Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

How do 1. How do pancet schemes work? 4. What are the the principal categories of check tampering? w we the differences between forged maker

image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
image text in transcribed
How do 1. How do pancet schemes work? 4. What are the the principal categories of check tampering? w we the differences between forged maker and forged endorsement What red flags are commonly associated with Dictitious expen schemes? 10. How do firulent disbursements at the cash register differ from oth register frwds? leration of outgoing company checks he prevented 6. How can then or detected C. Creating a check to an employee for fictitious travel expenses D. Creating a check and altering the payee after the check in signed A MULTIPLE CHOICE QUESTIONS I Wish of the following is not one of the five major categories of de disturments? . Payroll schemes IL Expense reimbursement schemes C Shell company schemes 1. Billing schemes 2. Which of the following is the first ep to form a shell company? A. Obuain a certificate of incorporation from the state. B. Open a bank account COhon a ng isation number D. File the company by www at the local courthouse. 3. Which of the following is an integral step in a pay-and-return scheme? A. Establish a shell company B. Misappropriate the incoming check related to returned goods and deposit the check in a bank account other than the company's C Purchase legitimate goods that are paid by the organization and turn them D. Adjust the legitimate pood inventory conceal the shortage related to the returned goods. 4. Which of the following is an emple of check tampering? A Creating a check for a ghost employee . Creating a check payable to a shell company Which of the following is indicative of the actions of the forged make perpetrator? s to checks for the same invoice and gets both signed by authorized signatory, B. L es two checks for the same invoice and fraudulently signs and Cashes the second check. C. Issues two checks for the same invoice and runs both through the automatic check-signing machine D. Issues two payroll checks to himself and gets both signed by authorized signatory. 6. Which of the following is not a method to deter, prevent, and detect the theft and alteration of outgoing accounts payable checks? A. Identify vendors with no mailing address or phone number B. Identify vendors with a mailing address that matches an employee's address C. Hand each paycheck to the employee while checking appropriate identification D. Identify, review, and summarize all manual checks not created through the accounts payable system Module 5: Register Disbursement Schemes 191 7. For a ghost employee, which of the following is not one of the four primary steps needed to make this scheme work? A. Delivery of the paycheck to the ghost B. Input a valid home address for the ghost C. Adding the ghost to the payroll records D. Creating timekeeping information for the ghost & Which of the following is not a typical method that employees use to overstate legitimate expenses on their expense reports? A. Create receipts. B. Purchase an item at an inflated price and request reimbursement at that price while obtaining a vendor refund. C. Purchase more quantity than is necessary and request reimbursement D. Alter the delivery paperwork for inventory receipts at the warehouse 9. Which of the following red flags is commonly associated with fictitious expense reimbursement schemes? A. Patterns when expense reimbursements are for the same amount B. Ghost employees receiving expense reimbursements C. Cash disbursements where the canceled checks have been altered D. Billing errors from a problem vendor 10. Which of the following red flags is seldom associated with cash register disbursement frauds? A. Excessive voids B. Uncashed personal checks in the cash drawer received from employees C. Excessive customer refunds D. Higher than expected uncollectible receivables FRAUD CASEBOOK Adelphia Sources: Need help with all multiple choice questions 10. How do fraudulent disbursements at the cash register differ from other register frauds? How can theft and alteration of outgoing company checks be prevented ocks be prevented or detected? C. Creating a check to an employee for fictitious travel expenses D. Creating a check and altering the payee after the check is signed MULTIPLE CHOICE QUESTIONS 1. Which of the following is not one of the five major categories of fraudulent disbursements? A. Payroll schemes B. Expense reimbursement schemes C. Shell company schemes D. Billing schemes 2. Which of the following is the first step to form a shell company? A. Obtain a certificate of incorporation from the state. B. Open a bank account. c. Obtain a tax identification number. D. File the company by-laws at the local court house. 3. Which of the following is an integral step in a pay-and-return scheme? A. Establish a shell company. B. Misappropriate the incoming check related to returned goods and deposit the check in a bank account other than the company's C. Purchase legitimate goods that are paid by the organization and return them. D. Adjust the legitimate good inventory to conceal the shortage related to the returned goods. 4. Which of the following is an example of check tampering? A. Creating a check for a ghost employee B. Creating a check payable to a shell company 5. Which of the following is indicative of the actions of the forged maker perpetrator? A. Issues two checks for the same invoice and gets both signed by an authorized signatory. B. Issues two checks for the same invoice and fraudulently signs and cashes the second check. C. Issues two checks for the same invoice and runs both through the automatic check-signing machine D. Issues two payroll checks to himself and gets both signed by an authorized signatory. 6. Which of the following is not a method to deter, prevent, and detect the theft and alteration of outgoing accounts payable checks? A. Identify vendors with no mailing address or phone number. B. Identify vendors with a mailing address that matches an employee's address C. Hand each paycheck to the employee while checking appropriate identification D. Identify, review, and summarize all manual checks not created through the accounts payable system, Module 5: Register Disbursement Schemes For a ghost employee, which of the following is not one of the four primary steps needed to make this scheme work? A. Delivery of the paycheck to the ghost B. Input a valid home address for the ghost C. Adding the ghost to the payroll records D. Creating timekeeping information for the ghost & Which of the following is not a typical method that employees use to overstate legitimate expenses on their expense reports? A. Create receipts. B. Purchase an item at an inflated price and request reimbursement at that price while obtaining a vendor refund. C. Purchase more quantity than is necessary and request reimbursement D. Alter the delivery paperwork for inventory receipts at the warehouse. 9. Which of the following red flags is commonly associated with fictitious expense reimbursement schemes? A. Patterns when expense reimbursements are for the same amount B. Ghost employees receiving expense reimbursements C. Cash disbursements where the canceled checks have been altered D. Billing errors from a problem vendor 10. Which of the following red flags is seldom associated with cash register disbursement frauds? A. Excessive voids B. Uncashed personal checks in the cash drawer received from employees C. Excessive customer refunds D. Higher than expected uncollectible receivables FRAUD CASE BOOK Adela How do 1. How do pancet schemes work? 4. What are the the principal categories of check tampering? w we the differences between forged maker and forged endorsement What red flags are commonly associated with Dictitious expen schemes? 10. How do firulent disbursements at the cash register differ from oth register frwds? leration of outgoing company checks he prevented 6. How can then or detected C. Creating a check to an employee for fictitious travel expenses D. Creating a check and altering the payee after the check in signed A MULTIPLE CHOICE QUESTIONS I Wish of the following is not one of the five major categories of de disturments? . Payroll schemes IL Expense reimbursement schemes C Shell company schemes 1. Billing schemes 2. Which of the following is the first ep to form a shell company? A. Obuain a certificate of incorporation from the state. B. Open a bank account COhon a ng isation number D. File the company by www at the local courthouse. 3. Which of the following is an integral step in a pay-and-return scheme? A. Establish a shell company B. Misappropriate the incoming check related to returned goods and deposit the check in a bank account other than the company's C Purchase legitimate goods that are paid by the organization and turn them D. Adjust the legitimate pood inventory conceal the shortage related to the returned goods. 4. Which of the following is an emple of check tampering? A Creating a check for a ghost employee . Creating a check payable to a shell company Which of the following is indicative of the actions of the forged make perpetrator? s to checks for the same invoice and gets both signed by authorized signatory, B. L es two checks for the same invoice and fraudulently signs and Cashes the second check. C. Issues two checks for the same invoice and runs both through the automatic check-signing machine D. Issues two payroll checks to himself and gets both signed by authorized signatory. 6. Which of the following is not a method to deter, prevent, and detect the theft and alteration of outgoing accounts payable checks? A. Identify vendors with no mailing address or phone number B. Identify vendors with a mailing address that matches an employee's address C. Hand each paycheck to the employee while checking appropriate identification D. Identify, review, and summarize all manual checks not created through the accounts payable system Module 5: Register Disbursement Schemes 191 7. For a ghost employee, which of the following is not one of the four primary steps needed to make this scheme work? A. Delivery of the paycheck to the ghost B. Input a valid home address for the ghost C. Adding the ghost to the payroll records D. Creating timekeeping information for the ghost & Which of the following is not a typical method that employees use to overstate legitimate expenses on their expense reports? A. Create receipts. B. Purchase an item at an inflated price and request reimbursement at that price while obtaining a vendor refund. C. Purchase more quantity than is necessary and request reimbursement D. Alter the delivery paperwork for inventory receipts at the warehouse 9. Which of the following red flags is commonly associated with fictitious expense reimbursement schemes? A. Patterns when expense reimbursements are for the same amount B. Ghost employees receiving expense reimbursements C. Cash disbursements where the canceled checks have been altered D. Billing errors from a problem vendor 10. Which of the following red flags is seldom associated with cash register disbursement frauds? A. Excessive voids B. Uncashed personal checks in the cash drawer received from employees C. Excessive customer refunds D. Higher than expected uncollectible receivables FRAUD CASEBOOK Adelphia Sources: Need help with all multiple choice questions 10. How do fraudulent disbursements at the cash register differ from other register frauds? How can theft and alteration of outgoing company checks be prevented ocks be prevented or detected? C. Creating a check to an employee for fictitious travel expenses D. Creating a check and altering the payee after the check is signed MULTIPLE CHOICE QUESTIONS 1. Which of the following is not one of the five major categories of fraudulent disbursements? A. Payroll schemes B. Expense reimbursement schemes C. Shell company schemes D. Billing schemes 2. Which of the following is the first step to form a shell company? A. Obtain a certificate of incorporation from the state. B. Open a bank account. c. Obtain a tax identification number. D. File the company by-laws at the local court house. 3. Which of the following is an integral step in a pay-and-return scheme? A. Establish a shell company. B. Misappropriate the incoming check related to returned goods and deposit the check in a bank account other than the company's C. Purchase legitimate goods that are paid by the organization and return them. D. Adjust the legitimate good inventory to conceal the shortage related to the returned goods. 4. Which of the following is an example of check tampering? A. Creating a check for a ghost employee B. Creating a check payable to a shell company 5. Which of the following is indicative of the actions of the forged maker perpetrator? A. Issues two checks for the same invoice and gets both signed by an authorized signatory. B. Issues two checks for the same invoice and fraudulently signs and cashes the second check. C. Issues two checks for the same invoice and runs both through the automatic check-signing machine D. Issues two payroll checks to himself and gets both signed by an authorized signatory. 6. Which of the following is not a method to deter, prevent, and detect the theft and alteration of outgoing accounts payable checks? A. Identify vendors with no mailing address or phone number. B. Identify vendors with a mailing address that matches an employee's address C. Hand each paycheck to the employee while checking appropriate identification D. Identify, review, and summarize all manual checks not created through the accounts payable system, Module 5: Register Disbursement Schemes For a ghost employee, which of the following is not one of the four primary steps needed to make this scheme work? A. Delivery of the paycheck to the ghost B. Input a valid home address for the ghost C. Adding the ghost to the payroll records D. Creating timekeeping information for the ghost & Which of the following is not a typical method that employees use to overstate legitimate expenses on their expense reports? A. Create receipts. B. Purchase an item at an inflated price and request reimbursement at that price while obtaining a vendor refund. C. Purchase more quantity than is necessary and request reimbursement D. Alter the delivery paperwork for inventory receipts at the warehouse. 9. Which of the following red flags is commonly associated with fictitious expense reimbursement schemes? A. Patterns when expense reimbursements are for the same amount B. Ghost employees receiving expense reimbursements C. Cash disbursements where the canceled checks have been altered D. Billing errors from a problem vendor 10. Which of the following red flags is seldom associated with cash register disbursement frauds? A. Excessive voids B. Uncashed personal checks in the cash drawer received from employees C. Excessive customer refunds D. Higher than expected uncollectible receivables FRAUD CASE BOOK Adela

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Cost Effectiveness Analysis Methods And Applications

Authors: Henry M. Levin, Patrick J. McEwan

2nd Edition

0761919333, 978-0761919339

More Books

Students also viewed these Accounting questions