New Semester
Started
Get
50% OFF
Study Help!
--h --m --s
Claim Now
Question Answers
Textbooks
Find textbooks, questions and answers
Oops, something went wrong!
Change your search query and then try again
S
Books
FREE
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Tutors
Online Tutors
Find a Tutor
Hire a Tutor
Become a Tutor
AI Tutor
AI Study Planner
NEW
Sell Books
Search
Search
Sign In
Register
study help
business
fraud examination
Fraud examination 4th edition Steve Albrecht, Chad Albrecht, Conan Albrecht, Mark zimbelma - Solutions
The person appointed by a bankruptcy judge in a Chapter 11 proceeding who investigates allegations of fraud or misconduct by the debtor or its principals is a(n):a. Creditor.b. Adjuster.c. Auditor.d. Examiner.
Which of the following investigative methods would most likely be used more in divorce cases than in bankruptcy cases?a. Surveillance.b. Public records searches.c. Subpoena of private records.d. Interviews.
Which of the following is the major reason why there is so much divorce fraud?a. Assets are being taken away from one divorce partner and given to another.b. Divorce proceedings usually take a long time.c. States make divorces very difficult.d. Children usually get most assets in divorce cases.
Which of the following is the least likely symptom of a bust-out?a. Company’s only listed address is a post office box.b. Dramatic increase in size of credit orders.c. Public notice of change in management.d. Sudden decrease in inventory.
Which of the following is not a characteristic of an affidavit of proposed investigator?a. Content and extent of detail required do not vary by jurisdiction.b. Is prepared when a fraud investigator is retained.c. Legal document is sworn under oath and must be notarized.d. Addressed to the court and
Bankruptcy courts do not have which of the following responsibilities?a. Appointing trustees, examiners, and committees.b. Supervising bankruptcy petitions.c. Approving reorganization plans.d. Conducting hearings and trials to resolve disputes.
Which of the following describes a Chapter 13 bankruptcy?a. All assets are liquidated and used to pay creditors.b. Reorganizations can be used by individuals with debts less than $1 million.c. The entity is given time to reorganize its financial affairs, settle debts, and continue operations.d.
Which of the following is not a type of tax fraud?a. Using a false SSN.b. Overstating income.c. Keeping two sets of financial books.d. Claiming a dependent when you do not have one.
To work as an entry-level CI special agent, you must be at least 29 years of age. (True/False)
Tax fraud can be committed against state, federal, or local governments. (True/False)
The U.S. Department of Treasury is a branch of the IRS. (True/False)
Americans should pay the least amount of taxes they legally owe. (True/False)
The U.S. tax system is based on voluntary compliance. (True/False)
The IRS can add a 20 percent penalty to your tax bill for a careless mistake and a 75 percent penalty for tax fraud. (True/False)
A “planned bankruptcy” is usually referred to as a bust-out. (True/False)
The retention of a fraud investigator in a bankruptcy case must always be approved by the bankruptcy court’s judge. (True/False)
The purpose of civil laws is to “right a wrong” or send someone to jail or have them pay fines, whereas the purpose of criminal laws is to seek monetary remedies or recover stolen funds. (True/False)
Most divorce-related fraud cases are civil rather than criminal. (True/False)
A debtor is the person or entity who is subject to a bankruptcy filing. (True/False)
Chapter 11 bankruptcies represent complete liquidation or shutting down of a business. (True/False)
Debtors in bankruptcy cases have the power to sue investigators over false accusations. (True/False)
Concealment of assets typically occurs on a larger scale for individuals filing for bankruptcy protection than it does for businesses filing for protection. (True/False)
Bust-out schemes usually involve the concealment of assets, sales proceeds, and inventory. (True/False)
Fraudulent transfers can occur up to two years before the debtor files for bankruptcy. (True/False)
A person acting as an officer in a bankruptcy case is prohibited from purchasing any property of the debtor’s estate. (True/False)
Civil bankruptcy cases are usually investigated by the FBI and other law enforcement agencies. (True/False)
In 2003, the FTC conducted a survey on the frequency and types of identity thefts perpetrated in the United States. The survey’s results are available online at https://www.ftc.gov/reports/federal-trade-commission-identity-theft-programFrom each of the six main sections in the report, choose and
Those most susceptible to consumer fraud are often:a. Uneducated or elderly.b. Wealthy and prominent.c. Troubled with credit card debt.d. Lonely and depressed.
What is one way to determine if a Web site is secure or not?a. Look for the official logo of the company you want to deal with.b. Look for an “s” after the “http” in the URL of the Web site.c. Click on a link to see if it works.d. Call the FTC and ask about the ISP address of the Web site.
Which of the following institutions would not be very helpful to call in the event of identity theft?a. IRS.b. Social Security Administration.c. Local chamber of commerce.d. A credit reporting agency.
Which of the following is not listed in the chapter as a common characteristic of Nigerian scam letters?a. The promise of money to lure victims.b. Urgency to invest quickly.c. Picture of perpetrator to assure victims.d. Strong ties to high-ranking foreign officials to lure victims.
Which federal statute requires that credit reports can only be obtained for legitimate business needs?a. Title 15 U.S. Code § 1692.b. Final Rule—45 CFT Parts 160 and 165.c. Title 15 U.S. Code, Chapter 41.d. Title 15 U.S. Code § 1681.
What does “https” stand for?a. Hypertext transfer protocol (secure).b. Hypertext transfer point (site).c. Hypertext transfer protocol (system).d. Hypertext transfer protocol (sign).
What is the best defense against consumer fraud?a. Signing up with the national do not call registry.b. Purchasing credit card insurance.c. Educating yourself about credit card risks.d. Calling the Federal Trade Commission (FTC).
Consumers should provide credit card numbers or bank account information over the telephone only when:a. They initiated the call and are purchasing a legitimate product.b. They are asked to give the information.c. The entity receiving this information is a legitimate company.d. They feel confident
The major reason that elderly people are so susceptible to telemarketing fraud is that they:a. Are often financially in need.b. Have an excess amount of cash to invest.c. Are often lonely and enjoy talking to friendly callers.d. Are none of the above.
Which of the following is a common characteristic of fraudulent money offer letters?a. The letter will ask for help, convincing the victim that assistance is desperately needed.b. Through the letter, the perpetrator will try to build a relationship of trust with the victim.c. The letter promises
If you become a victim of identity theft, you should first:a. Wait to see where the perpetrator is spending your money; then, using this information, plan an investigation with the local FBI organization.b. Contact friends and neighbors to inquire if they have any useful information about the
The Gramm-Leach-Bliley Act gives you the right to:a. Periodically change your Social Security number to avoid identity theft.b. Receive a yearly stipend to cover the losses incurred as a victim of identity fraud.c. Claim your high credit report although an identity fraudster has damaged it
In order to protect yourself from identity theft, you should:a. Only give out your when purchasing a product online or over the telephone.b. Always shred receipts, credit card offers, doctor’s bills, insurance information, or any other documents that contain sensitive personal information.c.
Multilevel marketing companies:a. Are illegal.b. Increase their distribution process by recruiting additional company sales representatives.c. Can legally pay commission to representatives for simply signing up new recruits.d. Require little time and effort to be successful.
Phishing is the method of:a. Using e-mail or other Internet applications to deceive people into disclosing valuable personal information.b. Convincing a person to divulge personal information over the telephone.c. Hacking into another’s computer files to access personal information.d. Hiring a
Since a Social Security card does not contain your photo, it is impossible to have your identity stolen by merely losing your Social Security card. (True/False)
A discarded tax return has enough information to steal someone’s identity. (True/False)
Because it is impossible to “market” at an assortment of levels, every multilevel marketing scheme is fraudulent. (True/False)
Only stupid people who are not careful are victims of consumer fraud. (True/False)
Consumer fraud only affects those who often use credit cards online. (True/False)
Congress outlawed pyramid organizations in the United States in 1934. (True/False)
Pyramid organizations eventually fail, causing all but a few investors to lose their investments. (True/False)
The National Processing Company was given authority by the FTC to pre-register consumers for the do not call registry. (True/False)
Once an identity theft victim has reported a fraud to the FTC, the FTC will help a victim contact the FBI, Secret Service, and local police to coordinate an investigation. (True/False)
By federal law, no organization or company can sell individuals’ personal information without their express written consent. (True/False)
The larger the amount requested by a fraudulent telemarketer, the easier it is for him or her to deceive victims. (True/False)
Elderly people are more susceptible to chain letter scams than any other type of fraud. (True/False)
Illegal multilevel marketing companies almost always focus their efforts on the recruiting of new members rather than on the selling of legitimate products. (True/False)
A fraud scam in which the perpetrator, falsely claiming to represent a foreign bank, tries to get victims to invest in nonexistent foreign venture capital companies for high returns is called a clearinghouse scam. (True/False)
The Gramm-Leach-Bliley Act states that it is illegal for organizations to share your personal information with any other party or individual. (True/False)
Keeping your wallet in your front pocket will help prevent it from being lost or stolen. (True/False)
The best way to prevent a fraudster from establishing a preapproved credit card in your name is to destroy all credit card applications as soon as you receive them. (True/False)
Identity theft can result in an individual’s loss of credit. (True/False)
One key element of skimming is that cash is taken:a. Directly from the cash register.b. When no one is watching.c. By someone who does not ordinarily have cash-handling responsibilities.d. Prior to its entry into an accounting system.
“Putting someone on the payroll who does not actually work for the victim company” is an example of a(n):a. Expense scheme.b. Payroll scheme.c. Register disbursement scheme.d. Commission scheme.
Which of the following is not one of the ACFE’s types of fraudulent disbursement?a. Check-tampering schemes.b. Skimming disbursement schemes.c. Expense schemes.d. Register disbursement schemes.
Which of the following is not true of billing schemes?a. The perpetrator takes physical possession of his or her employer’s cash.b. The perpetrator often sets up a “dummy” company.c. It is one of the most commonly committed disbursement schemes.d. It usually involves dealing with the victim
Which of the following is not considered a misappropriation of assets?a. Payroll disbursement schemes.b. Kickbacks.c. Expense schemes.d. Skimming.
Which of the following results in the highest loss per case?a. Expense tampering.b. Payroll schemes.c. Register disbursement schemes.d. Billing schemes.
Which of the following types of disbursement fraud occurs least frequently?a. Expense tampering.b. Payroll schemes.c. Register disbursement schemes.d. Billing schemes.
Which of the following is a major difference between larceny and skimming?a. Larceny is committed before the cash is entered into the accounting system, while skimming is committed after the cash is entered into the system.b. Larceny is committed after the cash is entered into the accounting
The most affected party in a workers’ compensation fraud case is which of the following?a. Employer.b. Employer’s insurance carrier.c. Other employees.d. Government.
Which of the following is not one of the most common billing schemes?a. Setting up dummy companies to submit invoices to the victim organization.b. Changing the quantity or price on an invoice to favor a customer.c. Altering or double-paying nonaccomplice vendor’s statements.d. Making personal
Out of all the types of frauds discussed in this chapter, which type is perpetrated least often?a. Skimming schemes.b. Larceny.c. Check schemes.d. Payroll.
What are the three major classes of asset misappropriation?a. Stealing receipts, purchasing fraud, and disbursement fraud.b. Stealing receipts, stealing money as it comes into a company, and purchasing fraud.c. Stealing receipts, disbursement fraud, and stealing assets on hand.d. Stealing receipts,
Most frauds against organizations are perpetrated by:a. Employees.b. Owners.c. Vendors.d. A collusion of two of the above.
The false refund fraud scheme involves any refund given in cash for an item that was originally stolen from the store. (True/False)
Bid rigging involves establishing a predetermined amount of money that bidders will have to exceed in order to win a bid. (True/False)
Of all the different kinds of corruption, bribery schemes have the greatest median loss of fraud schemes committed against an organization. (True/False)
Illegal gratuities are made before deals are approved but after payment has been accepted. (True/False)
Compared to bribery and conflicts of interest, economic extortion fraud schemes occur relatively infrequently. (True/False)
Kickbacks are undisclosed payments made by employees of purchasing companies to vendors. (True/False)
Identity theft is the largest type of consumer fraud. (True/False)
Corruption is divided into four fraud scheme types: (1) bribery, (2) conflict of interest, (3) economic extortion, and (4) illegal services. (True/False)
Ghost employee schemes usually generate the largest losses among the payroll disbursement fraud schemes. (True/False)
The two basic fraudulent register disbursement schemes are false refunds and false voids. (True/False)
Understating sales and stealing cash are examples of skimming. (True/False)
Larceny is the stealing of cash by employees before the cash has been recorded in the company’s accounting system. (True/False)
Asset misappropriations are divided into two categories: theft of cash and theft of inventory. (True/False)
Failure to account for missing inventory that was supposed to have been returned is a problem found in voided sales frauds. (True/False)
Commercial bribery is different from traditional bribery in that the offer made in commercial bribery is to influence an official act of government and traditional briberies never involve government officials. (True/False)
Bribery is one of the four types of corruption. (True/False)
Kickback schemes always involve the purchasing function of the victim company. (True/False)
Billing schemes have by far the highest median costs per incident of all frauds. (True/False)
Skimming schemes are far less common than larceny schemes. (True/False)
Larceny, skimming, and misuse are all subdivisions of theft of cash. (True/False)
Statistics show that fraud losses are directly proportional to age and inversely proportional to education. (True/False)
Employee frauds constitute a greater percentage of all frauds and have greater median losses than do management and owner frauds combined. (True/False)
At the present time, approximately 25,000 members make up the Association of Certified Fraud Examiners. (True/False)
The following discussion is found in the U.S. Bankruptcy Report on Lehman Bros. Holdings dated March 22, 2010:Lehman employed off-balance sheet devices, known within Lehman as "Repo 105" and "Repo 108" transactions, to temporarily remove securities inventory from its balance sheet, usually for a
Which of the following is a good place to look for inadequate disclosures?a. Board of directors’ minutes.b. Correspondence and invoices from attorneys.c. Confirmations with banks and others.d. Loan agreements.e. All of the above are good places to look for inadequate disclosure.
When looking for accounting or documentary symptoms of fraud when a merger occurs, one of the first steps should be to:a. Make sure that the purchasing company got a fair deal.b. Make sure that the selling company properly disclosed its financial troubles.c. Make sure that both the buyer and the
Which of the following is not a way to underrecord liabilities?a. Borrowing but not disclosing debt incurred on existing lines of credit.b. Claiming that existing debt has been forgiven by creditors.c. Not recording loans incurred.d. All of the above are ways to underrecord liabilities.
Showing 8100 - 8200
of 8740
First
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
Step by Step Answers