable to have a material impact on the entity’s financial position.