/40 Welcome to your Fraud Management Diploma Exam Read the full study material ... Click here Start the exam ⇓ 1 / 40 Ditching, also known as owner give-ups, involves getting rid of which of the following to cash in on a insurance policy or to settle an outstanding loan? Life Health care Disability Vehicle 2 / 40 The transit number in the top right corner must match which of the following at the bottom of the cheque? The image number The electronically encoded number The identification number The company number 3 / 40 It is in the interest of which of the following to minimize credit card fraud? The issuing bank The cardholder The police 1 and 2 only 1 only 2 and 3 only 3 only 4 / 40 When taking control of any physical evidence, which of the following is essential? Original material Original evidence Fraud preventive Electronic evidence 5 / 40 Tellers should be advised to be alert for the customer who……………….. Signs the sales draft slowly or awkwardly All of the mentioned Purchases usual number of expensive items Takes a card from a wallet 6 / 40 …………., who simply carry on trading even when, objectively, they are not in a position to pay their debts, this can apply to ordinary traders or to major business people. Slippery-slope fraudsters Motivated fraudsters Pre-planned fraudsters Intermediate fraudsters 7 / 40 Which of the following is represents the highest risk area for financial institutions? Real Estate Fraud Loan fraud Credit card fraud Computer fraud 8 / 40 ………………… reimbursement occurs when providers receive payment for each service rendered. Fee for Service Salary Capitation Episode of Care 9 / 40 Which of the following is a method of transferring money by instructing a bank to directly transfer funds from one bank account to another without the use of cheques. Invoice Giro Wire transfer Cheque 10 / 40 The witness must be happy to sign the resulting document as a true record. False True 11 / 40 The fraud officer will usually have responsibility for any internal disciplinary procedures, which must be in line with and support the fraud policy statement. True False 12 / 40 A major reason why people commit fraud is that they are …............…. to do so. Need Mad Professional Allowed 13 / 40 An audit trail or other record of all processes applied to computer-based electronic evidence should be: Preserved Created and Preserved Secured Created 14 / 40 Falsified employment credentials e.g. qualifications and references is a pattern of: Non-financial Financial Non cash Cash 15 / 40 Which of the following is the process of verifying the qualifications, suitability, and experience of a potential candidate for employment? Awareness Pre-employment screening Client screening Forcing employees to take holidays 16 / 40 An effective cheque counterfeiting operation can turn a small financial investment into a large windfall within a 30-day time frame. True False 17 / 40 Based on recent surveys, many organizations don't have a formal approach to fraud prevention. False True 18 / 40 Who is will be responsible for maintaining an investigation log? Finance director Manager Supervisor Fraud officer 19 / 40 The audit committee should: All of the mentioned Monitor the integrity of the financial statements Review the investigation log of cases Assess the organization’s performance in fraud prevention 20 / 40 For Authentication to be effective, digital signatures use ……….......…….. technology to make them resistant to forgery. Sophisticated cryptographic Code Graphical handwriting All of the mentioned 21 / 40 Which of the following is/are one of the conflicting emotions influencing the potential ‘whistleblower’? Working group loyalties Fear of consequences Suspicion rather than proof 1. 2, and 3 1 only 1 and 2 only 1 and 3 only 22 / 40 A code of ethics or an anti-fraud policy is ……...............… to prevent fraud. A professional way None of the mentioned Not sufficient Sufficient 23 / 40 Which of the following can be used to identify any abnormal trends or patterns? Exception reporting System analysis Mathematical modeling Ratio analysis 24 / 40 In which of the following, the cash flow cannot support an inflated loan and resulting debt amount. Disguised transactions Bribery Land flips Fraudulent appraisals 25 / 40 Which of the following is one of the techniques of analysis of risk? Establishment Process cycle Brainstorming IT governance 26 / 40 Which of the following involves background research, such as company searches, and identifying those involved? Available data analysis Establishment the objective Establishment the scale of the risk Situation analysis 27 / 40 Which of the following is one of the Public and Private Systems in health care? None of the mentioned Direct Systems Single Payer Third-Party Payer 28 / 40 The largest amount of insurance fraud is in: Fidelity Life Health care Disability 4 only 1 and 2 only 2 and 4 only 3 only 29 / 40 Choosing to accept small risks is an example of : Risk retention Risk avoidance Risk reduction Risk transfer 30 / 40 Floating makes cheque kiting impossible False True 31 / 40 When accepting cheques, employees should always ask for which of the following and make sure it is valid. Invoice Trade License Money counting Identification 32 / 40 Which of the following is one of the red flags might identify mortgages containing false or misleading information? Borrower’s level of education is inconsistent with employment New home is too small for proposed occupants Buyer is downgrading All of the mentioned 33 / 40 After strategies are developed, it is necessary to establish the risk appetite of the organization. True False 34 / 40 Which of the following is one of the ways that health care systems can be classified? The payment system used None of the mentioned The method for calculating compensation The method for calculating compensation & The payment system used 35 / 40 Opportunities for cost savings may also be identified as a result of conducting the fraud risk assessment. False True 36 / 40 Which of the following is one of the types of suspense accounts at financial institutions that fraudsters might use? The safe of the organization Currency in transit Employee salary All of the mentioned 37 / 40 Which of the following is the practice of recording the deposit of an interbank transfer before recording the disbursement, thus briefly double- counting the amount of cash. Paperhanger Cheque kiting Cheque washing Stop Payment Order 38 / 40 An effective method of detecting bad cheques is to ……........……. a group of cheques. Counterfeit cheques will sometimes stand out as a slightly different color. Fan Transfer Hide Generate 39 / 40 Which of the following occurs when a fraudster dupes victims into providing sensitive information by falsely claiming to be from an actual business, the Internet service provider (ISP), or other entity with which the target does business. Password Cracking Reverse social engineering Phishing Spoofing 40 / 40 Altering legitimate purchase orders is a pattern of: Cash Payroll Procurement Fixed assets 0% Restart quiz