The provider is the ……………….. party is the insurance company.
Ditching, also known as owner give-ups, involves getting rid of which of the following to cash in on a insurance policy or to settle an outstanding loan?
Some people may be able to rationalize fraudulent actions as:
Which of the following is one of the common suspicious items in financial statements?
In which of the following, people pose as customers, having used pretext calls to obtain correct account information from the bank.
The largest amount of insurance fraud is in:
Credit master fraud is a form of credit card fraud in which the perpetrator intercepts credit cards that are in transit between the credit issuer and the authorized account holder.
Which of the following is one of the common signs of forged credit cards?
The risk management cycle starts with understanding and assessing the scale of risk.
Which of the following is a type of cheque fraud that involves using acid-based chemicals found in common household products to erase particular pieces of information, such as payee name.
Fraud schemes resulting in credit card fraud include:
Poor management of accountability and reporting systems is one of the:
The two main types of External fraud schemes are those committed by providers and claim fraud by the insured.
…………., who simply carry on trading even when, objectively, they are not in a position to pay their debts, this can apply to ordinary traders or to major business people.
Which of the following are a formal means of setting down clearly the arrangements which are in place for dealing with detected or suspected cases of fraud.
Whether health care providers are private parties or employed by the government can't make a significant difference in the types of schemes observed.
Which of the following is represents the highest risk area for financial institutions?
Who is will be responsible for maintaining an investigation log?
If the dollar amount of the embezzlement scheme is ………., embezzlement fraud can be most effectively detected through the review of source documents.
Falsiﬁed employment credentials e.g. qualiﬁcations and references is a pattern of:
The surveys highlighted that the most common reason for not reporting a concern was thinking that ……..
In which of the following, Employees or contractors remove office equipment, building materials, and furnishings from bank premises?
Tellers should be advised to be alert for the customer who………………..
Which of the following is an illegal business practice in which new investors’ money is used to make payments to earlier investors?
When taking control of any physical evidence, which of the following is essential?
Missing or altered documentation is a red flag for any type of fraud scheme.
When accepting cheques, employees should always ask for which of the following and make sure it is valid.
Who of the following was found to be the most successful in identifying serious frauds?
In which of the following, borrowers pledge the same collateral with different lenders before liens are recorded and without telling the lenders?
Which of the following can be used to identify any abnormal trends or patterns?
Who is from the following do not generally ﬁnd fraud?
………………… reimbursement occurs when providers receive payment for each service rendered.
For convenience, which of the following have been subdivided into business risk, ﬁnancial risk, environmental risk, and IT and data risk.
The fraud triangle consists of motivation, opportunity, and:
Which one of the following is one of the types of corruption in internal fraud?
Although PIDA exists to protect whistleblowers, there is ….......… requirement for a whistleblowing policy under the legislation.
Unlike traditional fraud cases, computer fraud cases can be simple for fraud examiner.
Altering legitimate purchase orders is a pattern of:
Which one of the following is an example of fraud?
The term tombstone policy came into being because agents would literally take names off tombstones to write new, fictitious policies.
An effective cheque counterfeiting operation can turn a small financial investment into a large windfall within a 30-day time frame.
The fraud officer will usually have responsibility for any internal disciplinary procedures, which must be in line with and support the fraud policy statement.
Vanishing Premium is a scheme of which of the following Insurance types?
Floating makes cheque kiting impossible
Which of the following is one of the common red flags of potential new account schemes?
In which of the following, treat all individuals fairly and impartially, without prejudice, and never tolerate harassment in any form?
It is in the interest of which of the following to minimize credit card fraud?
Like fingerprints, which of the following is unique to an individual?
Which of the following is one of the red flags might identify mortgages containing false or misleading information?
New account fraud is generally defined as the fraud that occurs on an account within the first …........ days that it is open
Which of the following is one of the techniques of analysis of risk?
For Authentication to be effective, digital signatures use …………….. technology to make them resistant to forgery.
Illegal political contributions is an example for:
Which of the following typically deal with factors such as approval and authorization processes and access restrictions.
Screening …............ be limited to new joiners.
In Linked Financing, a bank buys, sells, and swaps its bad loans for the bad loans of another bank, creating new documentation in the process.
Which of the following involves background research, such as company searches, and identifying those involved?
It is common practice to assess which of the following in terms of high -probable?
Extortion is offering to keep information conﬁdential in return for money or other consideration.
Which of the following is one of the effective anti-fraud strategies?