New account fraud is generally defined as the fraud that occurs on an account within the first …........ days that it is open
Which of the following is a type of cheque fraud that involves using acid-based chemicals found in common household products to erase particular pieces of information, such as payee name.
The primary responsibility for the prevention and detection of fraud rests with those charged with governance of the ……..
Which of the following is a method of transferring money by instructing a bank to directly transfer funds from one bank account to another without the use of cheques.
Complex transactions are one of the transaction issues.
The common information security goals that should be provided to users and account holders of information systems include:
If the dollar amount of the embezzlement scheme is ………., embezzlement fraud can be most effectively detected through the review of source documents.
In which of the following, treat all individuals fairly and impartially, without prejudice, and never tolerate harassment in any form?
Advance-fee swindles are structured to obtain a legal gain by falsely promising the delivery of a product or service.
Which of the following involves background research, such as company searches, and identifying those involved?
In which of the following, action is taken against the individual(s) concerned in the police managed inquiry?
Which of the following is one of the common red flags of potential new account schemes?
Which one of the following is an example of fraud?
Like fingerprints, which of the following is unique to an individual?
The two main types of External fraud schemes are those committed by providers and claim fraud by the insured.
It is common practice to assess which of the following in terms of high -probable?
Which of the following is the term used for including additional coverage in an insurance policy without the insured’s knowledge?
Altering legitimate purchase orders is a pattern of:
Which of the following can be used to identify any abnormal trends or patterns?
Credit master fraud is a form of credit card fraud in which the perpetrator intercepts credit cards that are in transit between the credit issuer and the authorized account holder.
Which one of the following is one of the types of corruption in internal fraud?
In which of the following, the cash flow cannot support an inflated loan and resulting debt amount.
Which of the following is one of the techniques of analysis of risk?
Depending on the ……..…. and nature of the organization, the risk management group may be in the form of a committee that meets from time to time.
Which of the following occurs when a physician prescribes unnecessary or excessive patient services. There are two possible explanations for this. The first is monetary gain to the provider.
Which of the following is one of the common signs of forged credit cards?
An audit trail or other record of all processes applied to computer-based electronic evidence should be:
The ….....….. organizations may feel they are unlikely to be a target of fraudsters.
Which of the following allows fraud examiners to detect indented writing from the top page of a pad of paper up to five pages below the original.
A key consideration in any investigation must always be how to ……........ or preserve sufficient evidence to prove a case of fraud.
In Linked Financing, a bank buys, sells, and swaps its bad loans for the bad loans of another bank, creating new documentation in the process.
Missing or altered documentation is a red flag for any type of fraud scheme.
…………., who simply carry on trading even when, objectively, they are not in a position to pay their debts, this can apply to ordinary traders or to major business people.
After strategies are developed, it is necessary to establish the risk appetite of the organization.
Which of the following is one of the Public and Private Systems in health care?
The risk management cycle starts with understanding and assessing the scale of risk.
It is difficult to put a total cost of fraud, although many studies have tried to.
Which of the following is one of the ways that health care systems can be classified?
Extortion is offering to keep information confidential in return for money or other consideration.
The fraud triangle consists of motivation, opportunity, and:
An effective cheque counterfeiting operation can turn a small financial investment into a large windfall within a 30-day time frame.
The provider is the ……………….. party is the insurance company.
Which of the following is represents the highest risk area for financial institutions?
Whether health care providers are private parties or employed by the government can't make a significant difference in the types of schemes observed.
Which of the following is an illegal business practice in which new investors’ money is used to make payments to earlier investors?
The term tombstone policy came into being because agents would literally take names off tombstones to write new, fictitious policies.
Ditching, also known as owner give-ups, involves getting rid of which of the following to cash in on a insurance policy or to settle an outstanding loan?
Which of the following is one of the effective anti-fraud strategies?
Vanishing Premium is a scheme of which of the following Insurance types?
Based on recent surveys, many organizations don't have a formal approach to fraud prevention.
Illegal political contributions is an example for:
Who is from the following do not generally find fraud?
The fraud officer will usually have responsibility for any internal disciplinary procedures, which must be in line with and support the fraud policy statement.
Which of the following might occur if a sales representative knowingly makes a false statement with the intent to deceive the prospective insureds in order to obtain an unlawful gain.
Which of the following is an interactive process of identifying risks, assessing their impact, and prioritizing actions to control and reduce risks?
From the following, who should recognize the increased likelihood of counterfeit items from foreign entities?
In which of the following, borrowers pledge the same collateral with different lenders before liens are recorded and without telling the lenders?
Unlike traditional fraud cases, computer fraud cases can be simple for fraud examiner.
For Authentication to be effective, digital signatures use …………….. technology to make them resistant to forgery.
Poor management of accountability and reporting systems is one of the: