CFE Free Resources

Whether you're aiming for Certified Fraud Examiner (CFE), Certified Internal Auditor (CIA), or Certified AntiMoney Laundering Specialist (CAMS) certification, our offerings ensure that you have the tools needed to succeed. Take advantage of this opportunity to strengthen your knowledge and skills in forensic accounting, internal audit practices, and anti-money laundering strategies.

Start your journey to certification confidently with our valuable study aids


1

What is Owner's Equity?

Click to Flip

The investment of a company's owner plus accumulate profits.

2

Accounting Equation?

Click to Flip

Asset= Liabilities + Owner's Equity

3

How debits impacts assets and expenses?

Click to Flip

Debits increase assest and expense account while credits decrease them.

4

What does Balance Sheet show?

Click to Flip

Shows a snapshot of a company's financial situation at a specific point in time, generally the last day of the accounting period.

5

Sections of Statement of Cash flows

Click to Flip

1. Cash flows from operations
2. Cash flows from investing activities
3. Cash flows from financing activities

6

Fictitious sales always involve fake customers?

Click to Flip

Fictitious sales most often involve fake customers but can also involve legitimate customers.

7

Three common methods of concealing liabilities and expenses.

Click to Flip

1. Liability/expense omissions
2. Improperly capitalized costs
3. Failure to disclose or Contingent liability

8

What is Quick Ratio?

Click to Flip

Compares the most liquid assests to current liabilities

9

Sales Skimming means?

Click to Flip

An employee sells goods or service to a customer and collects the customer's payment but makes no record of the sale.

10

Whether physical varification of Cash is an effective detection method of skimming?

Click to Flip

It is a effective method for larceny but not of Skimming

11

How information is lost or stolen by R & D department?

Click to Flip

1. Conference speeches and papers
2. Publications
3. Company websites

12

What is Nondisclosure agreement?

Click to Flip

Written agreements provinding that signatory must keep confidential all trade secrets and proprietory information learned during their employment.

13

What are the measures to guard manual file system?

Click to Flip

1. Shredding sensitive documentary waste
2. Using a bonded waste disposal company
3. Receiving and sending mail at a secure site
4. Using an alarm system
5. Providing locks for doors and windows

14

What are the smart cards?

Click to Flip

Plastic, credit card-sized cards that are embedded with a microchip

15

What are the Code manipulation?

Click to Flip

1. Unbundling charges and fragmentation
2. Mutually exclusive procedures
3. Upcoding

16

What is the key element in Ponzi schemes?

Click to Flip

Initial investors are paid with subsequent investors money. There is little or no legitimate commerce

17

What is business email compromise?

Click to Flip

It is a form of spear phising attack that directly targets employees who have the ability to make large payments or who have access to sensitive proprietary information. BEC schemes typically involve fraudulent emails that appear to be from the company's own chief executive officer (CEO)

18

What is Pharming?

Click to Flip

A type of phishing attack in which a user is fooled into entering sensitive data such as a password or credit card number into a malicious website that imitates a legitimate website.

19

What are the information security goals?

Click to Flip

1. Confidentiality of data
2. Integrity of data
3. Availability of data
4. Authentication 5. Non- repudiation

20

What are the network security controls?

Click to Flip

1. Firewall
2. Intrusion detection systems
3. Intrusion prevention systems
4. Network access controls

21

Phases in the Procurement process?

Click to Flip

1. The pre-solicitation phase
2. The soliciation phase
3. The bid evaluation and award phase
4. The post-award and administration phase

22

What are the prevention methods of procurement frauds?

Click to Flip

1. Employee Education 2. Internal controls 3. Monitoring activities 4. Vendor management

23

What is Cat fishing?

Click to Flip

Creating fake social media accounts and asking for money/sensetive information from the connections.

24

What is Ransomware?

Click to Flip

Is a form of malware that locks a user's operating system and restricts access to data files until a ransom is paid. While some ransomware simply prevents acccess to files, other forms encrypt user's files or steal data

25

How physical access controls are different then technical and administrative controls?

Click to Flip

Physical access controls prevents unauthorised access to computer hardware while other prevents access to computer software.


1

Common law is also known as?

Click to Flip

Judge-made law

2

What is known as Precendant

Click to Flip

Any judgement made by higher court is known as precedant

3

When people say an act is against the law, they are refering to?

Click to Flip

Substantive law

4

Define parallel proceedings?

Click to Flip

Simultaneous criminal and civil actions against the same defendant that are based upon a single set of facts.

5

Under civil law systems, courts are bound by?

Click to Flip

Courts areby an accepted set of codified principles or compiled statutes and are not bound by previous court decisions

6

Who has the primary responsibility of discovering evidence in?

Click to Flip

The Presiding Judge

7

What are the administrative penalties normally levied in civil actions?

Click to Flip

Monetary fines and penalties, license suspension or revocation and debarment

8

Difference between embezzlement and larceny?

Click to Flip

If only custody is given then larceny and if lawfulis there then embezzlement

9

False claims and statements to government agencies are still considered as fraud, even if?

Click to Flip

The governmental entity was not actually deceived by the falsity, did not rely on it, or dit not suffer a loss in reliance on it

10

Three type of bankruptcy filings?

Click to Flip

1. Liquidation
2. Reorganization
3. Debt adjustment

11

Money laundering process includes?

Click to Flip

1. Placement
2. Layering
3. Integration

12

What does DNFBPs means?

Click to Flip

Designated nonfinancial business and professions

13

Best defence to tax fraud allegations?

Click to Flip

No deficiency

14

Two forms of defamation?

Click to Flip

LIBEL,SLANDER

15

Two forms of Invasion of Privacy?

Click to Flip

1. Intrusion into an individual's private matters
2. Public disclosure of private facts

16

Prosecutorial discretion means?

Click to Flip

Whether criminal cases are brought to trial generally depends on prosecutorial discretion, meaning that the decision to prosecute is left to the discretion of the appropriate juridictional authority

17

What is counterclaims?

Click to Flip

Claims filed by a defendant against the plaintiff in a civil action is called counterclaims, also known as countersuits.

18

Common civil remedies includes?

Click to Flip

1. Damages (monetary remedies)
2. Declaratory remedies
3. Equitable remedies
4. Prejudgement attachments

19

Three basic remedies?

Click to Flip

1. Testimonial evidence
2. Real evidence
3. Demonstrative evidence

20

Character evidence is also known as?

Click to Flip

Propensity evidence


1

What is Fraud Examination?

Click to Flip

Fraud Examination is a process of resolving allegations of fraud from inception to disposition.

2

Predication means?

Click to Flip

Predication is totality of circumstances that would lead a reasonable, professionaly trained, and prudent individual to believe that a fraud has occurred, is occuring, and/or will occur.

3

Three form of evidence?

Click to Flip

I. Documentary
II. Testimonial
III. Digital Evidence.

4

Indented writing Means?

Click to Flip

Indented writing is the impression a writing leaves on sheets of paper below the piece of paper that contain writing.

5

Intelligency factor to consider when assessing signs of deception?

Click to Flip

The more intelligent the respondent, the more reliable verbal and nonverbal clues will be.

6

Non- public records can be obtained through?

Click to Flip

Can be obtained through-
I. Consent
II. A subpoena
III. A search warrant.

7

What is Pretexting?

Click to Flip

Pretexting is the act of impersonating someone else or making false or misleading statements to obtain, sell, or buy information about a person or organization.

8

Data Analysis process?

Click to Flip

1. Planning Phase
2. Preparation Phase
3. Testing and Interpretation Phase
4. Post- analysis Phase.

9

What is Link Analysis?

Click to Flip

Visual representations of data from multiple data sources to track the movement of money, demonstrate complex networks, and discover communications, patterns, trends, and relationships.

10

Digital Evidence stands for?

Click to Flip

Any information stored or transmitted in binary form (i.e., ones and zeroes) that can be used to prove something.

11

Voltarity of Digital Evidence?

Click to Flip

Digital evidence is more volatile than tangible evidence because data can be altered or destroyed more easily than tangible information.

12

Examples of Computer- created files?

Click to Flip

1. Metadata
2. Registry
3. Event Logs
4. Internet activity
5. Temporary files
6. Deleted Data.

13

What does FIU stands for?

Click to Flip

Financial Intelligence Units( FIUS) are national centres that are responsible for receiving and analysing information on suspicious or unusual financial activity in order to combat international financial crimes.

14

Explain Net Worth method for tracing?

Click to Flip

Comparision of a person's assets or expenditures for a given period or admitted legitimate sources of income.

15

Characteristics of Concealed assests?

Click to Flip

1. Liquid
2. Untraceable
3. Secure
4. Accessible
(But not transparent)

16

What is cryptocurrency?

Click to Flip

A cryptocurrency is a type of digital currency that uses public or private key encryption in the currency's creation and transfer.

17

Characterstics of Good Fraud Exmaination Report?

Click to Flip

1. Accuracy
2. Clarity
3. Impartiality and relevance
4. Timeliness

18

Key points for preparing the Interview Room?

Click to Flip

1. No False Imprisonment
2. No distractions
3. Proper Visibilty
4. Privacy to the extent affordable.

19

Three general approaches to obtaining a Verbal Confession?

Click to Flip

1. Chronologically
2. By transaction
3. By Event

20

What is Covert Operation?

Click to Flip

A covert operation is an investigation technique designed to obtain evidence( legal & admissible) by use of agents whose true intentions are not communicated to the target.


1

Disadvantages of Punishment towards changing behaviour?

Click to Flip

1. Least effective method
2. Works only with constant supervision.
3.Temporary suppression of an undesirable behaviour.

2

What is Positive Reinforcement?

Click to Flip

A positive reinforcement presents a positive stimulus in exchange for the desired response.

3

What is Negative Reinforcement?

Click to Flip

A negative reinforcement withdraws a negative stimulus in exchange for the response.

4

Characterstics of White Collar Criminals?

Click to Flip

1. Be white males with a moderate social status.
2. Live beyond Means

5

Three legs of Fraud Triangle?

Click to Flip

1. Perceived non- shareable financial need
2. Perceived opportunity
3. Rationalization

6

Principles of Corporate Governance?

Click to Flip

1. Accountability
2. Transparency
3. Fairness
4. Responsibility

7

Nature of G20/OECD principles of corporate Government?

Click to Flip

The prinicples are nonbinding, however as their implementation must be adapted to different legal, economic, and cultural circumstances.

8

Two types of intentional misstatements as per (ISA) 240?

Click to Flip

1. Mistatements arising from fraudulent financial reporting.
2. Misstatements arising from misappropriation of assets.

9

Is it much easier to detect fraud than to prevent?

Click to Flip

No, most experts agree that it is much easier to prevent fraud than to detect it.

10

What is Inherent Risk?

Click to Flip

Risks that are present before management actions are taken as inherent risks.

11

What is Residual Risk?

Click to Flip

Risks that remain after management action are taken as residual risks.

12

Best techniques to use in conducting the fraud risk assessment?

Click to Flip

1. Interviews
2. Focus groups
3. Surveys
4. Anonymous feedback mechanism.

13

What do preventive controls intend to?

Click to Flip

Preventive controls are intended to prevent fraud before it occurs.

14

Ways management can respond to residual fraud risks?

Click to Flip

1. Avoid
2. Transfer
3. Mitigate
4. Assume

15

Most important point when reporting the results of fraud risk assessment?

Click to Flip

Stick to the facts and keep all opinions and biases out of the report.

16

Who holds the primary responsibility for success of fraud risk management program?

Click to Flip

Management ( not the board) holds the responsibility for success of fraud risk management program.

17

Three levels of customer due diligence?

Click to Flip

1. Simplified CDD
2. Standard CDD
3. Enhanced CDD

18

What is Priviliged Information?

Click to Flip

Privileged information is information that cannot be demanded, even by a court; it is information that is protected by law from evidence.

19

What is Confidential Information?

Click to Flip

Confidential information is the information that is confidential in nature. Whather an infomation is confidential or not depends upon norms of company or goverment's legislation.

20

When information is considered as material?

Click to Flip

Information is material if having knowledge of such information night reasonably be expected to influence a client's or employer's decisions based on a fraud examiner's report.


1MODULE-I: FINANCIAL TRANSACTIONS AND FRAUD SCHEMES

1. The concept that a business will continue indefinitely is known as

Explanation:

Option A is correct.
There is an assumption that an entity will continue as a going concern; that is, the life of the entity will be long enough to fulfill its financial and legal obligations.

2MODULE-II: LAW

1. Judge-made law is also called as

Explanation:

Option B is correct.
In common law systems, there are laws that judges develop through court decisions, as well as codes and statutes that establish laws. The common law is developed on a case-by-case basis and is referred to as judge-made law.

3MODULE-III: INVESTIGATION

1. Which of the following would be the LEAST effective way to obtain permission to examine someone's bank records?

Explanation:

Option A is Correct.
Bank records can be obtained by consent only if the subject of the records consents in writing.

4MODULE-IV: FRAUD PREVENTION & DETERRENCE

1. Most effective method of preventing fraud is?

Explanation:

Option A is correct.
Increasing the perception of detection might be the most effective fraud prevention method.

CFE Free Resources