Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

CFE PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CFE PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: Certified Fraud Examiner
  • Last Update: Sep 14, 2025
  • Questions and Answers: 186
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CFE Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CFE Practice Exam Questions with Answers Certified Fraud Examiner Certification

Question # 6

Conflict of interest cases are more easily prevented than detected.

A.

True

B.

False

Full Access
Question # 7

The most basic skimming scheme occurs when:

A.

An employee sells goods or services to a customer, collects the customer’s payment, but makes no record of the sale.

B.

An employee buy goods or services from a customer, drop the customer’s payment, but makes no record of the purchase.

C.

An employee sells goods or services to a stakeholder, collects the stakeholder’s payment and makes record of the sale too.

D.

An employee buy goods or services from a stakeholder, drop the stakeholder’s payment and makes record of the purchase too.

Full Access
Question # 8

Bank cut-off statements should be requested for 10-15 days after the closing date of the balance sheet.

A.

True

B.

False

Full Access
Question # 9

A typical issue involving material and fraud would be:

A.

Fraudulent statement

B.

Misappropriations

C.

Civil lawsuit

D.

Quality control

Full Access
Question # 10

Which of the following is NOT the aspect of inventory purchase?

A.

Inventory purchases purposely increase in year 1 only to be liquidated in year 2.

B.

inventory for the year 2 will be much greater than year 1.

C.

Increase sales in year 2 are unexpected and purchase of inventory does not keep pace with the sales.

D.

might be some fraud scheme in inventory.

Full Access
Question # 11

Which of the following can constitute a bribe, even if the illicit payment is never actually made?

A.

Offering a payment

B.

Corruption in payment

C.

kickback payment

D.

Overbilling in payment

Full Access
Question # 12

Bid-rigging scheme occurs when:

A.

an employee fraudulently assists a vendor in winning a contract through the competitive bidding process.

B.

an employee does not assist a vendor in winning a contract through the competitive bidding process.

C.

an employee once assists a vendor in winning a contract through a single competitive bidding process.

D.

an employee once assists a vendor in winning a contract through a single competitive bidding process.

Full Access
Question # 13

Organizations that had external audits actually had higher median losses and longer lasting fraud schemes than those organizations that were not audited.

A.

True

B.

False

Full Access
Question # 14

Physical tampering prevention is a check tampering technique that is used to secure bankassisted controls.

A.

True

B.

False

Full Access
Question # 15

________, one of the Fraud synonyms implies that deceiving so thoroughly as to obscure the truth:

A.

Deceive

B.

Delude

C.

Mislead

D.

Beguile

Full Access
Question # 16

Which are check tempering frauds in which an employee prepares a fraudulent check and submits it usually along with legitimate checks to an authorized maker who signs it without a proper review?

A.

Endorse check scheme

B.

Legitimate check scheme

C.

Payable check scheme

D.

Concealed check scheme

Full Access
Question # 17

In Fraud scale pressure, opportunity and integrity variables all results in a list of ___ possible red flags or indicators of occupational fraud and abuse.

A.

81

B.

82

C.

83

D.

84

Full Access
Question # 18

Which of the following is NOT the reason why senior management will overstate business statement?

A.

Comply with debit covenants

B.

Meet personal performance criteria

C.

Trigger performance related compensation

D.

Show a pattern of growth to support sale of a business

Full Access
Question # 19

Larceny by Fraud or deception means that:

A.

Creates or reinforce a false impression

B.

Fails to correct a false impression

C.

Fails to disclose a known lien, adverse claim or other legal impediment

D.

All of the above

Full Access
Question # 20

Which of the following is true for Red flags associated with fictitious revenues?

A.

Slow growth or usual profitability, when not compared to other companies in the same industry.

B.

Usual growth in the number of days purchase in receivables

C.

A significant volume of sales to entries whose substance and ownership is not known.

D.

A usual surge in purchase by a majority of units within a company, or of purchase recorded by corporate headquarters.

Full Access
Question # 21

Which of the following is the criterion for bid solicitation?

A.

Containing false statements

B.

Allowing the purchaser to discuss possible employment with the contractor

C.

To withdraw low bids

D.

To falsify the bid log

Full Access
Question # 22

Which of the following is NOT standard of generally accepted accounting principles?

A.

Conservatism

B.

Cost

C.

Full disclosure

D.

Quality control

Full Access
Question # 23

In ____________ scheme, a supplier pays an employee of the purchasing company to write specifications that will require amendments at a later date.

A.

Deliberate writing of vague specifications

B.

Need recognition

C.

False specification

D.

Bid-splitting

Full Access
Question # 24

Which of the following is not the skimming scheme?

A.

Unrecorded sales

B.

Fraud & Cost

C.

Theft of checks through the mail

D.

Understand sales and receivables

Full Access
Question # 25

Collusion or bid-rigging between bidders is called

A.

Bribery receipt

B.

Bid solicitation

C.

To withdraw low bids

D.

Contract acceptance

Full Access
Question # 26

The forms that allow noncash assets to be moved from one location in a company to another can be used to facilitate the misappropriation of those assets are called:

A.

Inventory usages

B.

Fake sales

C.

Asset requisition

D.

All of the above

Full Access
Question # 27

Any expenses that are incurred but not paid by the end of the year are counted in our records of profit and loss, are called:

A.

Accruals

B.

Depreciations

C.

Expenses

D.

Financial record

Full Access
Question # 28

______________ can be detected by closely examining the documentation submitted with the cash receipts.

A.

Voided purchases

B.

Fictitious refunds

C.

Approved transaction

D.

None of the above

Full Access
Question # 29

The most common method of detection in corruption cases is:

A.

Internal audits

B.

Internal controls

C.

Tips

D.

By accident

Full Access
Question # 30

According to a survey, in principal perpetrator, males in a majority of cases, accounting for ___ percent of frauds versus ___ percent in which a female was the primary culprit.

A.

62 versus 36

B.

61 versus 39

C.

62 versus 37

D.

None of the above

Full Access
Question # 31

One of the simplest ways to justify unacceptable conduct and avoid guilt feelings is to invent a good reason for ________.

Full Access
Question # 32

The essential elements of a ________ are an actual or constructive taking away of the goods or property of another with the without the consent and against the will of the owner and with a felonious intent.

A.

Larceny

B.

Abuse

C.

Fiduciary

D.

None of the above

Full Access
Question # 33

A shell company scheme in which actual goods or services are sold to the victim company is known as:

A.

Maintenance scheme

B.

Allocation scheme

C.

Distribution scheme

D.

Pass-through scheme

Full Access
Question # 34

The most common method for billing scheme is:

A.

Register

B.

Tips

C.

Accident

D.

None of the above

Full Access
Question # 35

Bank cut-off statements should be requested for 10-15 days after the closing date of the balance sheet.

A.

True

B.

False

Full Access
Question # 36

Most of the shell company schemes involve the purchase of goods rather than services.

A.

True

B.

False

Full Access
Question # 37

____________ corrupt employees can cause inventory to be fraudulently delivered to themselves or accomplices.

A.

False shipping slip

B.

False packing slip

C.

Fraudulent inventory slip

D.

False credit slip

Full Access
Question # 38

By what accountant means that the financial figures presented by the company are at least as much as reflected in the statements, if not more.

A.

Fraudulent statement

B.

Misappropriations

C.

Conservatism

D.

Matching

Full Access
Question # 39

False billing scheme states that:

A.

employees do not cause their company to purchase merchandise that the company does not need.

B.

employees cause their company to sale merchandise that the company does not need.

C.

employees do not cause their company to sale merchandise that the company does not need.

D.

employees cause their company to purchase merchandise that the company does not need

Full Access
Question # 40

Which of the following is NOT the method for stealing inventory and other assets?

A.

Larceny schemes

B.

Asset requisition and transfer

C.

Purchasing and receiving schemes

D.

Sales & Equipment handling

Full Access
Question # 41

__________ may be defined as the offering, giving, receiving or soliciting anything of value to influence an official act.

A.

Corruption

B.

Diverting business to vendors

C.

Bribery

D.

Lacking approval authority

Full Access
Question # 42

When a victim company purchases unnecessary goods or services from a supplier at the direction of the corrupt employee, this results in:

A.

Presolicitation scheme

B.

Need recognition scheme

C.

False sole-source scheme

D.

Submission scheme

Full Access
Question # 43

A fabricated name and the post office box that an employee uses to collect disbursements from false billings is called:

A.

Accomplice residence

B.

Shell company

C.

Perpetrator check

D.

Cash generator

Full Access
Question # 44

Theft of incoming checks usually occurs when ________ is (are) in charge of opening the mail and recording the receipt of payments.

A.

Single employee

B.

Two employees

C.

More then two employees

D.

None of the above

Full Access
Question # 45

In ___________ scheme, an employee creates false vouchers or submits false invoices to the employer.

A.

Sale requisition

B.

Purchase requisition

C.

Voucher handling

D.

Cash generating

Full Access
Question # 46

The behavior profile of employees who are involved in bribery schemes may include:

A.

Gambling habit

B.

Extravagant lifestyle

C.

Drug and/or alcohol addiction

D.

All of the above

Full Access
Question # 47

A voucher is:

A.

a file that includes the purchase order that was send to the vendor, the vendor invoice listing the cost and quantity of items purchased, and the internal receiving reports that verify the purchased items have been delivered.

B.

a figure that includes the sale order that was send to the dealer, the vendor invoice listing the cost and quantity of items sold, and the internal receiving reports that verify the purchased items have been delivered.

C.

a report that includes the purchase order that was send to the vendor, the vendor invoice listing the quality and quantity of items purchased, and the external receiving reports that verify the items have been sold.

D.

a mammogram that includes the purchase order that was send to the purchaser, the purchaser invoice listing the benefits and quantity of items purchased, and the internal receiving reports that verify the purchased items have been sold.

Full Access
Question # 48

Revenue is recognized when it is:

A.

Realized and Earned

B.

Fictitious and Earned

C.

Realized and Evidenced

D.

All of the above

Full Access
Question # 49

Multiple cashiers operate from a single cash drawer without separate access codes is a red flag for:

A.

Fraudulent scheme

B.

Disbursement scheme

C.

Register scheme

D.

Force inventory scheme

Full Access
Question # 50

In physical tampering prevention technique, hidden images can be seen only when the check is held at an angle through:

A.

High-resolution sprays

B.

Holographic safety inks

C.

Watermark backers

D.

Chrome coloring

Full Access
Question # 51

Verify supporting documentation on outstanding checks written for a material amount is a test used to conduct for:

A.

Check disbursement

B.

Bank confirmation

C.

Bank confirmation

D.

Cut-off statements

Full Access
Question # 52

_________ revenues involve the recording sales of goods or services hat did not occur.

A.

Fictitious or fabricated revenues

B.

Financial revenues

C.

Red flag revenues

D.

Concealed revenues

Full Access
Question # 53

According to accounting principles, ________ and ________ should be recorded or atched in the same accounting period; failing to do so violates the matching principle of AAP.

A.

Revenue and corresponding expenses

B.

Revenue and Income statement

C.

Income statement and Long-term contracts

D.

Capitalized expenses and Liabilities

Full Access
Question # 54

When employees avoid detection in a refund scheme to keep the sizes of the disbursement low, is referred to:

A.

Small disbursements

B.

Very small disbursements

C.

Simple disbursements

D.

None of the above

Full Access
Question # 55

Verify supporting documentation on outstanding checks written for a material amount is a test used to conduct for:

A.

Check disbursement

B.

Bank confirmation

C.

Bank confirmation

D.

Cut-off statements

Full Access