100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CFE Exam Study Guide Solutions $13.49   Add to cart

Exam (elaborations)

CFE Exam Study Guide Solutions

 4 views  0 purchase
  • Course
  • Prep Tests
  • Institution
  • Prep Tests

CFE Exam Study Guide Solutions Falsified Hours & Salary Schemes - ANSWER-The most common method of misappropriating funds from the payroll is the overpayment of wages. For hourly employees, the size of a paycheck is based on two factors: the number of hours worked and the rate of pay. Therefore,...

[Show more]

Preview 4 out of 84  pages

  • November 3, 2024
  • 84
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Prep Tests
  • Prep Tests
avatar-seller
KaylinHoffman
Copyright © KAYLIN 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED FIRST PUBLISH NOVEMBER, 2024




CFE Exam Study Guide Solutions


Falsified Hours & Salary Schemes - ANSWER✔✔-The most common method of misappropriating funds

from the payroll is the overpayment of wages. For hourly employees, the size of a paycheck is based on

two factors: the number of hours worked and the rate of pay. Therefore, for hourly employees to

fraudulently increase the size of their paycheck, they must either falsify the number of hours they have

worked or change their wage rate.


Common ways to commit a falsified hours and salary scheme - ANSWER✔✔-1) Inflating the number of

hours worked


2) Inflating the rate of pay


3) Forging a supervisor's signature


4) Collusion with a supervisor


5) Implementing poor custody procedures


6) Altering a timesheet after it has been approved


Fictitious Provider Scheme - ANSWER✔✔-Corrupt providers or other criminals fraudulently obtain and

use another provider's identification information and steal or purchase lists of patients' identifying

information. Thereafter, the perpetrator submits bills using the fictitious provider's information to the

insurance provider or government health care program for medical services, although no services are

performed.




Copyright ©Stuvia International BV 2010-2024 Page 1/84

,Copyright © KAYLIN 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED FIRST PUBLISH NOVEMBER, 2024


Address Similarity Reports - ANSWER✔✔-electronically compare multiple payments going to the same

address. These reports are extremely useful because they might show a payment defalcation or funds

going to another insurance company, broker, or fictitious payee.


Bad Debt Expense - ANSWER✔✔-Managers can overstate their company's accounts receivable balance

by failing to record bad debt expense. Bad debt expense is recorded to account for any uncollectible

accounts receivable. The debit side of the entry increases bad debt expense, and the credit side of the

entry increases the allowance (or provision) for doubtful accounts, which is a contra account that is

recorded against accounts receivable. Therefore, if the controller fails to record bad debt expense, the

allowance (or provision) for doubtful accounts will be understated.


Systems for safeguarding sensitive and proprietary information should include: - ANSWER✔✔-* Task

force


* Security risk assessments


* Security policies and procedures


* Awareness training


* Nondisclosure agreements


* Noncompetition agreements


* Data classification


* Data retention and destruction policies


* Data minimization


* Security controls



Copyright ©Stuvia International BV 2010-2024 Page 2/84

,Copyright © KAYLIN 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED FIRST PUBLISH NOVEMBER, 2024


* Measures to guard manual file systems


* Monitoring of visitor access


* Quiet room


* Incident response plan


The failure to include any of these measures is a poor information security practice that can contribute

to the loss of proprietary information.


To prevent the loss or misuse of sensitive data or proprietary information, organizations should . . . -

ANSWER✔✔-develop and implement risk-based information-security systems designed to detect and

prevent unauthorized access to sensitive information. An information security system requires controls

that are designed to ensure that data are used as intended, and such controls will depend on the

combination and coordination of people, processes, technologies, and other resources.


Off-book fraud - ANSWER✔✔-A fraud that occurs outside the financial system and therefore has no

direct audit trail. There are several kinds of off-book frauds that will be discussed in this book. Skimming

is the most common off-book fraud.


Skimming - ANSWER✔✔-The removal of cash from a victim entity prior to its entry in an accounting

system. Employees who skim from their companies steal sales or receivables before they are recorded in

the company books. Because of this aspect of their nature, skimming schemes are known as off-book

frauds; they leave no direct audit trail


DRG creep - ANSWER✔✔-occurs when a hospital or other medical institution deliberately and

systematically manipulates diagnostic and procedural codes to increase reimbursement amounts or




Copyright ©Stuvia International BV 2010-2024 Page 3/84

, Copyright © KAYLIN 2024/2025 ACADEMIC YEAR. ALL RIGHTS RESERVED FIRST PUBLISH NOVEMBER, 2024


other forms of funding. In other words, DRG creep is an intentional pattern of upcoding by a hospital or

other medical institution.


smartcard - ANSWER✔✔-a plastic card, the size of a credit or debit card, embedded with a microchip. A

key advantage of smart cards is that, unlike regular magnetic stripe credit and debit cards, they cannot

be easily replicated. Similarly, smart cards cannot be easily counterfeited, which greatly reduces the

potential for fraud with in-person transactions. Smart cards include a wide variety of hardware and

software features capable of detecting and reacting to tampering attempts and countering possible

attacks. If someone tries to tamper with a chip on a smart card, the card detects the intrusion and shuts

itself down, rendering the card useless.


Steps individuals can take to protect their personal information and prevent identity theft - ANSWER✔✔-

* Do not give out government identification numbers unless absolutely necessary.


* Do not carry government identification cards (or numbers) in purses or wallets.


* Create complex passwords or passphrases that are at least eight characters in length and contain

upper- and lowercase letters, numbers, and symbols.


* Do not reuse passwords. Use a different password for every website, account, or device.


* Never send personal information, such as a password or government identification number, via email.

Reputable organizations will not request personal information by email.


* When available, use biometric authentication (e.g., fingerprints, voice recognition).


* Create unique answers for security questions. Do not choose answers containing personal information

that is publicly available (e.g., name of high school, mother's maiden name).




Copyright ©Stuvia International BV 2010-2024 Page 4/84

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KaylinHoffman. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart