최신 CFE-Financial-Transactions-and-Fraud-Schemes 무료덤프 - ACFE Certified Fraud Examiner - Financial Transactions and Fraud Schemes
Which of the following is TRUE regarding financial reporting practices and accounting frameworks, such as
U.S. generally accepted accounting principles (GAAP) and International Financial Reporting Standards (IFRS)?
U.S. generally accepted accounting principles (GAAP) and International Financial Reporting Standards (IFRS)?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
Neil, a Certified Fraud Examiner (CFE), discovers that a borrower used the same property as a security, or guarantee, to obtain multiple loans from different financial institutions before they were recorded on his credit report. Which type of loan fraud BEST describes the scheme Neil uncovered?
정답: C
Which of the following is NOT a common channel through which an organization's proprietary information is compromised?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
All of the following measures would help prevent the theft of company inventory EXCEPT:
정답: D
Which of the following statements describes a best practice for preventing contract and procurement fraud?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
All of the following methods would be helpful in detecting a skimming scheme EXCEPT:
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following ratios can be used to assess a company's ability to meet sudden cash requirements?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
When an employee processes a fictitious refund of goods, the victim company's inventory is overstated.
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Sergio receives a fraudulent text message that appears to be from his bank. The message claims that there has been suspicious activity on his account and provides a link for him to click on to sign into the bank's website and obtain more information. Sergio is MOST LIKELY being targeted by which of the following types of social engineering schemes?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which of the following is a recommended activity that organizations should engage in to protect their proprietary information from threats?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)