100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ACCT 130 Chapter 5–Check Tampering..100%

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
04-05-2022
Written in
2021/2022

Chapter 5–Check Tampering 1. Check tampering is unique from other fraudulent disbursement schemes because in a check tampering scheme: a. The perpetrator physically prepares the fraudulent check. b. The perpetrator must have access to a signature stamp in order to conceal the crime. c. The perpetrator submits a phony document in order to generate the fraudulent payment. d. The perpetrator must endorse the check in order to cash or deposit it. 2. To successfully carry out and conceal a check tampering scheme, the fraudster must have: a. Access to the check stock b. Access to the bank statements c. The ability to forge signatures or alter other information on the check d. All of the above 3. Which of the following choices is not a category of check tampering? a. Forged maker schemes b. Altered payee schemes c. Unauthorized endorsement schemes d. Concealed check schemes 4. The person who prepares and signs the check is known as the of the check. a. Author b. Endorser c. Payer d. Maker 5. In which of the following schemes does the fraudster intercept and convert a company check made payable to a third party? a. Forged maker scheme b. Authorized maker scheme c. Altered payee scheme d. Concealed check scheme 6. Which of the following is not an effective control mechanism to safeguard an organization’s check stock? a. Boxes of blank checks should be sealed with security tape. b. Organizations should use check stock that is high-quality and distinctly marked. c. The employee in charge of the check preparation function should periodically verify the security of unused checks. d. Voided checks should be promptly destroyed. 7. To prevent and detect forged maker schemes, an organization should: a. Separate the duties of check preparation and check signing. b. Rotate authorized check signers. c. Maintain a usage log for the signature stamp. d. All of the above 8. Which of the following procedures can help prevent and detect the theft and conversion of outgoing company checks? a. Train employees to look for dual endorsements on canceled checks. b. Chart the date of mailing for every outgoing check. c. Track changes made to vendor records. d. All of the above 9. Which of the following is not a type of altered payee scheme? a. “Tacking” on b. Forged maker c. Using erasable ink d. Leaving the payee designation blank 10. Which of the following computer audit tests can be used to detect forged maker schemes? a. Extract checks that are out of sequence b. Extract manual checks and summarize by vendor and issuer c. Extract all checks payable to “cash” and summarize by issuer for reasonableness d. All of the above 11. Which type of check tampering scheme is usually the most difficult to defend against? a. Authorized maker b. Forged endorsement c. Concealed check d. Altered payee 12. Methods used to conceal check tampering schemes include all of the following except: a. Falsifying the disbursements journal b. Forced reconciliation c. Check kiting d. Re-altering the canceled checks 13. Methods used to manipulate electronic payments include which of the following? a. Abusing legitimate access to the employer’s payment system b. Gaining access to the employer’s payment system through social engineering c. Exploiting weaknesses in the employer’s internal control over its electronic payment system d. All of the above 14. Kristen Diamond worked in the mailroom at B&R Industries. When attaching postage to the outgoing mail, she would search for payments being sent to a specific vendor, K. D. Sand. She intercepted these checks and carefully changed them to appear payable to K. Diamond. She then endorsed the checks with her own name and deposited them into her personal bank account. What type of scheme did Kristen commit? a. Concealed check b. Payables skimming c. “Tacking on” d. Forged endorsement 15. Vicky Rogers works in the accounts payable department at HDU, Inc. When checks are returned to the company for incorrect vendor addresses, she is supposed to research them, correct them, and then forward them to the proper address. Instead, Rogers decided to convert some of the returned checks for her own use. Based on the information provided, what type of check tampering scheme is this likely to be? a. Forged maker b. Forged endorsement c. Concealed check b. Authorized maker 16. Melanie Diggers is an internal auditor for Atlantic Equipment Rental and Sales. While performing a routine review of one of the company’s bank accounts, she noticed an unusual “adjusting entry” to the account on the general ledger. She also found that several checks that had cleared the bank in the last few months were absent from the stack of canceled checks. She requested copies of these checks from the bank and discovered that they were all made payable to the company’s controller who has check signing authority on the account. The controller is also responsible for performing the bank reconciliation and recording month-end journal entries. Which of the following schemes do these signs most likely indicate? a. Concealed check scheme b. False voids scheme c. Authorized maker scheme d. Forged maker scheme 17. Billy Hodges was in charge of preparing checks for the Lightner Company. He entered the payment information into the accounting system, and the completed checks were sent back to him to review. He then forwarded the checks to his supervisor for signing. In each batch of legitimate checks, Hodges would insert checks made payable to himself. When his supervisor was busy, he would take the stack of checks to him and ask him to sign them immediately in order to meet their cycle time deadline. The supervisor would inattentively sign the checks, and then Hodges would extract the checks he made payable to himself. This is an example of what type of check tampering scheme? a. Concealed check scheme b. Forged endorsement scheme c. Forged maker scheme d. Altered payee scheme 18. Mary Duncan is an internal auditor for the Western Realty Group. Recently, she ran a program that extracted checks that were out of the normal sequence. She found that four or five checks were written every month that fit this category. Based on the information given, which of the following schemes is likely occurring? a. Multiple reimbursement scheme b. Shell company scheme c. Personal purchases scheme d. Forged maker scheme 19. In one of the case studies in the textbook, Melissa Robinson, who worked as an executive secretary for a worldwide charitable organization and was active in her children’s school, was also a thief. As one of two people allowed to sign checks on the organization’s bank accounts, she learned early on that she could forge the second person’s signature without anyone becoming suspicious. How was she finally caught? a. A co-worker contacted the organization’s executive director when she found that a company check had been written to the children’s school for Robinson’s personal items. b. New officers were elected, and they took the accounting books from her. c. The auditors discovered her fraud during an annual audit of the books. d. Robinson’s husband tipped off the audit committee after he became suspicious of some of Robinson’s purchases. 20. In one of the case studies in the textbook, Melissa Robinson, who worked as an executive secretary for a worldwide charitable organization and was active in her children’s school, was also a thief. As one of two people allowed to sign checks on the organization’s bank accounts, she learned early on that she could forge the second person’s signature without anyone becoming suspicious. What red flags were present that indicated that something wasn’t appropriate? a. Robinson would not take vacation leave. b. There were a lot of missing files that the auditors couldn’t locate during their annual audit. c. Robinson would not release any financial information when requested and gave excuses for why it wasn’t available.

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
May 4, 2022
Number of pages
7
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ACCT 130

Chapter 5–Check Tampering

1. Check tampering is unique from other fraudulent disbursement schemes
because in a check tampering scheme:
a. The perpetrator physically prepares the fraudulent check.
b. The perpetrator must have access to a signature stamp in order to
conceal the crime.
c. The perpetrator submits a phony document in order to generate the
fraudulent payment.
d. The perpetrator must endorse the check in order to cash or deposit it.


2. To successfully carry out and conceal a check tampering scheme, the fraudster
must have:
a. Access to the check stock
b. Access to the bank statements
c. The ability to forge signatures or alter other information on the check
d. All of the above


3. Which of the following choices is not a category of check tampering?
a. Forged maker schemes
b. Altered payee schemes
c. Unauthorized endorsement schemes
d. Concealed check schemes

4. The person who prepares and signs the check is known as the of
the check.
a. Author
b. Endorser
c. Payer
d. Maker

5. In which of the following schemes does the fraudster intercept and
convert a company check made payable to a third party?
a. Forged maker scheme
b. Authorized maker scheme
c. Altered payee scheme
d. Concealed check scheme


6. Which of the following is not an effective control mechanism to
safeguard an organization’s check stock?
a. Boxes of blank checks should be sealed with security tape.
b. Organizations should use check stock that is high-quality and distinctly
marked.
c. The employee in charge of the check preparation function
should periodically verify the security of unused checks.
-1-
This study source was downloaded by 100000844749689 from CourseHero.com on 0 5 -04-2022 00:35:03 GMT -


https://www.coursehero.com/file/11712967/ch-05-handout/

, d. Voided checks should be promptly destroyed.

7. To prevent and detect forged maker schemes, an organization should:
a. Separate the duties of check preparation and check signing.
b. Rotate authorized check signers.
c. Maintain a usage log for the signature stamp.
d. All of the above

8. Which of the following procedures can help prevent and detect the
theft and conversion of outgoing company checks?
a. Train employees to look for dual endorsements on canceled checks.
b. Chart the date of mailing for every outgoing check.
c. Track changes made to vendor records.
d. All of the above

9. Which of the following is not a type of altered payee scheme?
a. “Tacking” on
b. Forged maker
c. Using erasable ink
d. Leaving the payee designation blank


10. Which of the following computer audit tests can be used to detect forged
maker schemes?
a. Extract checks that are out of sequence
b. Extract manual checks and summarize by vendor and issuer
c. Extract all checks payable to “cash” and summarize by issuer for
reasonableness
d. All of the above

11. Which type of check tampering scheme is usually the most difficult to
defend against?
a. Authorized maker
b. Forged endorsement
c. Concealed check
d. Altered payee


12. Methods used to conceal check tampering schemes include all of the
following except:
a. Falsifying the disbursements journal
b. Forced reconciliation
c. Check kiting
d. Re-altering the canceled checks

13. Methods used to manipulate electronic payments include which of the following?
a. Abusing legitimate access to the employer’s payment system
b. Gaining access to the employer’s payment system through social engineering
-2-
This study source was downloaded by 100000844749689 from CourseHero.com on 0 5 -04-2022 00:35:03 GMT -


https://www.coursehero.com/file/11712967/ch-05-handout/
$7.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
makish

Get to know the seller

Seller avatar
makish Walden University
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
3 year
Number of followers
2
Documents
145
Last sold
1 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions