Occupational Fraud Schemes Flashcards
(139 cards)
Which of the following is a typical method used to make corrupt payments in corruption schemes?
A. Gifts, travel, and entertainment
B. Payment toward credit card debt
C. Checks and other financial instruments
D. All of the above
D. All of the above
See pages 1.609-1.610 in the Fraud Examiner’s Manual
Often, corruption schemes involve corrupt payments—items of value paid to procure a benefit contrary to the rights of others. There are various ways to make corrupt payments, and many do not involve money. Any tangible benefit given or received with the intent to corruptly influence the recipient can be an illegal payment, and traditional methods of making corrupt payments include:
- Gifts, travel, and entertainment
- Cash payments
- Checks and other financial instruments
- Hidden interests
- Loans
- Credit cards
- Transfers not at fair market value
- Promises of favorable treatment
The accounts receivable clerk should be responsible for preparing the bank deposit.
A. True
B. False
B. False
See pages 1.330 in the Fraud Examiner’s Manual
The bank deposit should be made by someone other than the cashier or the accounts receivable clerk. A person independent of the cash receipts and accounts receivable functions should compare entries to the cash receipts journal with:
- Authenticated bank deposit slips
- The deposit per the bank statements
There is nothing inherently wrong with a company engaging in related-party transactions if the transactions are fully disclosed.
A. True
B. False
A. True
See pages 1.233-1.234 in the Fraud Examiner’s Manual
There is nothing inherently wrong with related-party transactions if they are fully disclosed. If the transactions are not fully disclosed, the company might injure its shareholders by engaging in economically harmful dealings without their knowledge.
What financial statement fraud scheme involves recording revenues and expenses in improper periods?
A. Concealed expenses
B. Improper disclosures
C. Timing differences
D. Improper asset valuations
C. Timing differences
See pages 1.215 in the Fraud Examiner’s Manual
Financial statement fraud often involves timing differences—that is, the recording of revenues or expenses in improper periods. This can be done to move revenues or expenses between one period and the next, increasing or decreasing earnings as desired. This practice is also referred to as income smoothing.
Off-book sales of goods ALWAYS cause shrinkage.
A. True
B. False
A. True
See pages 1.316 in the Fraud Examiner’s Manual
Off-book sales of goods, otherwise known as skimming, will always leave an inventory shortage and a corresponding rise in the cost of goods sold. When a sale of goods is made, the physical inventory is reduced by the amount of merchandise sold. For instance, when a retailer sells a pair of shoes, there is one less pair of shoes in the stockroom. However, if a fraudster hands over the pair of shoes to a paying customer and keeps their cash without recording the sale, then the inventory balance on the company’s books will be higher than the physical inventory on hand. Thus, there is one less pair of shoes available than the records indicate. Such a reduction in the physical inventory without a corresponding reduction in the perpetual inventory is known as shrinkage.
Which of the following is NOT one of the three common methods for concealing liabilities and expenses on a company’s financial statements?
A. Failing to disclose warranty costs and product-return liabilities
B. Channel stuffing
C. Capitalizing expenses
D. Omitting liabilities/expenses
B. Channel stuffing
See pages 1.227 in the Fraud Examiner’s Manual
There are three common methods for concealing liabilities and expenses:
- Omitting liabilities and/or expenses
- Improperly capitalizing costs rather than expensing them
- Failing to disclose warranty costs and product-return liabilities
Which of the following scenarios BEST describes a mischaracterized reimbursement expense scheme?
A. An employee alters a receipt to show a higher cost than what the employee paid and submits it for reimbursement.
B. An employee produces a fictitious receipt and includes it with an expense report.
C. An employee submits a receipt for an item in one expense report and an email confirmation for the same item in the next period’s expense report.
D. An employee who travels frequently for business submits receipts from a hotel stay during a family vacation as a business expense.
D. An employee who travels frequently for business submits receipts from a hotel stay during a family vacation as a business expense.
See pages 1.473, 1.475, 1.478, 1.481 in the Fraud Examiner’s Manual
One of the most basic expense reimbursement schemes is perpetrated by requesting reimbursement for a personal expense, claiming that it is business related. Examples of mischaracterized expenses include claiming personal travel as a business trip or listing dinner with a friend as “business development” or “client entertainment.” Employees might submit the receipts from their personal expenses along with their expense reports and invent business reasons for the incurred costs.
Instead of seeking reimbursement for personal expenses, some employees overstate the cost of actual business expenses. This is considered an overstated expense reimbursement scheme.
In a fictitious expense reimbursement scheme, an employee seeks reimbursement for fictitious expenses. Instead of overstating a real business expense or seeking reimbursement for a personal expense, an employee invents an expense by producing a fictitious receipt to request reimbursement.
In a multiple reimbursement scheme, an employee submits several types of support for the same expense to get reimbursed multiple times.
The motivation for financial statement fraud almost always involves personal gain.
A. True
B. False
B. False
See pages 1.204-1.205 in the Fraud Examiner’s Manual
Unlike some other types of fraud (such as embezzlement), the motivation for financial statement fraud does not always involve personal gain. Most commonly, financial statement fraud is used to make a company’s earnings appear better than they are. Financial statement fraud occurs through a variety of methods, such as valuation judgments and manipulating the timing of transaction recording. These more subtle types of fraud are often dismissed as either mistakes or errors in judgment and estimation. Some of the more common reasons why people commit financial statement fraud include:
- To encourage investment through the sale of stock
- To demonstrate increased earnings per share or partnership profits interest, thus allowing increased dividend/distribution payouts
- To cover inability to generate cash flow
- To avoid negative market perceptions
- To obtain financing or to obtain more favorable terms on existing financing
- To receive higher purchase prices for acquisitions
- To demonstrate compliance with financing covenants
- To meet company goals and objectives
- To receive performance-related bonuses
Which of the following statements is TRUE regarding a fictitious revenue scheme?
A. The debit side of a fictitious sales entry usually goes to accounts payable.
B. Uncollected accounts receivable are a red flag of fictitious revenue schemes.
C. Fictitious revenues must involve sales to a fake customer.
D. If a fictitious revenue scheme has taken place, there will typically be no accounts receivable on the books.
B. Uncollected accounts receivable are a red flag of fictitious revenue schemes.
See pages 1.212 in the Fraud Examiner’s Manual
Fictitious or fabricated revenues involve the recording of sales of goods or services that did not occur. Fictitious sales most often involve fake customers but can also involve legitimate customers. At the end of the accounting period, the sale will be reversed (as will all revenue accounts), which will help to conceal the fraud.
Recording the sales revenue is easy, but the challenge for the fraudster is how to balance the other side of the entry. A credit to revenue increases the revenue account, but the corresponding debit in a legitimate sales transaction typically either goes to cash or accounts receivable. Because no cash is received in a fictitious revenue scheme, increasing accounts receivable is the easiest way to get away with completing the entry. Unlike revenue accounts, however, accounts receivable are not reversed at the end of the accounting period. They stay on the books as an asset until collected. If the outstanding accounts are never collected, they will eventually need to be written off as bad debt expense. Mysterious accounts receivable on the books that are long overdue are a common sign of a fictitious revenue scheme.
Which of the following is an example of a fictitious expense reimbursement scheme?
A. An employee alters an electronic receipt using photo-editing software to show a higher cost than what the employee paid.
B. An employee who travels frequently for business submits receipts from a hotel stay during a family vacation as a business expense.
C. An employee submits a receipt for a hotel reservation in one expense report and a copy of the credit card statement showing the same reservation in the next period’s expense report.
D. An employee generates a fake receipt using basic computer software and includes it with an expense report.
D. An employee generates a fake receipt using basic computer software and includes it with an expense report.
See pages 1.473, 1.475, 1.478, 1.481 in the Fraud Examiner’s Manual
Expense reimbursements are sometimes sought by employees for fictitious items. Instead of overstating a real business expense or seeking reimbursement for a personal expense, an employee invents a purchase to request reimbursement. One way to generate a reimbursement for a fictitious expense is to create fraudulent support documents, such as false receipts. Using basic computer software, it is easy for employees to create realistic-looking counterfeit receipts. These counterfeits are often very sophisticated, even including logos of the stores in which the goods or services were allegedly purchased.
Instead of seeking reimbursement for personal expenses, some employees overstate the cost of actual business expenses. This is considered an overstated expense reimbursement scheme.
In a multiple reimbursement scheme, an employee submits several types of support for the same expense to get reimbursed multiple times.
In a mischaracterized expense scheme, an employee requests reimbursement for a personal expense, claiming that it is business related.
Which of the following statements is TRUE?
A. Cash larceny schemes are generally more difficult to detect than skimming schemes.
B. Skimming schemes are generally more difficult to detect than cash larceny schemes.
C. Both cash larceny and skimming are equally difficult to detect.
D. Cash distraction is the most difficult type of cash receipts scheme to detect.
B. Skimming schemes are generally more difficult to detect than cash larceny schemes.
See pages 1.301, 1.320 in the Fraud Examiner’s Manual
Skimming is the removal of cash from a victim entity prior to its entry in an accounting system, meaning cash is stolen before it is recorded in the victim organization’s accounts. This aspect of skimming schemes means that there is no direct audit trail. Because the stolen funds are never recorded, the victim organization might not be aware that the cash was ever received. Consequently, it can be difficult to detect that the cash has been stolen. Cash larceny schemes involve the theft of money that has already appeared on a victim company’s books. Accordingly, cash larceny schemes are easier to detect than skimming schemes because they leave an audit trail.
Cash distraction is not a recognized type of cash receipts scheme.
A recommended practice to detect expense reimbursement schemes is to compare current period expenses to both historical expenditure amounts and budgeted expense amounts.
A. True
B. False
A. True
See pages 1.481 in the Fraud Examiner’s Manual
Generally, expense account review uses one of two methods: historical comparisons or comparisons with budgeted amounts. A historical comparison compares the balance expended this period in relation to the balance spent in prior, similar periods.
Budgets are estimates of the money or time necessary to complete a task. They are based on experience with consideration for current and future business conditions. Therefore, when comparing actual and budgeted expenses, determining excessive expenses or inaccurate budget estimates is important.
Which of the following is TRUE regarding an overstated refund scheme?
A. It is based on an entirely fictitious refund transaction.
B. It requires collusion between the customer and the employee.
C. The company’s inventory balance on the books will be understated.
D. An employee overstates the amount of a legitimate refund and keeps the excess cash.
D. An employee overstates the amount of a legitimate refund and keeps the excess cash.
See pages 1.403 in the Fraud Examiner’s Manual
Rather than create an entirely fictitious refund, some employees merely overstate the amount of a legitimate refund and steal the excess money. For example, if a customer returns $100 worth of merchandise, the employee might record a $200 return. The employee gives the customer $100 in return for the merchandise and then keeps the remaining $100. The customer might or might not be aware of the scheme taking place. This will result in shrinkage of $100 worth of inventory. In other words, the inventory balance on the books will be overstated by the amount of the excess refund.
To understate net income and lower income tax liability, an accountant could fraudulently expense costs rather than properly capitalizing them to an asset account.
A. True
B. False
A. True
See pages 1.227, 1.231 in the Fraud Examiner’s Manual
Typically, a fraudster’s goal when committing a financial statement fraud scheme is to make the entity look stronger and more profitable. This goal is often achieved by concealing liabilities and/or expenses. To do this, the fraudster might fraudulently understate liabilities or improperly capitalize a cost that should be expensed.
Just as capitalizing expenditures that should be expensed is improper, so is expensing costs that should be capitalized. The organization might do this to minimize its net income due to tax considerations. Expensing an item that should be depreciated over a period of time would help accomplish that—net income is lower and so are taxes.
Belinda used her company credit card to pay for a business dinner at which she was entertaining a client, knowing Belinda’s employer would pay the credit card bill. Belinda saved the receipt and later filed an expense report seeking reimbursement for the cost of the meal, attaching the receipt as support. This is an example of what kind of fraud?
A. Personal purchases with company funds
B. Mischaracterized expense scheme
C. Multiple reimbursement scheme
D. False billing scheme
C. Multiple reimbursement scheme
See pages 1.481 in the Fraud Examiner’s Manual
A multiple expense reimbursement scheme involves the submission of a single expense several times to receive multiple reimbursements. The most frequent example of such a scheme is the submission of several types of support for the same expense. However, rather than file two expense reports, employees might also charge an item to the company credit card, save the receipt, and attach it to an expense report as if they paid for the item themselves. The victim company therefore ends up paying twice for the same expense.
Zach was booking travel arrangements for a business trip. He purchased an airline ticket online using his own funds and obtained a receipt for the ticket via email. Using photo-editing software, Zach increased the ticket price on the electronic receipt and submitted the altered receipt to his employer for reimbursement. This is an example of what type of fraud scheme?
A. Mischaracterized expense scheme
B. Multiple reimbursement scheme
C. Overstated expense scheme
D. Personal purchases with company funds
C. Overstated expense scheme
See pages 1.475-1.477 in the Fraud Examiner’s Manual
Instead of seeking reimbursement for personal expenses, some employees overstate the cost of actual business expenses. The most fundamental example of an overstated expense reimbursement scheme occurs when an employee alters a receipt or other supporting documentation to show a higher cost than what the employee paid.
A skimming scheme is easier to detect than a cash larceny scheme because it leaves an audit trail.
A. True
B. False
B. False
See pages 1.301, 1.320 in the Fraud Examiner’s Manual
Cash receipts schemes fall into two categories: skimming and larceny. Skimming is defined as the theft of off-book funds, meaning cash is stolen before it is recorded in the victim organization’s accounts. This aspect of skimming schemes means that there is no direct audit trail. Cash larceny schemes, however, involve the theft of money that has already appeared on a victim company’s books. Cash larceny schemes are easier to detect than skimming schemes because they leave an audit trail.
Jacob was on a business trip in another city. One night, he met some friends (unrelated to his work) at an expensive restaurant, paid for the group’s meal using his credit card, and said that “the company would pay for it.” He submitted the receipt for the dinner with the legitimate business receipts from the trip and described the dinner as “client entertainment.” What type of scheme did Jacob commit?
A. A mischaracterized expense scheme
B. An overstated expense scheme
C. A fictitious expense scheme
D. A multiple reimbursement scheme
A. A mischaracterized expense scheme
See pages 1.473 in the Fraud Examiner’s Manual
One of the most basic expense reimbursement schemes is perpetrated by requesting reimbursement for a personal expense, claiming that it is business related. Examples of mischaracterized expenses include claiming personal travel as a business trip or listing dinner with a friend as “business development” or “client entertainment.” Employees might submit the receipts from their personal expenses along with their expense reports and invent business reasons for the incurred costs.
Which of the following is an example of an off-book fraud?
A. Cash larceny
B. Ghost employee schemes
C. Skimming
D. Billing schemes
C. Skimming
See pages 1.301 in the Fraud Examiner’s Manual
Skimming is the removal of cash from a victim entity prior to its entry in an accounting system. Employees who skim from their companies steal sales or receivables before they are recorded in the company books. Because of this aspect of their nature, skimming schemes are known as off-book frauds; they leave no direct audit trail. Cash larceny, billing schemes, and ghost employee schemes all involve the misappropriation of cash that has already been recorded on the victim’s books.
Which of the following statements about detecting a cash larceny scheme is TRUE?
A. Someone other than the accounts receivable clerk should prepare the bank deposit
B. If employees who handle cash go on vacation, other employees should take over their duties
C. Reconciling the cash register total to the amount of cash in the drawer is helpful in detecting a cash larceny scheme
D. All of the above
D. All of the above
See pages 1.329-1.330, 1.332 in the Fraud Examiner’s Manual
Mandatory vacations are an excellent method of detecting cash fraud. If mandatory vacations are within the company’s policies, then it is important that another individual continues to perform the normal workload of an absent employee. The purpose of mandatory vacations is lost if the work is allowed to remain undone during the employee’s time off.
In contrast to skimming schemes, the register records should not match up with the cash in the drawer when a cash larceny scheme has occurred. For this reason, cash larceny schemes are much easier to detect than skimming schemes because they leave an audit trail. To detect a cash larceny scheme, one recommended practice is to perform independent reconciliations of the register totals to the amount of cash in the drawer.
The bank deposit should be made by someone other than the cashier or the accounts receivable clerk. A person independent of the cash receipts and accounts receivable functions should compare entries to the cash receipts journal with:
- Authenticated bank deposit slips
- The deposit per the bank statements
Improperly recording an expenditure as a capitalized asset rather than recording it as an expense would have what effect on the financial statements?
A. Assets would be falsely overstated, giving the appearance of a stronger company
B. Expenses would be overstated, giving the appearance of poor financial performance
C. Net income would be falsely understated, lowering the company’s tax liability
D. None of the above
A. Assets would be falsely overstated, giving the appearance of a stronger company
See pages 1.230 in the Fraud Examiner’s Manual
Improperly capitalizing expenses is one way to increase income and assets and make the entity’s financial position appear stronger. If ineligible expenditures are capitalized as assets and not expensed during the current period, income will be overstated. As the assets are depreciated, income in following periods will be understated.
Payers can make corrupt payments by giving recipients hidden interests in profit-making enterprises.
A. True
B. False
A. True
See pages 1.609 in the Fraud Examiner’s Manual
A payer might make a corrupt payment by giving the recipient a hidden interest in a joint venture or other profit-making enterprise.
Which of the following is a basic method used to prove corrupt payments in corruption schemes?
A. Using an inside witness
B. Identifying and tracing payments through audit steps
C. Secretly infiltrating ongoing transactions
D. All of the above
D. All of the above
See pages 1.613 in the Fraud Examiner’s Manual
There are three basic ways to prove corrupt payments:
- Use an inside witness.
- Secretly infiltrate or record ongoing transactions.
- Identify and trace the corrupt payments through audit steps.
A large amount of overdue accounts receivable on the books is a red flag of a fictitious revenue scheme.
A. True
B. False
A. True
See pages 1.212 in the Fraud Examiner’s Manual
Fictitious or fabricated revenues involve the recording of sales of goods or services that did not occur. Fictitious sales most often involve fake customers but can also involve legitimate customers. Recording the sales revenue is easy, but the challenge for the fraudster is how to balance the other side of the entry. A credit to revenue increases the revenue account, but the corresponding debit in a legitimate sales transaction typically either goes to cash or accounts receivable. Because no cash is received in a fictitious revenue scheme, increasing accounts receivable is the easiest way to get away with completing the entry. However, accounts receivable stay on the books as an asset until they are collected. If the outstanding accounts are never collected, they will eventually need to be written off as bad debt expense. Mysterious accounts receivable on the books that are long overdue are a common sign of a fictitious revenue scheme.