Other Fraud Schemes Flashcards

1
Q

A pharming scheme differs from phishing because:

A. The attacker delivers the solicitation message via telephones using Voice over Internet Protocol (VoIP) instead of email.
B. The attacker must rely on users clicking a link in an email or other message to direct them to the malicious website that is imitating a legitimate website.
C. The attacker does not have to rely on users clicking a link in an email or other message to direct them to the malicious website that is imitating a legitimate website.
D. The attacker delivers the solicitation message via short message service (also known as SMS or text messaging) instead of email.

A

C. The attacker does not have to rely on users clicking a link in an email or other message to direct them to the malicious website that is imitating a legitimate website.

See pages 1.1410-1.1411 in the Fraud Examiner’s Manual

Pharming is a type of attack in which users are fooled into entering sensitive data (such as a password or credit card number) into a malicious website that imitates a legitimate website. It is different from phishing because in pharming schemes, the attacker does not have to rely on users clicking a link in an email or other message to direct them to the imitation website.

In smishing schemes, the attacker uses text messages or other short message systems to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, internet service provider (ISP), or other entity with which the target does business.

In vishing schemes, the attacker leverages Voice over Internet Protocol (VoIP) in the telephone system to falsely claim to be a legitimate enterprise to scam users into disclosing personal information or executing an act that furthers a scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After paying the ransom demanded by the fraudster, a ransomware victim is always granted access to all locked files on the compromised computer.

A. True
B. False

A

B. False

See pages 1.1426-1.1427 in the Fraud Examiner’s Manual

Ransomware, as its name implies, is a form of malware that locks a user’s operating system and restricts access to data files until a ransom is paid. While some ransomware simply prevents access to files, other forms encrypt users’ files or steal data. This is concerning to businesses due to the potentially disastrous threat of encrypted network drives. These schemes typically promise that, after payment is received, the user will be provided with a key to release the system and unencrypt files; however, even after money is transferred, many victims find that the malware remains installed on their machine and a key is never provided.

Less sophisticated forms of ransomware have also appeared that claim to have encrypted victims’ files when the malware has simply deleted the files, thus tricking victims into paying to regain access to files that no longer exist. Some forms of this imitation ransomware go a step farther by deleting the restore points and registry keys needed to reboot a system in safe mode or overwriting deleted files to make them nearly impossible to recover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fraudsters often use stolen credit or debit cards to purchase prepaid gift or debit cards to quickly convert illicit card funds into a legitimate cash equivalent.

A. True
B. False

A

A. True

See pages 1.1020 in the Fraud Examiner’s Manual

Among the schemes that prepaid cards are used to facilitate are payment (i.e., credit or debit) card theft schemes. Thieves use stolen payment cards to purchase prepaid debit or gift cards, thus quickly converting the illicit payment card funds into a legitimate cash equivalent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

__________ is the term used for including additional coverages in an insurance policy without the insured’s knowledge.

A. Sliding
B. Churning
C. Twisting
D. None of the above

A

A. Sliding

See pages 1.1104 in the Fraud Examiner’s Manual

Sliding is the term used for including additional coverage in an insurance policy without the insured’s knowledge. The extra charges are hidden in the total premium. Since the insured is unaware of the coverage, few claims are ever filed. For example, motor club memberships, accidental death, and travel accident coverage can usually be added to the policy without the insured’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Susanna was arrested for committing a fraud scheme. During her arrest, she falsely identified herself as her cousin, Laura, so that the crime would be attributed to Laura instead of Susanna. This scheme is an example of which of the following?

A. Business identity theft
B. True name fraud
C. Criminal identity theft
D. Account takeover

A

C. Criminal identity theft

See pages 1.804-1.805, 1.807-1.808 in the Fraud Examiner’s Manual

Criminal identity theft occurs when fraudsters falsely identify themselves as other people to law enforcement while being arrested or investigated for a crime. The crime is then incorrectly attributed to the other person instead of the fraudster.

Financial identity theft occurs when a fraudster uses an individual’s personal information for fraudulent financial transactions. Examples of financial identity theft include:

  • Using an individual’s stolen credit card or credit card number to purchase goods (account takeover)
  • Impersonating an individual to gain access to the individual’s bank account (account takeover)
  • Using an individual’s personal information to open a new credit card account (true name fraud)

Business identity theft occurs when a fraudster impersonates a business to commit financial fraud. In addition to impersonating an existing business, fraudsters can use government business filings to reinstate a closed or dissolved business. They can also deceive third parties by creating a new business with a name similar to an existing business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All the following can help prevent a computer from infection by malicious software EXCEPT:

A. Updating the operating system regularly
B. Using anti-malware software
C. Installing shareware into a system’s root directory
D. Updating with the latest security patches

A

C. Installing shareware into a system’s root directory

See pages 1.1431-1.1432 in the Fraud Examiner’s Manual

The following measures can help avoid infection from a malicious program:

  • Use anti-malware software to scan all incoming email messages and files.
  • Regularly update virus definitions in anti-malware programs.
  • Use precaution when opening emails from acquaintances.
  • Do not open email attachments unless they are from trusted sources.
  • Only download files from reputable sources.
  • Regularly update the operating system.
  • Regularly update the computer with the latest security patches available for the operating system, software, browser, and email programs.
  • Ensure that there is a clean boot disk to facilitate testing with antivirus software.
  • Use a firewall and keep it turned on.
  • Consider testing all computer software on an isolated system before loading it.
  • In a network environment, do not place untested programs on the server.
  • Secure the computer against unauthorized access from external threats such as hackers.
  • Keep backup copies of production data files and computer software in a secure location.
  • Scan pre-formatted storage devices before using them.
  • Consider preventing the system from booting with a removable storage device (such as a USB flash drive); this might prevent accidental infection.
  • Establish corporate policies and an employee education program to inform employees of how malware is introduced and what to do if malware is suspected.
  • Encourage employees to protect their home systems as well. Many malware infections result from employees bringing infected storage devices or files from home.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The purpose of draw requests in construction lending is to provide:

A. Documentation that the construction project cannot continue without additional funding
B. Documentation that the design is approved by the International Union of Architects
C. Documentation that costs have been incurred and reimbursement is sought
D. Documentation that all architectural and engineering designs and quotes have been completed

A

C. Documentation that costs have been incurred and reimbursement is sought

See pages 1.908 in the Fraud Examiner’s Manual

Construction loan advances are generally supported by draw requests. A draw request is the documentation substantiating that a developer/borrower has incurred the appropriate construction expenses and is now seeking reimbursement or direct payment. A typical fraud scheme that occurs in a draw request involves requesting advances on the loan for inappropriate costs, such as personal expenses and/or construction costs for an unrelated project. Draw requests might provide the greatest opportunity for a developer to commit fraud because the lender relies upon the developer’s documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is NOT an indicator that a computer or network might have been accessed or compromised by an unauthorized user or entity?

A. Users are prompted to install unusual software or patches onto their computers.
B. Users receive a notification to update their system passwords before they expire.
C. An authorized user is denied access to an area in the network that is part of their role.
D. A user in the IT department detects geographical irregularities in network traffic.

A

B. Users receive a notification to update their system passwords before they expire.

See pages 1.1402-1.1403 in the Fraud Examiner’s Manual

Recognizing that a computer or network has been accessed by an unauthorized user or entity is one of the most important elements of cybersecurity. Signs that attackers have accessed or are currently attempting to access a system might be referred to as indicators of compromise (IOCs) or indicators of attack (IOAs) depending on the context. Regardless of the technical labels a cybersecurity professional might use to describe an indication of intrusion, it is important for fraud examiners and other computer system users to recognize signs that intruders have accessed or affected the system, which can include unusual inbound or outbound network traffic, anomalies in user access to network files, or unusual network or computer performance.

Every day, organizations’ networks experience inbound and outbound traffic as part of normal business operations. Among the typical types of traffic are emails sent to and from employees, as well as data transmitted to or from the internet. Abnormal traffic, either higher or lower than usual, could be an indication that an attacker has gained access to an organization’s network and is manipulating traffic by sending malicious software to the network or exfiltrating data from it. A common sign of unusual network traffic includes geographical irregularities related to network access and traffic.

Most organizations employ a system that restricts access to sensitive files or information on their network to those who require that access as part of their organizational role, and user patterns typically reflect access that aligns with normal business habits. Any abnormalities or outliers to the usual access patterns could indicate that the network has been compromised by an insider or external actor and might include passwords that are not working or bundles of data in the incorrect place.

Many different types of computer and network intrusion or compromise can result in performance issues for the computers or networks that are presumed to be affected, whether the issues relate to malware infection, external unauthorized access, or insider actions. Some unusual performance issues that could indicate that a computer or network is compromised include unexpected patching of systems or the installation of unwanted or unknown software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All the following are methods of identity theft prevention that are recommended for businesses EXCEPT:

A. Limiting employees from accessing the personal information of customers
B. Performing audits of practices involving the handling of information only when regulators require it
C. Conducting background checks on prospective employees when permitted by law to gather that information
D. Restricting the use of laptops to those employees who need them to do their jobs

A

B. Performing audits of practices involving the handling of information only when regulators require it

See pages 1.816 in the Fraud Examiner’s Manual

The following are some of the steps that businesses can take to protect personal information and prevent identity theft:

  • Limit the personal information collected from customers. For example, do not collect government identification numbers from customers unless there is a legal requirement to gather that information.
  • Restrict employees from accessing the personal information of customers and coworkers.
  • Use network-security tools to monitor who accesses personal information.
  • Do not retain personal information for longer than necessary.
  • Adopt a policy regarding the handling of information that governs how personal information is stored, protected, and disposed of. Strictly enforce the policy, and discipline employees who violate it.
  • Conduct regular employee training on the company’s policy regarding the handling of information and best practices for preventing identity theft.
  • Ensure the security of buildings by using locks, access codes, and other security features.
  • Keep physical documents containing personal information in locked rooms or locked file cabinets.
  • Secure all computer networks and electronic information.
  • Use encryption to protect all personal information stored by the company or sent to third parties. Encryption should also be used to protect information sent over the company’s wireless network.
  • Restrict the use of laptops to those employees who need them to do their jobs.
  • Require employees to use complex passwords or passphrases.
  • Where permitted by law, perform background checks on prospective employees.
  • Thoroughly investigate contractors and vendors before hiring them.
  • Do not use government identification numbers as employee identification numbers or print them on paychecks.
  • Perform regular audits of practices involving the handling of information, network security, and other internal controls.
  • Create a data breach response plan.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

High percentages of returns, missing compliance certificates, and evidence of falsified test inspection results are red flags of which of the following procurement fraud scenarios?

A. A contractor charging the procuring entity for labor costs that are not permissible
B. A contractor delivering goods or services that do not conform to the contract specifications
C. Two or more competing contractors agreeing to refrain from bidding
D. A procuring employee manipulating the bidding process to benefit a favored contractor

A

B. A contractor delivering goods or services that do not conform to the contract specifications

See pages 1.1523-1.1525 in the Fraud Examiner’s Manual

Nonconforming goods or services fraud, also known as product substitution or failure to meet contract specifications, refers to attempts by contractors to deliver goods or services to the procuring entity that do not conform to the underlying contract specifications. Once contractors deliver goods that do not conform to the contract, they bill and receive payment for conforming goods or services without informing the purchaser of the deficiency.

The following is a list of potential red flags for nonconforming schemes:

  • High percentage of returns for noncompliance regarding specifications
  • Missing, altered, or modified product compliance certificate
  • Compliance certificates signed by employees with no quality assurance responsibilities
  • Materials testing done by supplier, using the supplier’s own personnel and facilities
  • Evidence that test or inspection results were falsified (e.g., documents appear altered or modified, test documents are illegible, signatures on documents are illegible, documents were signed by unqualified or inappropriate personnel, or test reports are similar or identical to sample descriptions and test results)
  • Highest profit product lines have the highest number of material return authorizations or reshipments
  • Discrepancy between product’s description or normal appearance and actual appearance (e.g., a new product appears to be used)
  • Used, surplus, or reworked parts are delivered
  • Delivery of products that appear counterfeit (e.g., product packaging, appearance, and description do not appear genuine; items that are consistently defaced in the same area; items that appear different from each other)
  • Offers by contractors to select the sample and prepare it for testing
  • Delivery of look-alike goods
  • Unusually high number of early replacements
  • Contractor restricts or avoids inspections of goods or services upon delivery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unscrupulous debt consolidation schemes include each of the following EXCEPT:

A. The debt consolidation company writes a letter to the debtor’s creditors and arranges a payment plan.
B. The debt consolidation company charges an up-front processing fee and then disappears.
C. The debt consolidation company guarantees the debtor will receive a loan or credit card regardless of the debtor’s credit ratings.
D. The debt consolidation company collects payments but does not appropriately forward them.

A

A. The debt consolidation company writes a letter to the debtor’s creditors and arranges a payment plan.

See pages 1.1302 in the Fraud Examiner’s Manual

Unscrupulous debt consolidation schemes often involve the agency collecting the money from the debtor but not forwarding it to the creditors. In some instances, considerable time can pass before the debtor discovers that their money has been misappropriated. Another variation of the debt consolidation scheme occurs when customers are guaranteed that they will receive a loan or a credit card regardless of their credit rating. Typically, the victims have been rejected by legitimate financial institutions because their credit ratings are poor. The victim must pay a processing fee for the application to be accepted. After the victim pays the fee, the fraudster disappears.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To conduct an electronic payment using a person-to-person (P2P) system, the two individuals must meet in person at a financial institution to sign an order requesting the transfer of money from one person’s account to the other.

A. True
B. False

A

B. False

See pages 1.1031 in the Fraud Examiner’s Manual

Individuals can pay each other for goods or services electronically, which is known as the person-to-person (P2P) system. Many credit cards and banks offer this service to their customers. P2P payments can now be made through a variety of services using a computer, smartphone application, or email address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a way that dishonest contractors collude to evade the competitive bidding process?

A. Submit bids that are competitive in price.
B. Submit invoices for work that was not performed or materials that were not delivered.
C. Use obscure publications to publish bid solicitations.
D. Submit token bids that are not genuine attempts to win the contract.

A

D. Submit token bids that are not genuine attempts to win the contract.

See pages 1.1511 in the Fraud Examiner’s Manual

Schemes involving collusion among contractors seek to evade the competitive bidding process. In these schemes, competitors in the same market collude to defeat competition or to inflate the prices of goods and services artificially.

Complementary bidding (also known as protective, shadow, or cover bidding) is a common form of collusion between competitors, and it occurs when competitors submit token bids that are not genuine attempts to win the contract. Token bids give the appearance of genuine bidding, but, by submitting token bids, the conspirators can influence the contract price and who is awarded the contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are considered red flags of insider cyberfraud?

I. Access privileges are limited to those required to perform assigned tasks.
II. Access logs are not reviewed.
III. Production programs are run during normal business hours.
IV. Exception reports are not reviewed and resolved.

A. I and III only
B. I, II, III, and IV
C. III and IV only
D. II and IV only

A

D. II and IV only

See pages 1.1405 in the Fraud Examiner’s Manual

The following are conditions that produce an environment that is conducive to, or facilitates, insider cyberfraud:

  • Access privileges are beyond those required to perform assigned job functions.
  • Exception reports are not reviewed and resolved.
  • Access logs are not reviewed.
  • Production programs are run at unusual hours.
  • Lack of separation of duties exists in the data center.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the BEST definition of the automobile insurance scheme known as ditching?

A. An insured falsely reports a vehicle as stolen to collect on an insurance policy.
B. An agent inflates their commissions by pressuring customers to unnecessarily replace existing policies for new ones.
C. An insured has two insurance policies in place and files claims with both.
D. An agent collects a customer’s premium but does not remit the payment to the insurance company.

A

A. An insured falsely reports a vehicle as stolen to collect on an insurance policy.

See pages 1.1105 in the Fraud Examiner’s Manual

Ditching, also known as owner give-ups, involves disposing of a vehicle to collect on an insurance policy or settle an outstanding loan. The vehicle is normally expensive and purchased with a small down payment. The owner falsely reports the vehicle as stolen while orchestrating its destruction or disappearance in some way, such as by having it stripped for parts, burned, or submerged in a large body of water. In some cases, the owner just abandons the vehicle, hoping that it will be stolen. Sometimes the scheme involves a homeowner’s insurance claim for the property that was supposedly in the vehicle when it was “stolen.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If an insurance company fails to follow procedures to detect fraudulent claims when acting as an intermediary for a government health care program, it can be found guilty of fraud in some jurisdictions.

A. True
B. False

A

A. True

See pages 1.1231 in the Fraud Examiner’s Manual

When an insurance company acts as an intermediary administering a government health care program, the insurance company has a duty to try to detect false claims by providers and beneficiaries. Although it is impossible to detect every fraudulent claim, if a company bypasses its own claims verification procedures, it can be found guilty of fraud in some jurisdictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

All the following are correct statements about identity theft EXCEPT:

A. Solicitations for pre-approved credit cards are especially valuable to identity thieves.
B. The type of malware that is most commonly associated with identity theft is ransomware.
C. One way to conceal identity theft is to change the victim’s mailing address.
D. Identity thieves often engage in pretexting by impersonating the victim’s bank.

A

B. The type of malware that is most commonly associated with identity theft is ransomware.

See pages 1.809-1.811, 1.814 in the Fraud Examiner’s Manual

Identity thieves use malware to steal personal and business information from computers. The type of malware that is most commonly associated with identity theft is spyware, which is software that collects and reports information about a computer user without the user’s knowledge or consent.

Dumpster diving can yield bills, credit card receipts, bank statements, and other items that contain a person’s name, address, and telephone number. Solicitations for pre-approved credit cards are especially valuable to identity thieves, but even nonfinancial information can be useful.

Another way to obtain personal or business information is to surreptitiously change the victim’s mailing address (or email address) to an address selected by the identity thief. In this way, the identity thief receives the victim’s mail directly, and no theft is required.

Identity thieves often engage in pretexting by impersonating the victim’s bank or another financial institution with which the victim has a business relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Insurance agent/broker fraud includes which of the following?

A. Fictitious death claims
B. Premium theft
C. Fictitious payees
D. All of the above

A

D. All of the above

See pages 1.1102-1.1103 in the Fraud Examiner’s Manual

Types of insurance agent/broker fraud include:

  • Premium theft—An agent collects the premium but does not remit the payment to the insurance company. Thus, the insured unknowingly has no coverage available upon a qualifying event.
  • Fictitious payees—An agent or a clerk changes the beneficiary on record to a fictitious person and subsequently submits the necessary papers to authorize the issuance of a payment.
  • Fictitious death claims—An agent or employee obtains a fictitious death certificate and requests that a death claim payment be issued. The agent then steals the payment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following statements about vendor management best practices is INCORRECT?

A. The person who maintains the vendor master file should have the authority to approve payments for invoices.
B. Vendor master files should be kept current to reduce the risk of duplicate payments.
C. The procedures used to monitor vendors should address the red flags of vendor schemes that pose the greatest risk.
D. Vendors should be subject to a background check before they are added to the vendor master file.

A

A. The person who maintains the vendor master file should have the authority to approve payments for invoices.

See pages 1.1536 in the Fraud Examiner’s Manual

The person responsible for the vendor master file should not be authorized to approve payments for invoices or to sign checks.

Procurement entities must maintain an accurate and up-to-date vendor master file. An inaccurate or incomplete vendor master file can result in greater risks of duplicate payments, unfavorable payment terms, and noncompliance regarding regulations. Thus, the vendor master file should be updated continuously and reviewed on a regular basis for inaccurate or incomplete records.

To manage vendors, a procuring entity must establish clear procedures for setting up new vendors and changing vendor master file records. For example, procuring entities should require accounts payable personnel to verify new vendors (i.e., ensure that the vendors are qualified) by conducting a vendor background check before entering them into the vendor master file.

Procuring entities must also use monitoring and auditing systems reasonably designed to detect criminal conduct by their vendors. The procedures to monitor vendors are similar to those used to evaluate vendors, and they should address red flags of vendor schemes that pose the greatest risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A draw request on a construction loan should be accompanied by all the following EXCEPT:

A. Inspection reports
B. Lien releases from subcontractors
C. Change orders, if applicable
D. Expenses from similar contracts

A

D. Expenses from similar contracts

See pages 1.908-1.909 in the Fraud Examiner’s Manual

A draw request is the documentation substantiating that a developer has incurred the appropriate construction expenses and is now seeking reimbursement or direct payment. Generally, draw requests on construction loans are made on a periodic schedule (e.g., once a month) and are verified by a quantity surveyor (QS) or other authorized entity as agreed to by the financial institution. The request should be accompanied by the following documents:

  • Paid invoices for raw materials
  • Lien releases from each subcontractor
  • Inspection reports
  • Canceled checks from previous draw requests
  • Bank reconciliation for construction draw account for previous month
  • Loan balancing form demonstrating that the loan remains in balance
  • Change orders, if applicable
  • Wiring instructions, if applicable
  • Proof of developer contribution, if applicable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following BEST describes a linked financing loan fraud scheme?

A. Borrowers pledge the same collateral with different lenders before liens are recorded without telling the lenders.
B. Unqualified borrowers misrepresent personal creditworthiness, overstate their ability to pay, and misrepresent characteristics of a housing unit.
C. Insiders in different banks cause their banks to lend funds or sell loans to other banks with agreements to buy their loans.
D. Large deposits (usually brokered deposits) are offered to a bank on the condition that loans are made to individuals affiliated with the deposit broker.

A

D. Large deposits (usually brokered deposits) are offered to a bank on the condition that loans are made to individuals affiliated with the deposit broker.

See pages 1.905-1.906 in the Fraud Examiner’s Manual

In a linked financing scheme, large deposits (usually brokered deposits) are offered to a bank on the condition that loans are made to individuals affiliated with the deposit broker.

In a residential loan fraud scheme, unqualified borrowers misrepresent personal creditworthiness, overstate their ability to pay, and misrepresent characteristics of a housing unit they intend to occupy or treat as an investment property to qualify for a loan.

In double-pledging collateral schemes, borrowers pledge the same collateral (i.e., an item of value used to secure or guarantee a loan) with different lenders before liens are recorded without telling the lenders.

In a reciprocal loan arrangements scheme, insiders in different banks cause their banks to lend funds or sell loans to other banks with agreements to buy their loans, which is done to conceal loans and sales.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

One method that competitive intelligence professionals commonly use to gather data about a competitor involves posing as a job applicant and interviewing with key employees at the competing company. This practice is BEST described as conducting surveillance.

A. True
B. False

A

B. False

See pages 1.707-1.708 in the Fraud Examiner’s Manual

Intelligence professionals might gather data through human intelligence (i.e., through direct contact with people). Generally, human intelligence is gathered from subject-matter experts and informed individuals. Such efforts typically target individuals who can provide the most valuable information.

For example, an intelligence professional might gather intelligence by posing as a customer of the target entity. This approach exploits two weaknesses of corporate culture: (1) all salespeople want to make a sale and (2) many salespeople will do almost anything to make a sale. Other approaches include:

  • Employment interviews (real and fake)
  • False licensing negotiations
  • False acquisition or merger negotiations
  • Hiring an employee away from a target entity
  • Planting an agent in a target organization
  • Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

An address similarity report is an electronic insurance fraud detection tool that compares multiple payments going to the same address.

A. True
B. False

A

A. True

See pages 1.1123 in the Fraud Examiner’s Manual

Data analysis is an effective tool used to detect insurance fraud schemes. By using data analytics, fraud examiners can generate reports that provide good leads to possible fraud. For example, address similarity reports electronically compare multiple payments going to the same address. These reports are extremely useful because they might show a payment defalcation or funds going to another insurance company, broker, or fictitious payee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following activities does NOT typically occur during the containment and eradication step of the recommended methodology for responding to cybersecurity incidents?

A. Identifying all breaches that occurred
B. Restoring control of the affected systems
C. Limiting the damage caused by the attack
D. Notifying the appropriate internal personnel

A

A. Identifying all breaches that occurred

See pages 1.1462-1.1463, 1.1465 in the Fraud Examiner’s Manual

Every organization should be ready to respond to a wide range of cybersecurity incidents, including cyberattacks and data breaches. The recommended methodology for responding to cybersecurity incidents can be summarized in the following steps:

  1. Preparation
  2. Detection and analysis
  3. Containment and eradication
  4. Breach notification
  5. Recovery and follow-up

The focus of the detection and analysis step is to identify incidents of breach as quickly as possible.

During the containment and eradication step, management must rely on its preparation and planning to mitigate the attack effectively and efficiently. The idea is to restore control of the affected systems and limit the damage. Other considerations, such as identifying the intruder, are important, but maintaining control of the system is a primary concern. Also, appropriate personnel must be notified in accordance with the incident response plan. Information about the attack should be distributed on a need-to-know basis. Managers need to distribute enough information to effectively combat the problem without creating panic or additional vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Maria, a successful restaurateur, has been informed of an unusually attractive investment opportunity by a recent acquaintance and decides to invest in it. Several months and a couple of underwhelming payments later, Maria grows frustrated with the diminishing disbursements and attempts to withdraw her money. After several weeks of delay, she realizes that the promoter seems to have vanished, along with her investment. Maria is the victim of which of the following fraudulent ploys?

A. An illegal pyramid
B. A Ponzi scheme
C. A dog and pony scam
D. A fly and buy scheme

A

B. A Ponzi scheme

See pages 1.1334-1.1345 in the Fraud Examiner’s Manual

A Ponzi scheme is generally defined as an illegal business practice in which new investors’ money is used to make payments to earlier investors. The investment opportunity is typically presented with the promise of uncommonly high returns. While the scam is presented as a legitimate investment, there is minimal or no actual commerce involved. When an enterprise promotes an investment opportunity that invests a minimal amount or none of the participants’ money and uses new investments to make dividend payments, the enterprise is running a Ponzi scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is a poor information security procedure that contributes to loss of proprietary information?

A. Failure to practice data minimization
B. Failure to implement data retention and destruction policies
C. Failure to guard documents maintained in manual file systems
D. All of the above

A

D. All of the above

See pages 1.743-1.744 in the Fraud Examiner’s Manual

To prevent the loss or misuse of sensitive data or proprietary information, organizations should develop and implement risk-based information-security systems designed to detect and prevent unauthorized access to sensitive information. An information security system requires controls that are designed to ensure that data are used as intended, and such controls will depend on the combination and coordination of people, processes, technologies, and other resources.

To be effective, a system for safeguarding sensitive and proprietary information should include the following:

  • Task force
  • Security risk assessments
  • Security policies and procedures
  • Awareness training
  • Nondisclosure agreements
  • Noncompetition agreements
  • Data classification
  • Data retention and destruction policies
  • Data minimization
  • Security controls
  • Measures to guard manual file systems
  • Monitoring of visitor access
  • Quiet room
  • Incident response plan

The failure to include any of these measures is a poor information security practice that can contribute to the loss of proprietary information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

All the following are types of medical provider fraud EXCEPT:

A. Clinical lab schemes
B. Fictitious providers
C. Fictitious services
D. Smurfing

A

D. Smurfing

See pages 1.1205-1.1207 in the Fraud Examiner’s Manual

Fictitious services, clinical lab schemes, and fictitious providers are all types of medical provider fraud.

In a fictitious services scheme, legitimate health care providers charge or bill a health care program for services that were not rendered at all. Often, the providers submit bills for patients they have never seen but whose private patient information they purchased from someone involved in identity theft or someone who otherwise improperly obtained it.

In a fictitious provider scheme, corrupt providers or other criminals fraudulently obtain and use another provider’s identification information and steal or purchase lists of patients’ identifying information. Thereafter, the perpetrator submits bills using the fictitious provider’s information to the insurance provider or government health care program for medical services although no services are performed.

Clinical lab schemes occur when a provider advises a patient that additional medical testing is needed to diagnose a problem when the testing is not actually required or advisable. The fee for the unnecessary work is often split with physicians. In some cases, physicians own the medical testing service. Additional medical testing, which is later viewed as excessive, is not always fraud. Many doctors have a genuine fear of retaliation from their patients; they are afraid of malpractice lawsuits that might result from a delayed or erroneous diagnosis.

Smurfing is a scheme to launder funds through financial institutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

hich of the following is NOT an example of a business email compromise (BEC) scheme?

A. Fraudsters use botnets to send massive amounts of emails for the purpose of enticing the recipients to click on a fraudulent URL.
B. Fraudsters use the compromised email account of an executive to request employees’ personally identifiable information from the person who maintains such information.
C. Fraudsters use the compromised email account of a high-level executive to pose as the executive and ask an employee to transfer funds to the fraudsters’ account.
D. Fraudsters posing as a company’s foreign supplier send an email to the company and request that funds be transferred to an alternate account controlled by the fraudsters.

A

A. Fraudsters use botnets to send massive amounts of emails for the purpose of enticing the recipients to click on a fraudulent URL.

See pages 1.1408-1.1409 in the Fraud Examiner’s Manual

Business email compromise (BEC) is a form of spear phishing attack that directly targets employees who can make large payments or who have access to sensitive proprietary information. BEC schemes typically involve fraudulent emails that appear to be from the company’s own chief executive officer (CEO) or from the head of a foreign supplier that the company has done business with for years. The emails often instruct the employee to perform a time-sensitive wire transfer to ensure that the supply chain is not disturbed, but the scheme has evolved to feature other methods or requests. Common scenarios for BEC schemes include:

  • Business working with a foreign supplier—Fraudsters posing as a company’s foreign supplier send an email to the company and request that funds be transferred to an alternate account controlled by the fraudsters.
  • Business executive requesting a wire transfer—Fraudsters use the compromised email account of a high-level executive to pose as the executive and ask an employee to transfer funds to the fraudsters’ account.
  • Direct deposit changes—Rather than asking for a wire transfer or specific payment, some fraudsters executing BEC schemes pose as company executives or other high-ranking employees and request that account information associated with the direct deposit of their payroll checks be changed, thereby redirecting the funds into a new account.
  • Real estate payments—Fraudsters posing as realtors, title company employees, or lawyers request a change in wire transfer payment instructions related to a sale of property, redirecting funds into a new account.
  • Data theft—Fraudsters use the compromised email account of a high-level executive to request employees’ tax information or other personally identifiable information from the person responsible for maintaining such information (e.g., HR personnel). The stolen data might then be used to commit a variety of fraud schemes.
  • Gift cards—Fraudsters pose as an executive and request that an assistant or subordinate purchase gift cards from retailers under the pretense that they will be gifts for family or employees and the executive is too busy to do the shopping themselves. These schemes are more likely to occur near holidays and typically involve the fraudsters requesting gift card numbers and personal identification numbers (PINs).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Payment card counterfeiting operations might include the use of which of the following?

A. Embossed blank plastic cards
B. High-speed printers
C. Desktop computers, embossers, tipping foil, and laminators
D. All of the above

A

D. All of the above

See pages 1.1015-1.1016 in the Fraud Examiner’s Manual

One common method of producing counterfeit payment cards includes the use of blank plastic cards. This scheme uses plastic the size of a payment card that is embossed with account numbers and names. This scheme often works in conjunction with a corrupt and collusive merchant or a merchant’s employee. Other counterfeit cards are wholly manufactured using high-speed printers. Additional tools that are common in the reproduction process include desktop computers, embossers, tipping foil, and laminators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In a third-party health care fraud scheme perpetrated by a patient, the patient makes misrepresentations on an insurance application to circumvent coverage restrictions.

A. True
B. False

A

B. False

See pages 1.1229 in the Fraud Examiner’s Manual

Third-party fraud involves the unauthorized use of an insured’s identity to obtain their insurance benefits. The insured usually discovers the fraud when they receive a benefit statement containing medical services they did not receive.

In misrepresentations on applications schemes, patients sometimes make misrepresentations on their insurance applications to circumvent coverage restrictions. Misrepresentations can include false information or the omission of relevant information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is an appropriate technique for detecting change order abuse?

A. Reviewing any change orders submitted by the contractor that add new items
B. Examining change orders that increase the scope or price of the existing contract
C. Interviewing complaining contractors and unsuccessful bidders about the presence of red flags
D. All of the above

A

D. All of the above

See pages 1.1526-1.1527 in the Fraud Examiner’s Manual

A change order is a written agreement between the procuring entity and the contractor to make changes in a signed contract. Change order abuse is a performance scheme that involves collusion between the contractor and personnel from the procuring entity. In change order abuses, a corrupt contractor submits a low bid to ensure that it wins the contract award, but, after the procuring entity awards the contract, the corrupt contractor increases its price with subsequent change orders.

Fraud examiners can detect change order abuse by engaging in the following activities:

  • Examining change orders that add new items to the contract
  • Examining change orders that increase the scope, quantity, or price of the existing contract
  • Analyzing change orders for red flags
  • Interviewing complaining contractors, unsuccessful bidders, and procurement personnel about the presence of any red flags
  • Searching and reviewing external records (e.g., court records, prior complaints, audit reports, investigative reports, media sources) to determine if there is any history of misconduct
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A confidence scheme designed to part victims from their money by falsely promising the future delivery of a product or service in exchange for an up-front payment is called a(n):

A. Home-based business scheme
B. Bait and switch scheme
C. Advance-fee scheme
D. Scavenger scheme

A

C. Advance-fee scheme

See pages 1.1302 in the Fraud Examiner’s Manual

Advance-fee schemes are structured to obtain an illegal gain by falsely promising the delivery of a product or service. In some schemes, the product is marketed to several customers, and then the operation is shut down prior to the delivery stage. Common scenarios used to commit advance-fee scams include the following:

  • A home improvement contractor requires prepayment for materials.
  • Notice of a supposed inheritance from an unknown relative is received.
  • Various exorbitant fees are required prior to securing financial assistance or advice.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following statements regarding new account fraud is LEAST ACCURATE?

A. New account fraud can be defined as any fraud that occurs on an account within the first ninety days that it is open.
B. Fraud is more likely to occur in accounts that have been newly opened than in established accounts.
C. Automated teller machines (ATMs) are often enticing targets for new account fraud because they do not require in-person transactions with bank tellers.
D. Mobile deposits are at low risk for new account fraud because they involve sending digital images of payment orders to financial institutions rather than providing physical copies.

A

D. Mobile deposits are at low risk for new account fraud because they involve sending digital images of payment orders to financial institutions rather than providing physical copies.

See pages 1.936-1.938 in the Fraud Examiner’s Manual

Fraud is much more likely to occur in new accounts than in established accounts. New account fraud is generally defined as fraud that occurs on an account within the first ninety days that it is open; often, perpetrators open these accounts with the sole intent of committing fraud.

Financial institutions are increasingly allowing mobile deposits, which typically involve a person sending a digital image of a check or similar payment order to the depository institution so that the paper document never has to be received or processed. There is a relatively high risk of new account fraud with mobile deposits for two main reasons. First, there is no face-to-face transaction required, and fraudsters prefer to maintain anonymity. Second, the digital image is often taken by a camera or a scanner, so it is easier to make forged or counterfeit deposits.

Financial institutions should also consider the increased risk of new account fraud when offering automated teller machines (ATMs) that accept deposits. Like with mobile deposits, the fact that ATM deposits do not require in-person transactions with a teller is ideal for fraudsters. Many ATMs have cameras to help identify users, but ATMs are often enticing targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following scenarios is an example of a multiple claims health care fraud scheme as perpetrated by a patient?

A. Julia uses a stolen government identification number to impersonate a stranger and obtain medical services for herself.
B. James visits several local emergency rooms and falsely claims to have severe back pain in an effort to obtain prescription pain medication.
C. Roberta files medical claims with her ex-husband’s private insurer even though the divorce makes her ineligible for benefits under the policy.
D. Bill obtains double reimbursement for his hip replacement surgery by filing claims with different insurers.

A

D. Bill obtains double reimbursement for his hip replacement surgery by filing claims with different insurers.

See pages 1.1228-1.1230 in the Fraud Examiner’s Manual

Bill committed a multiple claims scheme by filing multiple claims for reimbursement for the same medical service. Patients commit fraud when they make a claim for a covered expense without revealing that they have already received reimbursement for that expense. For example, patients might seek reimbursement for the same medical service from both the government and a private insurer, two different private insurers, or two different government health care programs.

James committed a doctor shopping scheme in which patients “shop” (i.e., search) for multiple doctors who will provide controlled substances.

Patients, such as Roberta, sometimes seek reimbursement for ineligible claimants. For example, if a primary beneficiary dies, any secondary beneficiary named in the policy is generally ineligible for benefits. However, the secondary beneficiary might fail to notify the insurer of the death and continue to submit claims. Divorced parties can also commit ineligible claimant fraud. For example, suppose that a primary beneficiary and a covered spouse file for divorce, but neither party notifies the health care program. The ex-spouse might continue to submit claims even though they are no longer eligible for benefits.

Julia committed third-party fraud, which involves the unauthorized use of an insured’s identity to obtain insurance benefits. The insured usually discovers the fraud when they receive a benefit statement containing medical services they did not receive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

All the following are health care fraud schemes that are commonly perpetrated by patients EXCEPT:

A. Third-party fraud
B. Doctor shopping
C. Over-utilization
D. Multiple claims fraud

A

C. Over-utilization

See pages 1.1207, 1.1228 in the Fraud Examiner’s Manual

There are various fraud schemes that patients can perpetrate against government health care programs and private insurers, including:

  • Fictitious claims
  • Multiple claims
  • Doctor shopping
  • Misrepresentations on applications
  • Altered bills
  • Third-party fraud
  • Ineligible claimants

Over-utilization occurs when a physician prescribes unnecessary or excessive patient services. This is a scheme perpetrated by providers, not patients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following is NOT a common carrier of malware?

A. Email attachments
B. Files downloaded from the internet
C. Dual in-line memory modules
D. Freeware and shareware files

A

C. Dual in-line memory modules

See pages 1.1419-1.1420 in the Fraud Examiner’s Manual

Malware can infect computer systems from many sources. Some of the more common carriers of malware include:

  • Unknown or unchecked application software
  • Infected websites
  • Banner ads
  • Software or media that employees bring to work
  • Files downloaded from the internet
  • Infected software from vendors and suppliers
  • Uncontrolled and shared program applications
  • Files uploaded from storage devices, such as USB flash drives
  • Demonstration software
  • Freeware and shareware files
  • Email attachments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which of the following statements about ransomware is TRUE?

A. Ransomware is a program or command procedure that appears useful but contains hidden code that causes damage.
B. Ransomware is a classification of malware designed to simplify or automate online criminal activities.
C. Ransomware is a form of malware that locks a user’s operating system and restricts access to data files until a payment is made.
D. Ransomware is a type of software that collects and reports information about a computer user without the user’s knowledge or consent.

A

C. Ransomware is a form of malware that locks a user’s operating system and restricts access to data files until a payment is made.

See pages 1.1425-1.1427, 1.1429 in the Fraud Examiner’s Manual

Ransomware, as its name implies, is a form of malware that locks a user’s operating system and restricts access to data files until a ransom is paid. To intimidate internet users into compliance, ransomware often employs a convincing professional interface, commonly emblazoned with police insignia or an official government logo. Messages sometimes consist of threatening accusations that the user has been caught viewing illegal videos, downloading pirated media, or otherwise accessing forbidden internet content, with the only remedy being to pay a fine. Other forms are far more direct and make no effort to conceal their obvious attempts at extortion.

Spyware is a type of software that collects and reports information about a computer user without the user’s knowledge or consent.

A Trojan horse is a program or command procedure that appears useful but contains hidden code that causes damage. When the hidden code in a Trojan horse is activated, it performs some unwanted or harmful function. Often, viruses and worms attach themselves to other legitimate programs, becoming Trojan horses and spreading to other systems.

Crimeware is not a type of malware but rather a classification of malware denoted by its intent to facilitate criminal behavior. Crimeware can be described as malware designed to simplify or automate online criminal activities, such as programs to fraudulently obtain financial gain from the affected user or other third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

In a ____________ scheme, unqualified borrowers misrepresent personal creditworthiness, overstate their ability to pay, and misrepresent characteristics of the housing unit to qualify for a loan.

A. Reciprocal loan arrangements
B. Residential loan fraud
C. Double-pledging collateral
D. Credit data blocking

A

B. Residential loan fraud

See pages 1.905-1.906 in the Fraud Examiner’s Manual

In a residential loan fraud scheme, unqualified borrowers misrepresent personal creditworthiness, overstate their ability to pay, and misrepresent characteristics of a housing unit they intend to occupy or treat as an investment property to qualify for a loan. Such acts might include reporting inflated income, moving debt into a dependent’s name, reporting inflated square footage of the collateral, or even bribing an appraiser to value the home at a higher amount than the market value.

In double-pledging collateral schemes, borrowers pledge the same collateral (i.e., an item of value used to secure or guarantee a loan) with different lenders before liens are recorded without telling the lenders.

In a reciprocal loan arrangements scheme, insiders in different banks cause their banks to lend funds or sell loans to other banks with agreements to buy their loans, which is done to conceal loans and sales.

In a credit data blocking scheme, the perpetrator first applies for and obtains loans but intentionally defaults on the loans. Rather than allowing their credit report to reflect the defaulted loans, the perpetrator asserts that the initial loans were instances of identity theft. While the validity of the fraud claims is checked, the perpetrator’s negative credit history is temporarily removed from their credit report. This allows the perpetrator to take out more loans, which they will also intentionally default on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A pyramid scheme is promoted by encouraging victim investors to recruit new members. The more members recruited, the higher the investor rises in the ranks of the enterprise and the more money the investor is supposed to make.

A. True
B. False

A

A. True

See pages 1.1339, 1.1345 in the Fraud Examiner’s Manual

In an illegal pyramid scheme, the more members that are recruited, the higher the investor is purported to rise in the ranks of the enterprise and the more money the investor is supposed to make.

The difference between a Ponzi scheme and an illegal pyramid is how the operation is promoted. Illegal pyramids are promoted as pyramids whereas Ponzi schemes are promoted as investment opportunities. In an illegal pyramid, the pyramidal structure helps recruit new participants, each believing that they will rise through the ranks of the pyramid. A Ponzi scheme, however, masquerades as some type of investment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

When a fraudster calls someone at the target company and persuades or tricks the person into providing valuable information, that corporate espionage technique is referred to as which of the following?

A. Social engineering
B. Replicating
C. Spamming
D. None of the above

A

A. Social engineering

See pages 1.719 in the Fraud Examiner’s Manual

Social engineering is the act of using deceptive techniques to manipulate people into taking certain actions or disclosing information.

In social engineering schemes, social engineers use various forms of trickery, persuasion, or threats to encourage their targets to release information that the engineers can use and exploit to achieve their goals.

Attackers engage in social engineering for various reasons. Some use social engineering to gain unauthorized access to systems or obtain confidential communication so that they can commit fraud, intrude into networks, gain access to buildings, steal another party’s secrets, commit identity theft, or engage in some other nefarious act. In some situations, attackers use social engineering to procure information that will give them a competitive advantage, whereas others might engage in social engineering to find ways in which they can install malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

In a(n) _____________ scheme, the company that initially defrauded a consumer contacts that consumer and offers to help retrieve the lost money. However, the investigation requires an up-front fee, and the consumer is swindled again.

A. Retrieval
B. Advance-fee
C. Scavenger
D. Double-hustle

A

C. Scavenger

See pages 1.1306 in the Fraud Examiner’s Manual

The scavenger or revenge scheme involves the company that initially defrauded the consumer. Using a different company’s name, the outfit contacts the consumer again and asks if they would like to help put the unethical company out of business and get their money back. Naturally, an up-front fee is required to finance the investigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following objectives MOST ACCURATELY describes administrative security controls?

A. Ensuring that all personnel who have access to computing resources have the required authorizations and appropriate security clearances
B. Keeping unauthorized personnel from entering physical facilities and warning personnel when physical security measures are being violated
C. Providing connectivity with acceptable response times, user-friendly access, and a secure mode at an acceptable cost to the organization
D. Fully securing all organizational systems and data without considering budget implications

A

A. Ensuring that all personnel who have access to computing resources have the required authorizations and appropriate security clearances

See pages 1.1441, 1.1453 in the Fraud Examiner’s Manual

Administrative security (or personnel security) consists of management constraints, operational procedures, accountability procedures, and supplemental administrative controls established to provide an acceptable level of protection for computing resources. In addition, administrative controls include procedures established to ensure that all personnel who have access to computing resources have the required authorizations and appropriate security clearances. Examples of effective administrative controls for cybersecurity include:

  • Security policies and awareness training
  • Separation of duties
  • Data classification
  • Computer security risk assessments
  • Security audits and tests
  • Incident response plans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A data classification policy can BEST be described as a(n):

A. Application security control
B. Administrative security control
C. Physical security control
D. Technical security control

A

B. Administrative security control

See pages 1.1441, 1.1453 in the Fraud Examiner’s Manual

Administrative security (or personnel security) consists of management constraints, operational procedures, accountability procedures, and supplemental administrative controls established to provide an acceptable level of protection for computing resources. In addition, administrative controls include procedures established to ensure that all personnel who have access to computing resources have the required authorizations and appropriate security clearances. Examples of effective administrative controls for cybersecurity include:

  • Security policies and awareness training
  • Separation of duties
  • Data classification
  • Computer security risk assessments
  • Security audits and tests
  • Incident response plans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Zane obtained a loan from Bank A, agreeing to give the bank a security interest in his commercial property. Before Bank A’s lien was filed, Zane managed to get another loan from Bank B using the same commercial property as collateral (unbeknownst to Bank B). In which of the following schemes did Zane engage?

A. Double-pledging collateral
B. Linked financing
C. Daisy chain
D. Sham loan

A

A. Double-pledging collateral

See pages 1.905 in the Fraud Examiner’s Manual

In a double-pledging collateral scheme, borrowers pledge the same collateral with different lenders before liens are recorded without telling the lenders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which of the following is a potential indicator of a loan fraud scheme?

A. Only two change orders have been requested for a long, complex project.
B. No change orders have been received for a large project.
C. There is an increasing trend in the number of change orders for a small project.
D. All of the above are potential indicators of a loan fraud scheme.

A

D. All of the above are potential indicators of a loan fraud scheme.

See pages 1.912 in the Fraud Examiner’s Manual

An increasing trend in the number of change orders or amounts on change orders might indicate that construction changes have occurred that would alter the originally planned project to such an extent as to render the underwriting inappropriate.

Alternatively, some projects—especially large projects—tend to have many change orders. It might be more abnormal in situations like these to have few or no change orders than to have many. For instance, a lack of change orders for a large project might suggest that progress is not being made. Ultimately, the key characteristic that the fraud examiner should look for in change orders is abnormality, which can happen in many ways. Fraud examiners should discover what the normal trend for change orders is in terms of both quantity and content with the particular type of industry and project, and then they can look for deviations from those trends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following refers to the type of network security systems that are designed to supplement firewalls and other forms of network security by detecting malicious activity coming across the network or on a host?

A. Network access controls
B. Intrusion detection systems
C. Network address prevention systems
D. Intrusion admission systems

A

B. Intrusion detection systems

See pages 1.1450 in the Fraud Examiner’s Manual

An intrusion detection system (IDS) is a device or software application that monitors an organization’s inbound and outbound network activity and identifies any suspicious patterns of activity that might indicate a network or system attack or security policy violations. These systems are designed to supplement firewalls and other forms of network security by detecting malicious activity coming across the monitored entity’s network or system activities. They act much like a motion sensor by detecting individuals who have bypassed perimeter security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which of the following are information security goals that an e-commerce system should endeavor to meet for its users and asset holders?

I. Penetrability of data
II. Materiality of data
III. Integrity of data
IV. Availability of data

A. I, II, III, and IV
B. II and III only
C. III and IV only
D. I, II, and III only

A

C. III and IV only

See pages 1.1437 in the Fraud Examiner’s Manual

All branches of an information system, including the e-commerce branch, strive to provide security for their users and asset holders. The following is a list of common information security goals that should be achieved to ensure the security of information systems for users and account holders:

  • Confidentiality of data
  • Integrity of data
  • Availability of data
  • Authentication
  • Non-repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

A higher-than-normal level of employee turnover associated with a real estate developer is often a red flag of loan fraud.

A. True
B. False

A

A. True

See pages 1.911 in the Fraud Examiner’s Manual

One red flag of loan fraud to look for, particularly in construction lending, is whether the real estate developer is experiencing a higher-than-normal employee turnover. Typically, when a developer experiences a high degree of turnover, something is wrong with the internal operation. This is often a preamble for other problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Smart cards include a wide variety of hardware and software features capable of detecting and reacting to tampering attempts and countering possible attacks.

A. True
B. False

A

A. True

See pages 1.1028 in the Fraud Examiner’s Manual

A smart card is a plastic card, the size of a payment card, embedded with a microchip. A key advantage of smart cards is that, unlike regular magnetic stripe payment cards, they cannot be easily replicated. Similarly, smart cards cannot be easily counterfeited, which greatly reduces the potential for fraud with in-person transactions. Smart cards include a wide variety of hardware and software features capable of detecting and reacting to tampering attempts and countering possible attacks. If someone tries to tamper with a chip on a smart card, the card detects the intrusion and shuts itself down, rendering the card useless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A medical provider billed a health care program for an electric wheelchair while providing the patient with a less expensive manual wheelchair. This inflated billing scheme is known as which of the following?

A. Unbundling
B. Undercharging
C. Upcoding
D. Replacement fraud

A

C. Upcoding

See pages 1.1217 in the Fraud Examiner’s Manual

Upcoding occurs when a provider bills for a higher level of service than actually rendered. In a typical upcoding scheme, a durable medical equipment (DME) company provides patients with an inexpensive product (e.g., a manual wheelchair) but bills the government for a more expensive product (e.g., an electric wheelchair).

Another common upcoding scheme is to falsely claim that an established patient is a new patient. A new patient generally requires an extensive examination and consumes more of the provider’s time. Therefore, under some medical coding systems, providers are reimbursed more for new patients than established patients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

___________ involve paying an individual to undergo unnecessary medical procedures that are then billed to the patient’s insurer or health care program.

A. DRG creep schemes
B. Rent-a-patient schemes
C. False cost reporting schemes
D. Fictitious patient schemes

A

B. Rent-a-patient schemes

See pages 1.1222 in the Fraud Examiner’s Manual

So-called rent-a-patient schemes involve paying an individual to undergo unnecessary medical procedures that are then billed to the patient’s insurer or health care program. These schemes occur in countries using a third-party payer system or single-payer system that allows private providers to bill health care programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following BEST illustrates the concept of human intelligence?

A. A corporate spy breaks into a competing company’s office and steals sensitive information while employees are attending an off-site event.
B. A corporate spy installs software on the computer of an employee from a competing company to monitor that employee’s communications.
C. A corporate spy creates a deceptive website that tricks employees from a competing company into divulging confidential information.
D. A corporate spy poses as a customer of a competing company to elicit information from the competitor’s salespeople.

A

D. A corporate spy poses as a customer of a competing company to elicit information from the competitor’s salespeople.

See pages 1.707-1.708 in the Fraud Examiner’s Manual

Intelligence professionals might gather data through human intelligence (i.e., through direct contact with people). Generally, human intelligence is gathered from subject-matter experts and informed individuals. Such efforts typically target individuals who can provide the most valuable information.

For example, an intelligence professional might gather intelligence by posing as a customer of the target entity. This approach exploits two weaknesses of corporate culture: (1) all salespeople want to make a sale and (2) many salespeople will do almost anything to make a sale. Other approaches include:

  • Employment interviews (real and fake)
  • False licensing negotiations
  • False acquisition or merger negotiations
  • Hiring an employee away from a target entity
  • Planting an agent in a target organization
  • Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which of the following steps is often taken during an account takeover scheme?

A. Stealing account log-in information by sending phishing emails
B. Changing customer contact information on the overtaken account
C. Placing orders using funds from the overtaken account
D. All of the above

A

D. All of the above

See pages 1.1039-1.1040 in the Fraud Examiner’s Manual

Account takeover fraud occurs when a fraudster surreptitiously takes control of a payment account. Targeted accounts can include credit cards, banking, brokerage, or any type of online retail account (e.g., Amazon).

To take over an account, thieves obtain email addresses or other log-in information and use various means to obtain passwords, such as phishing emails or password-cracking botnet attacks.

Once the thief overtakes an account, communication methods and contact information are altered to keep the account holder unaware of the fraudulent activity. The thief is then free—depending on the type of account—to place orders using stored payment information, transfer funds, or request duplicate payment cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Elizabeth, a grocery store cashier, slips on a wet floor and falls while at work. She is unharmed but pretends to suffer an injury from the fall. She files a claim against the store’s workers’ compensation insurance policy and collects payments from the insurance carrier. She also misses several weeks of work even though she is fully capable of working. Under which category of workers’ compensation schemes does Elizabeth’s scheme fall?

A. Claimant fraud
B. Organized fraud
C. Agent fraud
D. Premium fraud

A

A. Claimant fraud

See pages 1.1109, 1.1112, 1.1114 in the Fraud Examiner’s Manual

Elizabeth’s scheme is classified as claimant fraud. Claimant fraud involves misrepresenting the circumstances of any injury or fabricating that an injury occurred. Such schemes are perpetrated by employees who stage accidents or exaggerate minor injuries, sometimes in collusion with unethical doctors, to fraudulently receive compensation benefits.

Workers’ compensation is essentially an employee benefit, entitling persons who are injured on the job to compensation while they heal.

The primary victim of a workers’ compensation scheme is not the employer but the insurance carrier for the employer. It is the insurance carrier who pays for the perpetrator’s fraudulent medical bills and unnecessary absences. Nevertheless, the employer is a tertiary victim of these crimes, as the fake claims can result in higher premiums for the company in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which of the following BEST illustrates the use of technical surveillance for purposes of corporate espionage?

A. A spy hacks into a target computer and monitors an employee’s communications.
B. A spy creates a deceptive website to trick employees into entering confidential information.
C. A spy impersonates a help desk representative to obtain an employee’s network password.
D. A spy uses a phony employee badge to enter an office and take a sensitive document.

A

A. A spy hacks into a target computer and monitors an employee’s communications.

See pages 1.707, 1.729-1.735 in the Fraud Examiner’s Manual

Technical surveillance is the practice of covertly acquiring audio, visual, or other types of data from targets through the use of technical devices, procedures, and techniques. When corporate spies resort to the use of technical surveillance, it is usually to gather nondocumentary evidence or information that cannot be found through open sources.

Corporate spies might employ various forms of technological surveillance, such as aerial photography, bugging and wiretapping, video surveillance, photographic cameras, mobile phones, monitoring computer emanations, and computer system penetrations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Due to the paper trail involved and the emphasis placed on the problem by law enforcement, most check fraud offenders are pursued and prosecuted.

A. True
B. False

A

B. False

See pages 1.1001-1.1002 in the Fraud Examiner’s Manual

Many merchants overburden police and prosecutors with reports of check fraud rather than implementing effective training and controls to help prevent such schemes from the outset; therefore, law enforcement and prosecutors do not have the time or workforce to pursue all such cases and are often uneager to do so. Furthermore, check fraud perpetrators frequently migrate from one location to another, making their arrest and prosecution difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Traditional identity theft involves the use of entirely fabricated personal information or a combination of real and fabricated information to create a new identity.

A. True
B. False

A

B. False

See pages 1.803-1.804 in the Fraud Examiner’s Manual

Synthetic identity theft involves the use of entirely fabricated personal information or a combination of real and fabricated information to create a new identity.

In traditional identity theft, a fraudster steals an individual’s personal information and pretends to be that individual. For example, a fraudster might use an individual’s name, government identification number, and date of birth to impersonate the individual and gain access to the individual’s bank account. This is called an account takeover. Another type of traditional identity theft is true name fraud, in which a fraudster uses an individual’s personal information to open a new account under the individual’s name. Unlike an account takeover, which involves an existing account, true name fraud involves a new account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of the following statements regarding new account fraud schemes is LEAST ACCURATE?

A. Mobile deposits are at high risk for new account fraud because face-to-face, in-person transactions are not required.
B. Automated teller machines (ATMs) are rarely targets of new account fraud because most have cameras installed.
C. New account fraud sometimes involves withdrawing funds after opening a new business account using checks stolen from another business.
D. New account criminals often use false identification to open new bank accounts and steal money before funds are collected by the financial institution.

A

B. Automated teller machines (ATMs) are rarely targets of new account fraud because most have cameras installed.

See pages 1.936-1.938 in the Fraud Examiner’s Manual

New account fraud is generally defined as fraud that occurs on an account within the first ninety days that it is open; often, perpetrators open these accounts with the sole intent of committing fraud.

New account criminals often use false identification to open new accounts and steal money before funds are collected by the bank. False identification is easily purchased.

Some bank customers defraud business institutions by opening a new business account using checks stolen from another business. The fraudsters then withdraw the funds and close the account.

Financial institutions are increasingly allowing mobile deposits, which typically involve a person sending a digital image of a check or similar payment order to the depository institution so that the paper document never has to be received or processed. There is a relatively high risk of new account fraud with mobile deposits for two main reasons. First, there is no face-to-face transaction required, and fraudsters prefer to maintain anonymity. Second, the digital image is often taken by a camera or a scanner, so it is easier to make forged or counterfeit deposits.

Financial institutions should also consider the increased risk of new account fraud when offering automated teller machines (ATMs) that accept deposits. Like with mobile deposits, the fact that ATM deposits do not require in-person transactions with a teller is ideal for fraudsters. Many ATMs have cameras to help identify users, but ATMs are often enticing targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which of the following is NOT a red flag that might indicate the existence of a need recognition scheme?

A. The purchasing entity does not have a satisfactory list of backup suppliers.
B. The purchasing entity’s materials are being ordered at the optimal reorder point.
C. The purchasing entity has unusually high requirements for stock and inventory levels.
D. The purchasing entity has a large number of surplus items written off as scrap.

A

B. The purchasing entity’s materials are being ordered at the optimal reorder point.

See pages 1.1514-1.1515 in the Fraud Examiner’s Manual

Generally, procurement actions begin with the procuring entity making a determination of its general needs. These initial determinations include assessments of the types and amounts of goods or services required to meet the entity’s needs. In need recognition schemes, procurement employees convince their employer that it needs excessive or unnecessary products or services.

There are several red flags that might indicate a need recognition scheme. An organization with unusually high requirements for stock and inventory levels might reveal a situation in which a corrupt employee is seeking to justify unnecessary purchases from a certain supplier. Likewise, if an organization’s materials are not being ordered at the optimal reorder point, this should raise a red flag. An employee might also justify unnecessary purchases of inventory by writing off a large number of surplus items as scrap. As these items leave the inventory, they open spaces to justify additional purchases. Another indicator of a need recognition scheme is a need that is defined in a way that can only be met by a certain supplier or contractor. In addition, the failure to develop a satisfactory list of backup suppliers might reveal an unusually strong attachment to a primary supplier—an attachment that is explainable by the acceptance of bribes from that supplier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

The equipment needed to operate a check fraud ring is very expensive and difficult to obtain.

A. True
B. False

A

B. False

See pages 1.1007 in the Fraud Examiner’s Manual

Check fraud rings thrive because the items needed to commit check fraud are easily obtainable and the cost is minimal. Often, the only necessary equipment for a check fraud ring is a scanner, printer, and personal computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Automatic debit program schemes occur when fraudsters obtain a consumer’s bank account information and then use this information to draft money from the consumer’s bank account without that person’s consent.

A. True
B. False

A

A. True

See pages 1.1304 in the Fraud Examiner’s Manual

Automatic debit programs are a convenient way to pay bills, such as recurring charges for mortgages and car loans. Fraudsters exploit these programs by obtaining consumers’ bank account information through telemarketing schemes. Fraudsters then use this information to draft money from consumers’ bank accounts without their consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

To ensure separation of duties within the information systems department and between IT and business unit personnel, computer operators should be responsible for performing computer programming.

A. True
B. False

A

B. False

See pages 1.1454-1.1456 in the Fraud Examiner’s Manual

Separation of duties is a key element in a well-designed internal control system, and it is fundamental to data security. There are various options for achieving separation of duties in information security, and the options vary depending on department responsibilities. For example, some of the best practices for ensuring separation of duties within the information systems department and between IT and business unit personnel include:

  • Programmers should not have unsupervised access to production programs or have access to production data sets (data files).
  • IT personnel’s access to production data should be limited.
  • Application system users should only be granted access to those functions and data required for their job duties.
  • Program developers should be separated from program testers.
  • System users should not have direct access to program source code.
  • Computer operators should not perform computer programming.
  • Development staff should not have access to production data.
  • Development staff should not access system-level technology or database management systems.
  • End users should not have access to production data outside the scope of their normal job duties.
  • End users or system operators should not have direct access to program source code.
  • Programmers should not be server administrators or database administrators.
  • IT departments should be separated from information user departments.
  • Functions involving the creation, installation, and administration of software programs should be assigned to different individuals.
  • Managers at all levels should review existing and planned processes and systems to ensure proper separation of duties.
  • Employees’ access to documents should be limited to those that correspond with their related job tasks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Employment identity theft occurs when a fraudster impersonates a business to commit financial fraud.

A. True
B. False

A

B. False

See pages 1.807 in the Fraud Examiner’s Manual

Business identity theft occurs when a fraudster impersonates a business to commit financial fraud. In an employment identity theft scheme, a fraudster impersonates another person to secure a job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

All the following are red flags of health care provider fraud EXCEPT:

A. Pressure for rapid processing of bills or claims
B. Medical records that have been altered
C. Unusually high profits compared to similar businesses in the same region
D. An unusually small number of claims for reimbursement

A

D. An unusually small number of claims for reimbursement

See pages 1.1211 in the Fraud Examiner’s Manual

Warning signs that a health care provider is engaging in fraudulent practices include:

  • Lack of supporting documentation for claims under review
  • Details in supporting documents that do not match the claim
  • Medical records that have been altered
  • Medical records that were created long after the alleged patient visit
  • Medical records that seem sloppy, disorganized, or otherwise unprofessional
  • Missing pages of medical records that would cover the period of time under review
  • Routine, nonspecialized treatment for patients living several hours away from the provider
  • An unusually high volume of patients
  • An unusually large number of claims for reimbursement
  • Unusually high profits compared to similar businesses in the same geographic region
  • Matching addresses on the claim form for the patient and the provider
  • High percentage of coding outliers
  • Pressure for rapid processing of bills or claims
  • Threats of legal action for delay in making payments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

To help safeguard an organization’s proprietary information, management should require all employees throughout the organization to sign noncompetition agreements.

A. True
B. False

A

B. False

See pages 1.750 in the Fraud Examiner’s Manual

A noncompetition agreement is an agreement whereby employees agree not to work for competing companies within a certain period of time after leaving their current employer. While noncompetition agreements can be useful in some circumstances, there are multiple legal issues that limit their effectiveness. Because of these potential legal issues and challenges, and due to differences in employees’ geographic locations, job responsibilities, access to proprietary information, and other factors, such agreements should generally be used on an as-needed basis, rather than as a broad requirement for all employees. If management does determine that such an agreement is appropriate for certain employees, it should consult with legal counsel to ensure that the agreement is valid and enforceable under the applicable laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which of the following is NOT a common red flag of procurement fraud schemes involving collusion among contractors?

A. More competitors than usual submit bids on a project or product.
B. All contractors submit consistently high bids.
C. Bid prices decline when a new competitor enters the competition.
D. The same contractors bid on each project or product.

A

A. More competitors than usual submit bids on a project or product.

See pages 1.1513-1.1514 in the Fraud Examiner’s Manual

Common red flags of procurement fraud schemes involving collusion among contractors include:

  • The industry has limited competition.
  • The same contractors bid on each project or product.
  • The winning bid appears too high.
  • All contractors submit consistently high bids.
  • Qualified contractors do not submit bids.
  • The winning bidder subcontracts work to one or more losing bidders or to non-bidders.
  • Bids appear to be complementary bids by companies unqualified to perform the work.
  • Some bids fail to conform to the essential requirements of the solicitation documents (i.e., some bids do not comply with bid specifications).
  • Some losing bids were poorly prepared.
  • Fewer competitors than usual submit bids on a project or product.
  • When a new contractor enters the competition, the bid prices begin to decline.
  • There is a rotational pattern to winning bidders (e.g., geographical, customer, job, or type of work).
  • There is evidence of collusion in the bids (e.g., bidders make the same mathematical or spelling errors; bids are prepared using the same typeface, handwriting, stationery, or envelope; or competitors submit identical bids).
  • There is a pattern indicating that the last party to bid wins the contract.
  • There are patterns of conduct by bidders or their employees that suggest the possibility of collusion (e.g., competitors regularly socialize, hold meetings, visit each other’s offices, or subcontract with each other).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

The MOST COMMON giveaway scheme, in which a postcard arrives in the mail telling the recipient they have already won a prize such as a luxurious vacation or cash, is known as:

A. The “Fly and Buy”
B. The “1-in-5”
C. The “Bait and Switch”
D. None of the above

A

B. The “1-in-5”

See pages 1.1331 in the Fraud Examiner’s Manual

The most common giveaway scheme is known as the 1-in-5. In this scheme, a consumer receives a letter or postcard in the mail informing them that they have already won a prize. The prizes usually include luxurious vacations, new cars, or cash. Unfortunately, the odds of winning any of the prizes are extremely low. Victims might receive items of minimal or no value or coupons redeemable only for the company’s substandard merchandise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Because it is a common occurrence, the fact that documents are missing from a loan file is generally NOT a red flag for loan fraud.

A. True
B. False

A

B. False

See pages 1.913 in the Fraud Examiner’s Manual

Missing or altered documentation is a red flag for any type of fraud scheme, and it is a particular concern for loan fraud. While it is true that many loan files have missing documents, it is important to determine if the documents have been misplaced or were never received. A waiver of certain documents is a common way lenders conceal fraud schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Billing for experiments with new medical devices that have not yet been approved by a jurisdiction’s health care authority is one form of medical fraud.

A. True
B. False

A

A. True

See pages 1.1219-1.1220 in the Fraud Examiner’s Manual

ne form of medical fraud is the billing for experimental use of new medical devices that have not yet been approved by the jurisdiction’s health care authority. Some hospitals deliberately mislead third-party payers by getting them to pay for the manufacturer’s research. Many of the doctors involved are alleged to have stock in the manufacturing companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which of the following is the MOST ACCURATE definition of a computer worm?

A. A computer program that replicates itself and penetrates operating systems to spread malicious code to other computers
B. A program or command procedure that appears useful but contains hidden code that causes damage
C. Any software application that displays advertisements while it is operating
D. A type of software that, while not definitely malicious, has a suspicious or potentially unwanted aspect to it

A

A. A computer program that replicates itself and penetrates operating systems to spread malicious code to other computers

See pages 1.1424 in the Fraud Examiner’s Manual

A computer worm is a computer program that replicates itself and penetrates operating systems to spread malicious code to other computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Janice, a Certified Fraud Examiner (CFE) for a major insurance company, has received an anonymous tip that an employee in the claims department is processing claims for their own benefit during nonworking hours. To gather information about the validity of this tip, Janice should look at which of the following reports?

A. Manual override report
B. Address similarity report
C. Exception report
D. All of the above

A

D. All of the above

See pages 1.1123 in the Fraud Examiner’s Manual

Janice could look at several different types of reports to determine the validity of the tip. For instance, address similarity reports electronically compare multiple payments going to the same address. They are extremely useful because they might show a payment defalcation or funds going to another insurance company, broker, or fictitious payee. Additionally, the exception or manual override reports list all exceptions to normal electronic processing, thereby pointing out when a computer is being used outside the normal processing time, such as on the weekend.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

A doctor provides services to both patients who pay directly and patients whose bills are paid by a government program. To make the services more attractive to patients outside the coverage of the government program, the doctor gives patients who pay directly a discount that is not applicable to patients under the program. Which of the following BEST describes the provider’s scheme?

A. Fictitious claim
B. Upcoding
C. Disparate price
D. Overutilization

A

C. Disparate price

See pages 1.1207-1.1208 in the Fraud Examiner’s Manual

Many government health care programs require that they receive the best available price that providers offer. In a disparate price scheme, providers charge some patients (e.g., those in direct payment situations) a lower rate than they charge the government. This disparate bill rate causes the government to pay a higher rate, in violation of regulations mandating that the government receive the lowest rate. In addition, some government health programs require that wholesale pharmacies provide the program at the average wholesale price. However, providers might manipulate their data and provide false information to the government program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which of the following BEST describes phishing?

A. A method for acquiring sensitive information by bypassing a computer system’s security using an undocumented operating system and network functions
B. A method for acquiring sensitive information in which an attacker hides near the target to gain unauthorized access to a computer system
C. A method for acquiring sensitive information needed to facilitate a specific scheme by searching through large quantities of available data
D. A method for acquiring sensitive information by falsely claiming through electronic communication to be from an entity with which the target does business

A

D. A method for acquiring sensitive information by falsely claiming through electronic communication to be from an entity with which the target does business

See pages 1.1407 in the Fraud Examiner’s Manual

Phishing is a type of social engineering scheme that involves impersonating a trusted individual or entity. Generally, phishers manipulate victims into providing sensitive information by falsely claiming to be from an actual business, bank, internet service provider (ISP), or other entity with which the target does business.

In this type of scam, phishers typically use emails to direct internet users to imitation websites that look legitimate, such as log-in portals for online banks, retailers, or government agencies. Phishers control these imitation websites and use them to steal sensitive information, such as bank account details and passwords. Other phishing schemes involve corrupted files that will install malware or allow the attackers access to a computer system once the victim downloads and opens the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which of the following is a common red flag of elder fraud schemes?

A. New friends who appear suddenly and without prior mention
B. The discovery of signed or forged legal documents
C. Large bank account withdrawals with no explanation
D. All of the above

A

D. All of the above

See pages 1.1316 in the Fraud Examiner’s Manual

The following are some common red flags for elder fraud schemes. While the presence of any one of these circumstances does not necessarily indicate that elder fraud is occurring, individuals close to the older individuals should be aware of multiple occurrences of or patterns in these warning signs.

  • Outstanding bills
  • Disconnection notices for unpaid utilities
  • Large bank account withdrawals with no explanation
  • New friends who appear suddenly and without prior mention
  • The discovery of signed or forged legal documents (e.g., power of attorney [POA]) that the older individual is not aware of
  • Another caregiver asking probing or unexpected questions about the older individual’s spending habits
  • The older individual missing property or belongings
  • The discovery of financial decisions or arrangements that the older individual is unaware of (e.g., the opening of an account in the person’s name)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

All the following are examples of schemes that specifically target older individuals EXCEPT:

A. A fraudster informs an individual that they won a prize but must pay a sum of money before they can receive it.
B. A fraudster convinces a victim that their computer has a virus and offers unnecessary repair services in exchange for a fee.
C. A fraudster offers to eliminate an individual’s credit card debt after the individual pays for the service with their card.
D. A fraudster pretends to be the victim’s grandchild and requests money to help with a difficult financial situation.

A

C. A fraudster offers to eliminate an individual’s credit card debt after the individual pays for the service with their card.

See pages 1.1308, 1.1313-1.1315 in the Fraud Examiner’s Manual

Elder fraud, also known as elder financial abuse, includes different types of consumer fraud schemes perpetrated against older individuals.

In a tech-support scheme, a fraudster attempts to convince victims to pay for unnecessary computer services to repair nonexistent viruses or other problems. The scheme usually begins with a fraudster calling a victim and claiming to be a computer technician working for a well-known tech company (e.g., Microsoft or Apple). Alternatively, the victim might be tricked into calling the fraudster directly via pop-up messages warning about nonexistent computer problems. Once the victim is speaking to the fraudster by phone, the fraudster generally instructs the victim to download and launch software that gives the fraudster remote access to the victim’s computer. The fraudster proceeds to perform phony diagnostic tests on the victim’s computer, falsely claims to have detected viruses or other problems, and offers to fix the victim’s computer for a fee. In addition to collecting a fee for unnecessary services, the fraudster might install spyware onto the victim’s computer.

In a grandparent scheme, a scammer calls an older individual and asks if the individual knows who is calling. When the grandparent guesses the name of a grandchild, the scammer pretends to be that grandchild. The scammer claims to be in a financial bind and asks if the grandparent can send money via the internet or a money transfer service. The scammer urges the grandparent to avoid telling anyone about the situation. Once scammers receive the money, they continue to contact the grandparent for more money.

In a sweepstake and prize scheme, fraudsters inform older individuals they won a prize but must pay a fee to receive it. The fraudsters then convince their victims that they can eventually win the grand prize if they send them another fee. This cycle continues until the victims become aware of the scheme or are no longer able to send fees because they have depleted their savings.

A scheme in which a fraudster offers to eliminate an individual’s credit card debt after the individual pays for the service with their card is an example of a credit card debt elimination scheme. Although anyone could be a target of this kind of fraud, such schemes generally do not specifically target older individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

ABC Bank recently acquired a new portfolio of consumer loans. Because this loan portfolio is experiencing a default rate that is higher than normal, management has asked Bradley, a Certified Fraud Examiner (CFE), to evaluate the portfolio. Bradley notices that the loan package was sold without recourse to the broker, the brokerage fee was high relative to other purchases, and the broker is no longer in business. Which of the following types of schemes has Bradley MOST LIKELY uncovered?

A. Daisy chain fraud
B. Letter of credit fraud
C. Money transfer fraud
D. Brokered loan fraud

A

D. Brokered loan fraud

See pages 1.947 in the Fraud Examiner’s Manual

Loan brokering applies to either packages of individual residential (consumer) loans or single commercial loans. A variation of a brokered loan is loan participation, whereby multiple parties purchase and have interests in a loan or a package of loans. The fraud schemes associated with brokered loans or loan participation generally involve selling phony loans (packages) or selling participations in loans that have not been properly underwritten. Normally, a large fee is charged for these brokered loans. With residential loan packages, the broker sells the package, takes the money, and disappears. Brokered loans are not usually sold with any recourse to the broker. Therefore, the purchaser must look to the borrower and the underlying collateral for debt satisfaction. With loan participations, the lead bank generally performs the underwriting. However, this does not relieve the participating bank from its obligation to perform due diligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

All the following are best practices for ensuring separation of duties within the information systems department and between IT and business unit personnel EXCEPT:

A. Only programmers should be server administrators.
B. End users should not have access to production data outside the scope of their normal job duties.
C. Program developers should not be responsible for testing programs.
D. IT departments should not overlap with information user departments.

A

A. Only programmers should be server administrators.

See pages 1.1454-1.1456 in the Fraud Examiner’s Manual

Separation of duties is a key element in a well-designed internal control system, and it is fundamental to data security. There are various options for achieving separation of duties in information security, and the options vary depending on department responsibilities. For example, some of the best practices for ensuring separation of duties within the information systems department and between IT and business unit personnel include:

  • Programmers should not have unsupervised access to production programs or have access to production data sets (data files).
  • IT personnel’s access to production data should be limited.
  • Application system users should only be granted access to those functions and data required for their job duties.
  • Program developers should be separated from program testers.
  • System users should not have direct access to program source code.
  • Computer operators should not perform computer programming.
  • Development staff should not have access to production data.
  • Development staff should not access system-level technology or database management systems.
  • End users should not have access to production data outside the scope of their normal job duties.
  • End users or system operators should not have direct access to program source code.
  • Programmers should not be server administrators or database administrators.
  • IT departments should be separated from information user departments.
  • Functions involving the creation, installation, and administration of software programs should be assigned to different individuals.
  • Managers at all levels should review existing and planned processes and systems to ensure proper separation of duties.
  • Employees’ access to documents should be limited to those that correspond with their related job tasks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Publicly available information that anyone can lawfully obtain by request, purchase, or observation is known as which of the following?

A. Wide-source information
B. Free-source information
C. Confidential-source information
D. Open-source information

A

D. Open-source information

See pages 1.704 in the Fraud Examiner’s Manual

Open-source information is information in the public domain; it can be defined as publicly available data “that anyone can lawfully obtain by request, purchase, or observation.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Jeremy is involved in an automobile accident but does not have insurance. To be reimbursed for the damages, he gets insurance, waits a short time, and then reports the vehicle as having been in an accident. He has committed an insurance scam known as _____________.

A. Churning
B. Past posting
C. Ditching
D. None of the above

A

B. Past posting

See pages 1.1105 in the Fraud Examiner’s Manual

Past posting is a scheme in which a person is involved in an automobile accident but does not have insurance. After the accident, the person gets insurance, waits a short time, and then reports the vehicle as having been damaged in some manner, thus collecting for the damage previously incurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Mario, an employee of a person-to-person (P2P) payment company, has been writing down the account numbers and passwords of customer accounts with the intent of fraudulently using them to pay for items he purchases online. Mario is engaging in:

A. Check fraud
B. Electronic funds transfer fraud
C. Credit card transfer fraud
D. None of the above

A

B. Electronic funds transfer fraud

See pages 1.1036 in the Fraud Examiner’s Manual

Mario is committing an electronic funds transfer (EFT) scheme by misappropriating customers’ account and password information.

There are several ways in which fraud can be perpetrated through the electronic transfer of funds. Potential sources of fraud include the following:

  • A biller might send a bill for services not rendered or for goods never sent.
  • A person who has obtained information about another person’s bank account might instruct a biller to obtain payment from the other person’s account.
  • A hacker might obtain passwords and usernames from an aggregator and use that information to direct transfers from a consumer’s bank account.
  • An employee at the site providing electronic bill presentment and payment (EBPP) services who knows consumers’ usernames and passwords might use that information to direct transfers from consumers’ bank accounts.
  • A bank employee might use customer information to direct transfers from a customer’s account.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following is a common scheme perpetrated by suppliers of durable medical equipment (DME)?

A. Falsifying prescriptions for medical equipment
B. Billing for equipment rental after it is returned
C. Intentionally providing excessive equipment
D. All of the above

A

D. All of the above

See pages 1.1208-1.1209 in the Fraud Examiner’s Manual

The term durable medical equipment (DME) refers to medical equipment that can withstand repeated use, such as wheelchairs and specialized patient beds. Fraud schemes perpetrated by DME suppliers frequently involve:

  • Falsified prescriptions for DME
  • Intentionally providing excessive DME
  • DME not being delivered
  • Billing for DME rental beyond when the DME is returned
  • Billing for DME not covered by the insurance policy or health care program
  • Scooter scams (i.e., billing for electric-powered wheelchairs that are either unnecessary or are of poorer quality than the model billed for)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

When fabricating a counterfeit payment card, which of the following is the MOST DIFFICULT facet to reproduce?

A. The hologram
B. The embossed numbers
C. The card thickness
D. The magnetic strip

A

A. The hologram

See pages 1.1016 in the Fraud Examiner’s Manual

The hologram is the most difficult aspect of a payment card to reproduce. True holograms use a lenticular refraction process; counterfeits generally consist of reflective materials, usually foil with an image stamped on it. These decals are attached to the card’s surface rather than fixed into the plastic, as is the case with legitimate cards. Some fraudulent holograms do not change colors—as legitimate ones do—when viewed from various angles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Which of the following health care frauds would BEST be described as a fictitious services scheme?

A. A doctor uses the identifying information of patients the doctor has never serviced to bill an insurer or health care program.
B. A patient who is not covered under a health care program pretends to be a covered party to receive medical services.
C. A patient fraudulently reports symptoms they do not actually have to receive a prescription.
D. A doctor intentionally submits a bill to an insurer or health care program using improper codes for the services provided.

A

A. A doctor uses the identifying information of patients the doctor has never serviced to bill an insurer or health care program.

See pages 1.1206 in the Fraud Examiner’s Manual

In a fictitious services scheme, legitimate health care providers charge or bill a health care program for services that were not rendered at all. Often, the providers submit bills for patients they have never seen but whose private patient information they purchased from someone involved in identity theft or someone who otherwise improperly obtained it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which of the following real estate loan schemes MOST ACCURATELY describes an air loan?

A. A property developer applying for a loan submits instances of previous development experience that are fictitious or that they had no part in.
B. A fraudster files fraudulent property transfer documents with the property owner’s forged signature and then takes out a loan using the property as collateral.
C. A loan applicant falsifies their income sources to qualify for a mortgage.
D. A builder, in collusion with an appraiser and other real estate insiders, fraudulently applies for a loan to construct a building on a nonexistent property and keeps the proceeds.

A

D. A builder, in collusion with an appraiser and other real estate insiders, fraudulently applies for a loan to construct a building on a nonexistent property and keeps the proceeds.

See pages 1.927-1.928 in the Fraud Examiner’s Manual

An air loan is a loan for a nonexistent property—with air symbolizing the loan’s fraudulent absence of collateral. Most or all of the documentation is fabricated, including the borrower, the property ownership documents, and the appraisal. This type of scheme involves a high level of collusion, and perpetrators might even set up a fictitious office with people pretending to be participants in the transaction, such as the borrower’s employer, the appraiser, and the credit agency. Usually, air loans go into early payment default. Since there are no actual properties on which to foreclose, the losses on these loans can be enormous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Which of the following is the MOST ACCURATE definition of a Trojan horse?

A. A type of software that collects and reports information about a computer user without the user’s knowledge or consent
B. A software program that contains various instructions that are executed every time a computer is turned on
C. A program or command procedure that appears useful but contains hidden code that causes damage
D. A virus that changes its structure to avoid detection

A

C. A program or command procedure that appears useful but contains hidden code that causes damage

See pages 1.1425 in the Fraud Examiner’s Manual

A Trojan horse is a program or command procedure that appears useful but contains hidden code that causes damage. When the hidden code in a Trojan horse is activated, it performs some unwanted or harmful function. Often, viruses and worms attach themselves to other legitimate programs, becoming Trojan horses and spreading to other systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

A financial fund operator who insists that investors continually reinvest their profits, rather than take payouts, is a red flag of a Ponzi scheme.

A. True
B. False

A

A. True

See pages 1.1338 in the Fraud Examiner’s Manual

The following are red flags of Ponzi schemes:

  • Sounds too good to be true—If an investment opportunity seems suspiciously better than it should be, then it is probably a Ponzi scheme.
  • Promises of low risk or high rewards—Promoters of Ponzi schemes typically promise implausibly high or quick returns with little risk. As all legitimate investments include some risk, any guarantee that an investment will perform in a certain way is a clear signal that it might be part of a Ponzi scheme.
  • History of consistent returns—Any firm that generates remarkably consistent returns regardless of market conditions should raise suspicions.
  • High-pressure sales tactics—Reputable investment firms and agents do not push potential investors to act immediately, and legitimate investment opportunities are rarely that time sensitive.
  • Pressure to reinvest—Often, fraudsters keep Ponzi schemes going by convincing investors to reinvest their profits rather than take a payout.
  • Complex trading strategies—Legitimate agents should be able to provide clear explanations about their investment strategies. For obvious reasons, Ponzi-scheme boosters purposefully employ complicated strategies that confound unsophisticated investors.
  • Lack of transparency or access—Secrecy surrounding the operations of a financial company should be an immediate warning sign. Ponzi operators are often unlicensed, and their supposed investments are typically unregistered. Additionally, a lack of access to regular statements or an online account should trigger alarm.
  • Lack of separation of duties—Investors should be wary of any financial manager who manages, administers, and retains custody of the fund in question.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Research and development (R&D) personnel often inadvertently divulge confidential information through which of the following?

A. Hiring outside academic professionals
B. Discussions with colleagues at conferences
C. Articles written for industry journals
D. All of the above

A

D. All of the above

See pages 1.712 in the Fraud Examiner’s Manual

Often, intelligence professionals target research and development (R&D) employees because their positions generally involve the communication of information. For example, many R&D employees attend or participate in trade shows, conferences, or other industry functions where it is common to network with other professionals in their field and exchange ideas. Such events provide intelligence spies with the opportunity to learn key product- or project-related details simply by listening to a presentation or asking the right questions.

R&D employees’ publications are also a good source of information for intelligence professionals. Researchers sometimes inadvertently include sensitive project details when writing articles about their findings for industry journals or other mediums. This is particularly true in the case of academic professionals who might be hired by a company to perform research or conduct a study. If a company hires an academician to conduct research, management must ensure that the academician understands the need to keep the results confidential. In addition, management must ensure that the academician’s use of teaching assistants or graduate students is minimal and that those individuals understand the confidentiality requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Visitors to a company’s facilities should be allowed unrestricted access as long as they have signed in as a visitor in the company’s logbook and have been issued a visitor’s badge.

A. True
B. False

A

B. False

See pages 1.754 in the Fraud Examiner’s Manual

Management should monitor and limit visitor access. Visitors should be required to sign in and out of an organization logbook. It is considered a best practice to issue each visitor a badge that identifies them as a nonemployee. Also, visitors should be escorted by a host for the entirety of their visit and not be allowed into areas containing sensitive information. Additionally, locks on doors leading to secure areas should be changed or reprogrammed regularly, especially if an employee has recently quit or been terminated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

To prevent contract and procurement fraud, companies should implement a continuous monitoring program to monitor their procurement activities.

A. True
B. False

A

A. True

See pages 1.1535 in the Fraud Examiner’s Manual

It is important for companies to implement a continuous, self-auditing program to monitor the performance of their procurement activities. Continuous monitoring uses data analytics on a perpetual basis, thereby allowing management to identify and report fraudulent activity more rapidly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Not every company that runs its business using a pyramid structure is operating an illegal pyramid scheme.

A. True
B. False

A

A. True

See pages 1.1339 in the Fraud Examiner’s Manual

Not all organizations with a pyramid structure are engaging in illegal activity. Some legitimate merchandising companies use a pyramid structure to rank and determine the compensation of their employee-owners. A pyramid structure becomes an illegal pyramid scheme when the recruitment of new members takes precedence over the product or service that the company is ostensibly promoting. The more members that are recruited, the higher the investor is purported to rise in the ranks of the enterprise and the more money the investor is supposed to make.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

If a customer reports the loss or theft of an access device, the financial institution should attempt to prevent fraud related to electronic funds transfers (EFTs) by canceling the existing card, personal identification number (PIN), or other form of access and issuing a new one.

A. True
B. False

A

A. True

See pages 1.1037-1.1038 in the Fraud Examiner’s Manual

The following are safeguards that banks can perform to reduce the risk that they or their customers become victimized by unauthorized electronic funds transfers (EFTs):

  • Confirm phone numbers and mailing addresses on the application to ensure that they are consistent with information about the applicant that is available from other sources and, with respect to existing customers, consistent with current records about these customers. This might involve obtaining credit reports about the applicant or obtaining copies of utility bills that show the applicant’s address.
  • Ensure that the area or city code in the applicant’s phone number matches the geographical area for the applicant’s address.
  • Send a welcome letter to the address on the application with the bank’s return address so that the letter is returned if the applicant does not live there.
  • Verify by phone or additional mailings any change of address requests in the same way that new account applications are verified.
  • If a customer reports the loss or theft of an access device, cancel the existing card, personal identification number (PIN), or other form of access and issue a new one.
  • If a customer reports that a person previously authorized to use an access device no longer has that authority, cancel all cards, PINs, or other access devices and issue new ones to the customer.
  • Always mail PINs separately from other information, such as usernames, with which they are associated.
  • Separate the responsibility of bank employees who have custody of information relating to access devices from those who have responsibility for issuance, verification, or reissuance of PINs.
  • Ensure that any communication concerning usernames or passwords is sent in a secure, encrypted format.
  • Require customers who register for electronic bill presentment and payment (EBPP) or person-to-person (P2P) systems to provide information indicating that they are authorized to use the bank account or credit card from which payments will be made.
  • Employ multifactor authentication to verify transfers via EBPP or P2P systems.
92
Q

A health care provider’s practice of charging a comprehensive code, as well as one or more component codes, by billing separately for subcomponents of a single procedure is known as ______________.

A. Subdividing
B. Unbundling
C. Segregating
D. Overcoding

A

B. Unbundling

See pages 1.1215 in the Fraud Examiner’s Manual

Because health care procedures often have special reimbursement rates for a group of procedures typically performed together (e.g., blood test panels by clinical laboratories), some providers attempt to increase profits by billing separately for procedures that are actually part of a single procedure. This process is called unbundling. Simple unbundling occurs when a provider charges a comprehensive code, as well as one or more component codes.

93
Q

A virus that loads itself onto the target system’s memory, infects other files, and then unloads itself is called a:

A. Direct-action virus
B. Network virus
C. Boot sector virus
D. None of the above

A

A. Direct-action virus

See pages 1.1423 in the Fraud Examiner’s Manual

Direct-action viruses load themselves onto the target system’s memory, infect other files, and then unload themselves.

94
Q

A favored device of phony charities is to send school-age children to different homes in a neighborhood to say that they are raising money for antidrug programs or for a group that takes underprivileged kids on trips.

A. True
B. False

A

A. True

See pages 1.1330 in the Fraud Examiner’s Manual

A favored device of phony charities is to send school-age children to different homes in a neighborhood, saying that they are raising money for antidrug programs or for a group that takes underprivileged kids on trips. Some of the children repeat what they are instructed to say in exchange for a few dollars. Others believe they will receive rewards and free trips even though they, too, are being scammed.

95
Q

Employees are often willing to abide by nondisclosure agreements, but they sometimes do not understand that the information they are communicating might be confidential.

A. True
B. False

A

A. True

See pages 1.749 in the Fraud Examiner’s Manual

Often, employees are willing to abide by nondisclosure agreements, but they do not understand that the information they are communicating might be confidential. To more effectively implement nondisclosure agreements, employees must be clearly informed about what information is considered confidential upon hiring, upon signing a nondisclosure agreement, and during exit interviews.

96
Q

Which of the following is a common way a procuring employee might engage in a bid manipulation scheme?

A. Opening bids prematurely
B. Extending bid opening dates without justification
C. Altering bids
D. All of the above

A

D. All of the above

See pages 1.1517 in the Fraud Examiner’s Manual

In bid manipulation schemes, a procuring employee manipulates the bidding process to benefit a favored contractor or supplier. Some common ways to commit these schemes include:

  • Opening bids prematurely
  • Altering bids
  • Extending bid opening dates without justification
97
Q

Favorite targets for intelligence-gathering purposes include employees in all of the following departments EXCEPT:

A. Shipping and receiving
B. Purchasing
C. Research and development
D. Marketing

A

A. Shipping and receiving

See pages 1.712 in the Fraud Examiner’s Manual

Some of the favorite targets of intelligence gatherers include employees in the following departments: research and development (R&D), marketing, manufacturing and production, human resources (HR), sales, and purchasing.

98
Q

An insurance company might be guilty of fraud if it negotiates discounts with its medical providers and fails to apply those discounts to its consumers.

A. True
B. False

A

A. True

See pages 1.1232 in the Fraud Examiner’s Manual

An insurance company might be guilty of fraud if it fails to apply discounts that have been negotiated with providers. The alleged overcharging occurs when an insurance company negotiates a discount on a medical bill. If the company does not provide the discount, then the consumer’s copayment is made on the full price rather than the discounted price, causing the consumer to pay a higher percentage of their bill than they should.

99
Q

___________ is the technical security control involving deliberate scrambling of a message so that it is unreadable except to those who hold the key for unscrambling the message.

A. Alteration of input
B. Encryption
C. Firewall security
D. Customer validation

A

B. Encryption

See pages 1.1452 in the Fraud Examiner’s Manual

Encryption is one of the most effective methods of protecting networks and communications against attacks through technical security controls. Encryption is the deliberate scrambling of a message so that it is unreadable except to those who hold the key for unscrambling the message. Any confidential information or credit card numbers should be encrypted in their entirety.

100
Q

In most construction contracts, a certain amount will be withheld from each draw request by the contractor. This amount is not paid until the contract has been finished and approved by the owner. The withheld amount is referred to as which of the following?

A. Retainage
B. Good faith deposit
C. Withholding
D. None of the above

A

A. Retainage

See pages 1.910 in the Fraud Examiner’s Manual

Retainage (sometimes called the holdback) is the amount withheld from each draw request until the construction is complete and the lien period has expired.

101
Q

Which of the following is a technical security control that involves application-level controls implemented to prevent data from being accessed, stolen, modified, or deleted by unauthorized users?

A. Data classification
B. Application security
C. Multifactor authentication
D. Network security

A

B. Application security

See pages 1.1441, 1.1445, 1.1453 in the Fraud Examiner’s Manual

Technical security involves the use of safeguards incorporated into computer hardware or systems, operations or applications software, communications hardware and software, and related devices. Computer networks and communications are inherently insecure and vulnerable to attack and disruption. Consequently, management must use technical controls to protect systems against threats like unauthorized use, disclosure, modification, destruction, or denial of service.

Common technical controls used to secure computer systems and communication networks include:

  • Logical access controls
  • Network security
  • Operating system security
  • Encryption
  • Application security

Application security encompasses controls implemented at the application level to prevent data from being accessed, stolen, modified, or deleted by unauthorized users. Attackers can exploit vulnerabilities in the design, development, or deployment of applications that allow them to obtain sensitive information pertaining to the organization itself, its employees, or its customers; therefore, it is important for companies to regularly test applications for weaknesses and implement solutions for any issues discovered in their code.

102
Q

When a construction developer submits a draw request to a lender, all the following would be red flags for loan fraud EXCEPT:

A. Missing inspection reports
B. Omission of developer’s personal account statements
C. Failure to include lien releases from each subcontractor
D. Invoice documentation that appears altered

A

B. Omission of developer’s personal account statements

See pages 1.908-1.909 in the Fraud Examiner’s Manual

Construction loan advances are generally supported by draw requests. A draw request is the documentation substantiating that a developer has incurred the appropriate construction expenses and is now seeking reimbursement or direct payment. Generally, a draw request is made once a month and is verified by a quantity surveyor (QS) or other authorized entity as agreed to by the financial institution. The request should be accompanied by the following documents:

  • Paid invoices for raw materials
  • Lien releases from each subcontractor
  • Inspection reports
  • Canceled checks from previous draw requests
  • Bank reconciliation for construction draw account for previous month
  • Loan balancing form demonstrating that the loan remains in balance
  • Change orders, if applicable
  • Wiring instructions, if applicable
  • Proof of developer contribution, if applicable

Any missing or altered documentation is a red flag that something is amiss with the draw request. All advances on the loan should be adequately documented.

The developer’s personal account statements would never be included with a draw request.

103
Q

All the following are methods of identity theft prevention that are recommended for individuals EXCEPT:

A. Instructing the postal service to suspend mail during vacations
B. Avoiding the use of unsecured, public Wi-Fi networks
C. Using the same password or passphrase for all accounts
D. Using biometric authentication when available

A

C. Using the same password or passphrase for all accounts

See pages 1.815 in the Fraud Examiner’s Manual

The following are some of the steps that individuals can take to protect their personal information and prevent identity theft:

  • Do not give out government identification numbers unless absolutely necessary.
  • Do not carry government identification cards (or numbers) in purses or wallets.
  • Create complex passwords or passphrases that have at least eight characters and contain upper- and lowercase letters, numbers, and symbols.
  • Do not reuse passwords. Use a different password for every website, account, or device.
  • Never send personal information, such as a password or government identification number, via email. Reputable organizations will not request personal information by email.
  • When available, use biometric authentication (e.g., fingerprints, voice recognition).
  • Create unique answers for security questions. Do not choose answers containing personal information that is publicly available (e.g., name of high school, mother’s maiden name).
  • Protect computers with strong and regularly updated firewall and antivirus software, and promptly install all security updates and patches.
  • Avoid suspicious websites.
  • Delete messages from unknown senders without opening them.
  • Only download software from trusted websites.
  • Avoid using unsecured, public Wi-Fi networks.
  • Limit the amount of personal information shared on social media.
  • Use software to permanently erase all data from hard drives before disposing of computers, smartphones, copiers, printers, and other electronic devices.
  • Secure physical mailboxes with a lock, check physical mail regularly, and instruct the postal service to suspend mail during vacations.
  • Shred all sensitive documents.
  • Opt out of unsolicited offers for pre-approved credit cards or other lines of credit.
  • Pay attention to billing cycles and review all bills and statements.
  • Check credit reports regularly.
104
Q

All the following are red flags of fraudulent insurance claims EXCEPT:

A. A fire loss claim does not include family heirlooms or other sentimental items.
B. A theft claim includes a lot of recently purchased property without proof of purchase.
C. A claim is made soon after the insurance policy commences.
D. The insured has not made many insurance claims in the past.

A

D. The insured has not made many insurance claims in the past.

See pages 1.1119 in the Fraud Examiner’s Manual

Red flags of insurance fraud might include any of the following:

  • The claim is made soon after the policy’s inception or after an increase or change in the coverage under which the claim is made.
  • The insured has a history of multiple insurance claims and losses.
  • The insured previously asked an insurance agent hypothetical questions about coverage in the event of a loss similar to the actual claim.
  • In a burglary loss, the claim includes large, bulky property, which is unusual for a burglary.
  • In a theft or fire loss claim, the claim includes a lot of recently purchased, expensive property, but the insured cannot provide receipts, owner’s manuals, or other documentary proof of purchase.
  • In a fire loss claim, the claim does not include personal or sentimental items, such as photographs or family heirlooms, that would usually be listed among the lost property.
  • The insured cannot remember or does not know where they acquired the claimed property, especially unusual items, or cannot provide adequate documentation.
105
Q

Which of the following types of transactions is LEAST LIKELY to use a person-to-person (P2P) payment system?

A. A person buying groceries at a supermarket
B. A person paying for an item on an online auction site
C. A person transferring money to a friend abroad
D. A person making an online donation to a charity

A

A. A person buying groceries at a supermarket

See pages 1.1035 in the Fraud Examiner’s Manual

Person-to-person (P2P) payment systems are an increasingly popular method for making payments between individuals or between an individual and a business. P2P payments are commonly used to make online payments but are not as common for in-person payments, such as paying for clothes at a department store or buying groceries at a supermarket. These services are also used to move money internationally and between various currencies at exchange rates that rival traditional methods of currency exchange. Wise (formerly TransferWise) and PayPal are examples of popular P2P payment systems. Mobile payment applications or digital wallets, such as Venmo or Apple Pay, might also have P2P payment features.

106
Q

Which of the following is an administrative security control that an organization’s management can implement?

A. Issuing smart access cards to employees
B. Backing up system files regularly
C. Installing a firewall for the network
D. Creating an incident response plan

A

D. Creating an incident response plan

See pages 1.1441, 1.1453 in the Fraud Examiner’s Manual

Administrative security (or personnel security) consists of management constraints, operational procedures, accountability procedures, and supplemental administrative controls established to provide an acceptable level of protection for computing resources. In addition, administrative controls include procedures established to ensure that all personnel who have access to computing resources have the required authorizations and appropriate security clearances. Examples of effective administrative controls for cybersecurity include:

  • Security policies and awareness training
  • Separation of duties
  • Data classification
  • Computer security risk assessments
  • Security audits and tests
  • Incident response plans
107
Q

The solicitation phase of procurements involving open and free competition among contractors includes which of the following activities?

A. The prospective contractors prepare and submit their bids.
B. The procuring entity identifies its needs and develops the criteria used to award the contract.
C. The procuring entity performs its contractual obligations.
D. The procuring entity determines the method for acquiring the goods or services.

A

A. The prospective contractors prepare and submit their bids.

See pages 1.1509 in the Fraud Examiner’s Manual

The solicitation phase involves the bid solicitation, bid preparation, and bid submission. During this phase, the procuring entity prepares the solicitation document, provides notices of solicitation, and issues the solicitation document. After the procuring entity issues the solicitation document, the bidders prepare and submit their bids or proposals.

108
Q

Which of the following is a reason why prepaid debit and gift card fraud schemes are appealing to fraudsters?

A. Prepaid cards are difficult to track after they have been purchased and activated
B. Prepaid cards are relatively anonymous payment methods
C. Prepaid cards can be purchased at countless retailers
D. All of the above

A

D. All of the above

See pages 1.1020 in the Fraud Examiner’s Manual

In recent years, prepaid cards have gained popularity. Prepaid gift and debit cards are commonly used by those who do not have a bank account or who prefer relatively anonymous payment methods. Unfortunately, these consumers are often targeted with prepaid card fraud schemes that can manifest in many ways. Prepaid cards can be purchased at countless retailers and are difficult to track after they have been purchased and activated.

109
Q

Which of the following is a way that dishonest contractors collude to evade the competitive bidding process?

A. Refrain from submitting bids on certain contracts
B. Alternate business among themselves on a rotating basis
C. Agree to stay out of each other’s designated markets
D. All of the above

A

D. All of the above

See pages 1.1511-1.1512 in the Fraud Examiner’s Manual

Schemes involving collusion among contractors seek to evade the competitive bidding process. In these schemes, competitors in the same market collude to defeat competition or to inflate the prices of goods and services artificially.

The following schemes are common forms of collusion between competitors:

  • Bid rotation—Bid rotation, also known as bid pooling, occurs when two or more contractors conspire to alternate the business among themselves on a rotating basis.
  • Bid suppression—Bid suppression occurs when two or more contractors enter into an illegal agreement whereby at least one of the conspirators refrains from bidding or withdraws a previously submitted bid.
  • Market division—Market division (or market allocation) schemes involve agreements among competitors to divide and allocate markets and to refrain from competing in each other’s designated portion of the market.
110
Q

Which of the following BEST describes how a baiting scheme works in the context of identity theft?

A. Fraudsters impersonate the victim’s bank to persuade the victim into releasing information.
B. Fraudsters deceive victims into inserting data storage devices that have been infected with malware into their computers.
C. Fraudsters use telephone calls or voice messages to manipulate people into revealing personal or business information.
D. Fraudsters use imitation websites to deceive computer users into entering sensitive data.

A

B. Fraudsters deceive victims into inserting data storage devices that have been infected with malware into their computers.

See pages 1.811, 1.813 in the Fraud Examiner’s Manual

In a baiting scheme, fraudsters leave flash drives, CD-ROMs, or similar items that have been infected with malware in places where people will find them, such as parking lots. The items often have a label designed to elicit curiosity or greed in the victims (e.g., “FREE PRIZE”). Alternatively, the item could be left in a workplace break room with a label that seems relevant (e.g., “Year-End Report”). When the item is inserted into the victim’s computer, the computer or network is infected, giving the identity thief access to information.

In the context of identity theft, social engineering refers to the psychological manipulation of people to deceive them into revealing personal or business information. Social engineering often involves pretexting, the act of using an invented scenario (i.e., a pretext) to persuade a person to release information or perform an action. Identity thieves often engage in pretexting by impersonating the victim’s bank or another financial institution with which the victim has a business relationship.

Vishing (or voice phishing) schemes involve the use of telephone calls or voice messages to deceive people into revealing personal or business information.

In a pharming scheme, internet users are automatically redirected from a legitimate website to an imitation website.

111
Q

An incident response plan should be created and implemented during the breach notification step of the recommended methodology for responding to cybersecurity incidents.

A. True
B. False

A

B. False

See pages 1.1462-1.1463 in the Fraud Examiner’s Manual

Every organization should be ready to respond to a wide range of cybersecurity incidents, including cyberattacks and data breaches. The recommended methodology for responding to cybersecurity incidents can be summarized in the following steps:

  1. Preparation
  2. Detection and analysis
  3. Containment and eradication
  4. Breach notification
  5. Recovery and follow-up

It is critical that organizations have an incident response plan for dealing with intrusions before they occur. An incident response plan describes the actions the organization will take when a data breach occurs. The incident response plan should be created and implemented during the preparation step.

112
Q

Special care facilities generally have the capability to fulfill all of their patients’ needs without the services of outside providers, leading to a lower likelihood of fraud involving such institutions.

A. True
B. False

A

B. False

See pages 1.1225-1.1226 in the Fraud Examiner’s Manual

Medical facilities that offer special care services, such as nursing homes and psychiatric hospitals, and the patients in them are at a greater risk of fraud than most other medical institutions. Many health care fraud schemes are revealed after a patient reports strange charges or other red flags. Unfortunately, criminals take advantage of the fact that patients in special care facilities are more vulnerable to fraud.

Many special care facilities do not have the in-house capability to provide all the services and supplies their patients need. Accordingly, outside providers market their services and supplies to special care facilities to serve the needs of their patients. Some special care facilities allow outside providers or their representatives to review patient medical records; these providers can obtain all the information necessary to order and bill for services and supplies that are not necessary or even provided.

113
Q

DRG creep occurs when staff members at hospitals or other medical institutions intentionally manipulate diagnostic and procedural codes in a pattern to increase claim reimbursement amounts.

A. True
B. False

A

A. True

See pages 1.1219 in the Fraud Examiner’s Manual

Hospitals and other medical institutions use diagnostic-related groupings (DRGs) to categorize patients based on their diagnosis, treatment, length of stay, and other factors.

DRG creep occurs when a hospital or other medical institution deliberately and systematically manipulates diagnostic and procedural codes to increase reimbursement amounts or other forms of funding. In other words, DRG creep is an intentional pattern of upcoding by a hospital or other medical institution. For example, a hospital might repeatedly and incorrectly code angina (pain or discomfort in the chest due to some obstruction of the arteries) as a myocardial infarction (a more serious event, commonly known as a heart attack) and thus be reimbursed at a higher level.

114
Q

Which of the following is an example of traditional identity theft?

A. Applying for a credit card using a real government identification number and a fake name
B. Creating a fictitious name, birthdate, and address to apply for a loan
C. Stealing an individual’s personal information and opening an account under their name
D. Using a child’s government identification number to create a false identity

A

C. Stealing an individual’s personal information and opening an account under their name

See pages 1.803-1.804 in the Fraud Examiner’s Manual

In traditional identity theft, a fraudster steals an individual’s personal information and pretends to be that individual. For example, a fraudster might use an individual’s name, government identification number, and date of birth to impersonate the individual and gain access to the individual’s bank account. This is called an account takeover. Another type of traditional identity theft is true name fraud, in which a fraudster uses an individual’s personal information to open a new account under the individual’s name. Unlike an account takeover, which involves an existing account, true name fraud involves a new account.

Synthetic identity theft involves the use of entirely fabricated personal information or a combination of real and fabricated information to create a new identity.

115
Q

What is the primary difference between a Ponzi scheme and a pyramid scheme?

A. All pyramid schemes are legal whereas all Ponzi schemes are illegal.
B. In a pyramid scheme, old investors are paid with money from new investors.
C. A Ponzi scheme is promoted by encouraging victim members to recruit new members.
D. A pyramid scheme promotes itself as a pyramid whereas a Ponzi scheme promotes itself as an investment opportunity.

A

D. A pyramid scheme promotes itself as a pyramid whereas a Ponzi scheme promotes itself as an investment opportunity.

See pages 1.1345 in the Fraud Examiner’s Manual

The difference between a Ponzi scheme and an illegal pyramid is how the operation is promoted. Illegal pyramids are promoted as pyramids whereas Ponzi schemes are promoted as investment opportunities. In an illegal pyramid, the pyramidal structure helps recruit new participants, each believing that they will rise through the ranks of the pyramid. A Ponzi scheme, however, masquerades as some type of investment.

116
Q

ABC Paving and XYZ Asphalt are the only two companies in Greenwood County that lay asphalt. An audit reveals that the government is paying more for asphalt work in Greenwood County than in other counties in the region. A review of the records reveals that of the last ten asphalt contracts awarded in Greenwood County, five have gone to ABC and five have gone to XYZ. Which of the following procurement fraud schemes is MOST LIKELY occurring?

A. Product substitution
B. Bid rotation
C. Need recognition
D. Defective pricing

A

B. Bid rotation

See pages 1.1512 in the Fraud Examiner’s Manual

Based on the facts provided, ABC Paving and XYZ Asphalt could be engaged in a bid rotation (or bid pooling) scheme, which is a form of collusion among contractors. Bid rotation occurs when two or more contractors conspire to alternate the business among themselves on a rotating basis. Instead of engaging in competitive contracting, the bidders exchange information on contract solicitations to guarantee that each contractor will win a share of the purchasing entity’s business and potentially enable them to charge inflated prices for their contracts.

117
Q

Which of the following is NOT a potential indicator of insurance fraud?

A. An insured previously asked an insurance agent hypothetical questions about details similar to those involved in the claim.
B. A claim is made shortly after a change in policy coverage.
C. A claim for a burglary loss includes large, bulky property.
D. An insured can provide the insurance company with documentation for claims involving expensive property.

A

D. An insured can provide the insurance company with documentation for claims involving expensive property.

See pages 1.1119 in the Fraud Examiner’s Manual

Red flags of insurance fraud might include any of the following:

  • The claim is made soon after the policy’s inception or after an increase or change in the coverage under which the claim is made.
  • The insured has a history of multiple insurance claims and losses.
  • The insured previously asked an insurance agent hypothetical questions about coverage in the event of a loss similar to the actual claim.
  • In a burglary loss, the claim includes large, bulky property, which is unusual for a burglary.
  • In a theft or fire loss claim, the claim includes a lot of recently purchased, expensive property, but the insured cannot provide receipts, owner’s manuals, or other documentary proof of purchase.
  • In a fire loss claim, the claim does not include personal or sentimental items, such as photographs or family heirlooms, that would usually be listed among the lost property.
  • The insured cannot remember or does not know where they acquired the claimed property, especially unusual items, or cannot provide adequate documentation.
118
Q

Which of the following activities is included in the bid evaluation and award phase of procurements involving open and free competition among contractors?

A. The procuring employees perform their contractual obligations.
B. The procuring employees develop the bid specifications.
C. The procuring employees issue the solicitation document.
D. The procuring employees assess the bids or proposals.

A

D. The procuring employees assess the bids or proposals.

See pages 1.1509 in the Fraud Examiner’s Manual

In the bid evaluation and award phase, the procuring employees evaluate the bids or proposals, conduct discussions and negotiations, and give the bidders an opportunity to revise their proposals. Procuring employees then select the winning bid or proposal.

119
Q

he primary purpose of physical access controls is to prevent unauthorized access to computer software.

A. True
B. False

A

B. False

See pages 1.1443, 1.1445 in the Fraud Examiner’s Manual

Physical access controls refer to the process by which users are allowed access to physical objects (e.g., buildings). In contrast, logical access controls are tools used to control access to computer information systems and their components.

120
Q

Which of the following types of elder fraud schemes often involves property that does not exist or is significantly different than promised?

A. Tech-support scheme
B. Vacation scheme
C. Home improvement scheme
D. Grandparent scheme

A

B. Vacation scheme

See pages 1.1313-1.1315 in the Fraud Examiner’s Manual

Elder fraud, also known as elder financial abuse, includes different types of consumer fraud schemes perpetrated against older individuals. In travel, vacation, and timeshare schemes, fraudsters post advertisements for vacation properties that are nonexistent, significantly different than promised, or not available for rent. Telemarketers sometimes target older individuals directly, promising inexpensive vacation packages or timeshares that can be easily resold.

In a tech-support scheme, a fraudster attempts to convince victims to pay for unnecessary computer services to repair nonexistent viruses or other problems. The scheme usually begins with a fraudster calling a victim and claiming to be a computer technician working for a well-known tech company (e.g., Microsoft or Apple). Alternatively, the victim might be tricked into calling the fraudster directly via pop-up messages warning about nonexistent computer problems. Once the victim is speaking to the fraudster by phone, the fraudster generally instructs the victim to download and launch software that gives the fraudster remote access to the victim’s computer. The fraudster proceeds to perform phony diagnostic tests on the victim’s computer, falsely claims to have detected viruses or other problems, and offers to fix the victim’s computer for a fee. In addition to collecting a fee for unnecessary services, the fraudster might install spyware onto the victim’s computer.

In a grandparent scheme, a scammer calls an older individual and asks if the individual knows who is calling. When the grandparent guesses the name of a grandchild, the scammer pretends to be that grandchild. The scammer claims to be in a financial bind and asks if the grandparent can send money via the internet or a money transfer service. The scammer urges the grandparent to avoid telling anyone about the situation. Once scammers receive the money, they continue to contact the grandparent for more money.

In a home improvement scheme, the fraudster recommends a friend who can perform needed home repairs for an older individual at a reasonable price. This friend might require the homeowner to sign a document upon completion, confirming repairs were made. In some cases, the victims later learn that they signed over the title of their house to the repairperson. In other cases, not only is the victim overcharged, but the work is also performed improperly.

121
Q

Which of the following is a red flag for new bank account fraud?

A. A customer lists a mail drop as the account’s mailing address
B. A customer leaves out requested information on the account application
C. A customer requests a large cash withdrawal immediately after opening the account
D. All of the above

A

D. All of the above

See pages 1.936-1.937, 1.940 in the Fraud Examiner’s Manual

Fraud is much more likely to occur in new accounts than in established accounts. New account fraud is generally defined as fraud that occurs on an account within the first ninety days that it is open; often, perpetrators open these accounts with the sole intent of committing fraud. Prompt, decisive action is necessary to manage and/or close apparent problem accounts. Some of the more common red flags of potential new account schemes are:

  • Customer residence outside the bank’s trade area
  • Dress and/or actions inconsistent or inappropriate for the customer’s stated age, occupation, or income level
  • New account holder requesting immediate cash withdrawal upon deposit
  • Request for large quantity of temporary checks
  • Services included with the account that do not match the customer’s purpose
  • Missing or inaccurate customer application information
  • Invalid phone numbers or addresses in customer account information
  • Use of a mail drop address (a service where a non-affiliated party collects and distributes mail for individuals or entities)
  • Large check or automated teller machine (ATM) deposits followed by rapid withdrawal or transfer of funds (a pass-through account)
  • Business accounts without standard business transactions, such as payroll or transactions that would be expected in that business
  • Transactions without a clear purpose in jurisdictions known for high levels of corruption
  • Opening deposit that is a nominal cash amount
  • Rare customer ID type
  • Applicants over the age of 25 with no credit history
  • Customers who cannot remember basic application information (e.g., phone number or address)
122
Q

Which of the following situations is often present in real estate fraud schemes?

A. No expert assistance at closing
B. The services of an arm’s-length legal representative
C. A false appraisal report
D. All of the above

A

C. A false appraisal report

See pages 1.918 in the Fraud Examiner’s Manual

Real estate transactions assume a willing buyer and a willing seller. Fraud can occur when the transaction breaks down or the expert assistance is not at arm’s length (i.e., not immediately attainable). Many real estate fraud schemes have a false appraisal report as a condition precedent.

123
Q

When developing a program for safeguarding proprietary information (SPI), an organization should form a company task force to develop the program, and the task force should include representatives from relevant departments across the company, such as research and development (R&D), corporate security, and records management.

A. True
B. False

A

A. True

See pages 1.744 in the Fraud Examiner’s Manual

To coordinate a company-wide program for safeguarding proprietary information (SPI), management should establish a task force and charge it with developing the program. The task force should include managers and staff from departments that deal with proprietary information, such as research and development (R&D) and production. The task force should also include representatives from the following departments: corporate security, human resources (HR), records management, data processing, and legal.

Once the task force is assembled, it must identify the information that is to be protected. To make this determination, the task force should identify those areas that give the company its competitive edge (e.g., quality of the product, service, price, manufacturing technology, marketing, and distribution). When doing so, the task force should ask, “What information would a competitor like to know?”

124
Q

Which of the following is a recommended step that individuals should take to protect themselves from identity theft?

A. Create unique answers for security questions
B. Use passwords that have at least eight characters
C. Limit personal information shared on social media
D. All of the above

A

D. All of the above

See pages 1.815 in the Fraud Examiner’s Manual

The following are some of the steps that individuals can take to protect their personal information and prevent identity theft:

  • Do not give out government identification numbers unless absolutely necessary.
  • Do not carry government identification cards (or numbers) in purses or wallets.
  • Create complex passwords or passphrases that have at least eight characters and contain upper- and lowercase letters, numbers, and symbols.
  • Do not reuse passwords. Use a different password for every website, account, or device.
  • Never send personal information, such as a password or government identification number, via email. Reputable organizations will not request personal information by email.
  • When available, use biometric authentication (e.g., fingerprints, voice recognition).
  • Create unique answers for security questions. Do not choose answers containing personal information that is publicly available (e.g., name of high school, mother’s maiden name).
  • Protect computers with strong and regularly updated firewall and antivirus software, and promptly install all security updates and patches.
  • Avoid suspicious websites.
  • Delete messages from unknown senders without opening them.
  • Only download software from trusted websites.
  • Avoid using unsecured, public Wi-Fi networks.
  • Limit the amount of personal information shared on social media.
  • Use software to permanently erase all data from hard drives before disposing of computers, smartphones, copiers, printers, and other electronic devices.
  • Secure physical mailboxes with a lock, check physical mail regularly, and instruct the postal service to suspend mail during vacations.
  • Shred all sensitive documents.
  • Opt out of unsolicited offers for pre-approved credit cards or other lines of credit.
  • Pay attention to billing cycles and review all bills and statements.
  • Check credit reports regularly.
125
Q

Cooper is an intelligence professional for Whetstone Intelligence, a competitive intelligence firm. He is tasked with gathering intelligence about Cryptic Global, the major competitor of Whetstone’s biggest client. To gather the intelligence, Cooper infiltrates Cryptic Global’s office by posing as a member of its cleaning crew and collects information left around employees’ computers and desks. Cooper’s approach is an example of:

A. Spoofing
B. Shoulder surfing
C. Dumpster diving
D. Scavenging

A

D. Scavenging

See pages 1.706, 1.721, 1.1414 in the Fraud Examiner’s Manual

Scavenging involves collecting information left around computer systems (e.g., on desks or workstations).

Dumpster diving involves obtaining sensitive information by looking through someone else’s trash (e.g., via dumpsters and other trash receptacles).

Shoulder surfing involves observing an unsuspecting target from a nearby location while the target enters a username and password into a system, talks on the phone, fills out financial forms, or performs some other task from which valuable information can be obtained.

Spoofing refers to the process whereby an individual impersonates a legitimate user to obtain access to the target’s network.

126
Q

Which of the following scenarios illustrates a fraudster’s use of social engineering?

A. A fraudster calls a company employee and requests sensitive information while claiming to be a coworker whose systems are down
B. A fraudster without an employee badge gains access to a secure facility by following legitimate employees who are oblivious to the fraudster’s presence
C. A fraudster has lunch at a restaurant where a target company’s employees are known to eat with the intention of overhearing sensitive conversations
D. None of the above

A

A. A fraudster calls a company employee and requests sensitive information while claiming to be a coworker whose systems are down

See pages 1.719 in the Fraud Examiner’s Manual

Social engineering is the act of using deceptive techniques to manipulate people into taking certain actions or disclosing information.

In social engineering schemes, social engineers use various forms of trickery, persuasion, or threats to encourage their targets to release information that the engineers can use and exploit to achieve their goals.

Attackers engage in social engineering for various reasons. Some use social engineering to gain unauthorized access to systems or obtain confidential communication so that they can commit fraud, intrude into networks, gain access to buildings, steal another party’s secrets, commit identity theft, or engage in some other nefarious act. In some situations, attackers use social engineering to procure information that will give them a competitive advantage, whereas others might engage in social engineering to find ways in which they can install malware.

127
Q

Pharming is a type of attack in which users are fooled into entering sensitive data into a malicious website that imitates a legitimate website.

A. True
B. False

A

A. True

See pages 1.1411 in the Fraud Examiner’s Manual

Pharming is a type of attack in which users are fooled into entering sensitive data (such as a password or credit card number) into a malicious website that imitates a legitimate website. It is different from phishing because in pharming schemes, the attacker does not have to rely on users clicking a link in an email or other message to direct them to the imitation website.

128
Q

How do smart cards differ from ordinary credit cards?

A. Smart cards are immune from physical, side-channel, and environmental attacks.
B. Smart cards are embedded with a microchip that is not easily replicated.
C. Smart cards are designed to prevent fraudulent online card-not-present (CNP) transactions.
D. Smart cards contain special holograms that identify the cardholder.

A

B. Smart cards are embedded with a microchip that is not easily replicated.

See pages 1.1028-1.1029 in the Fraud Examiner’s Manual

A smart card is a plastic card, the size of a payment card, embedded with a microchip. A key advantage of smart cards is that, unlike regular magnetic stripe payment cards, they cannot be easily replicated. Similarly, smart cards cannot be easily counterfeited, which greatly reduces the potential for fraud with in-person transactions. Smart cards include a wide variety of hardware and software features capable of detecting and reacting to tampering attempts and countering possible attacks. If someone tries to tamper with a chip on a smart card, the card detects the intrusion and shuts itself down, rendering the card useless.

Although smart cards are designed to withstand different kinds of potential attacks on security, they are not immune from attacks. There are four main classes of attacks on smart cards: physical, side-channel, software, and environmental.

While the adoption of smart cards has significantly reduced fraud for card-present (CP) transactions, much of the fraud has been displaced to card-not-present (CNP) transactions on the internet. Significant increases in CNP fraud have occurred globally in the years following the transition to smart cards. Large-scale data breaches and the continued increase in online spending have also contributed to the rising volume of CNP fraud.

129
Q

Mobile payments that require biometric authentication, such as a partial fingerprint or three-dimensional facial scan, are usually less vulnerable to cyberattacks.

A. True
B. False

A

A. True

See pages 1.1040-1.1041 in the Fraud Examiner’s Manual

The widespread presence of mobile devices has fostered a demand for mobile payments. These payments are typically made through contactless technology, such as digital wallets or applications—also known as in-app payments. Most mobile payments require users to authenticate themselves, and the technology available in many mobile devices allows for biometric authentication, such as a partial fingerprint or three-dimensional facial scan, which is difficult for fraudsters to bypass.

Mobile payments that do not require or offer biometric authentication can be more vulnerable to cyberattacks due to the common practice of using the same log-in credentials for multiple applications. If one application is hacked, criminals might attempt to access various platforms with the same credentials.

130
Q

Which of the following is an accurate definition of smishing?

A. Using voice mail to steal private financial data
B. Using computers to steal data from payroll accounts
C. Impersonating a government official to obtain sensitive data
D. Using text messages to obtain sensitive data

A

D. Using text messages to obtain sensitive data

See pages 1.1410 in the Fraud Examiner’s Manual

Smishing is a hybrid of phishing and short message service (SMS), also known as text messaging. These schemes use text messages or other short message systems to conduct phishing activities. That is, in smishing schemes, the attacker uses text messages or other SMSs to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, internet service provider (ISP), or other entity with which the target does business.

131
Q

A pyramid scheme is designed to pay off its earliest investors.

A. True
B. False

A

A. True

See pages 1.1339 in the Fraud Examiner’s Manual

Pyramid schemes are designed to pay off their earliest investors but not later investors. Probability studies have shown that 93%–95% of the participants in a pyramid scheme (all but those who join at the earliest stage) will lose most of their money. Half can expect to lose all the money they invest.

132
Q

A double-pledging collateral scheme is a type of loan fraud in which a borrower uses the same property as collateral with different lenders before liens are recorded without telling the lenders.

A. True
B. False

A

A. True

See pages 1.905 in the Fraud Examiner’s Manual

In double-pledging collateral schemes, borrowers pledge the same collateral (i.e., an item of value used to secure or guarantee a loan) with different lenders before liens are recorded without telling the lenders.

133
Q

Which of the following is an example of a way in which an electronic funds transfer (EFT) fraud scheme can be committed?

A. A hacker obtains the account and password information of consumers to direct funds from their accounts
B. An employee of a person-to-person (P2P) provider misappropriates a customer’s account and password information
C. A person who has stolen information about another person’s bank account instructs a biller to obtain payment from that account
D. All of the above

A

D. All of the above

See pages 1.1036 in the Fraud Examiner’s Manual

There are several ways in which fraud can be perpetrated through the electronic transfer of funds. Potential sources of fraud include the following:

  • A biller might send a bill for services not rendered or for goods never sent.
  • A person who has obtained information about another person’s bank account might instruct a biller to obtain payment from the other person’s account.
  • A hacker might obtain passwords and usernames from an aggregator and use that information to direct transfers from a consumer’s bank account.
  • An employee at the site providing electronic bill presentment and payment (EBPP) services who knows consumers’ usernames and passwords might use that information to direct transfers from consumers’ bank accounts.
  • A bank employee might use customer information to direct transfers from a customer’s account.
134
Q

Which of the following is the BEST example of shoulder surfing?

A. Following an authorized person into a restricted area
B. Leaving a flash drive that has been infected with spyware in a workplace break room
C. Watching a customer enter a PIN at an ATM
D. Accessing a computer network by convincing an authorized user to share log-in information

A

C. Watching a customer enter a PIN at an ATM

See pages 1.810-1.811, 1.813 in the Fraud Examiner’s Manual

Shoulder surfing is the practice of observing another person (e.g., looking over the person’s shoulder) to gather personal information. Shoulder surfing is especially effective in crowded areas where a fraudster can stand close to a victim without being noticed. While in close proximity, the fraudster can eavesdrop on the victim’s telephone conversation, view the victim’s credit card number, or gather other personal information. Identity thieves often watch victims as they enter their personal identification numbers (PINs) at automated teller machines (ATMs) or fill out bank deposit slips at their banks.

Leaving a flash drive that has been infected with spyware in a workplace break room is an example of a baiting scheme. The other two scenarios are examples of piggybacking.

135
Q

Jeff works as a teller at a bank. One of Jeff’s friends came in as a customer and presented a cashier’s check. Jeff could tell that the check was counterfeit, but the friend convinced him to cash it for a share of the proceeds. Which of the following BEST describes the scheme in which Jeff engaged?

A. False accounting entry
B. Theft of physical property
C. Unauthorized use of collateral
D. Unauthorized disbursement of funds to outsiders

A

D. Unauthorized disbursement of funds to outsiders

See pages 1.901, 1.903 in the Fraud Examiner’s Manual

There are various embezzlement schemes that have been used over time against financial institutions. The scheme in this scenario involves an employee abusing his authority to approve a fraudulent (i.e., counterfeit, forged, or stolen) instrument to make an unauthorized disbursement of funds to an outsider.

136
Q

Which of the following is an example of an effective administrative security control?

A. Security audits and tests
B. Separation of duties
C. Security policies and awareness training
D. All of the above

A

D. All of the above

See pages 1.1441, 1.1453 in the Fraud Examiner’s Manual

Administrative security (or personnel security) consists of management constraints, operational procedures, accountability procedures, and supplemental administrative controls established to provide an acceptable level of protection for computing resources. In addition, administrative controls include procedures established to ensure that all personnel who have access to computing resources have the required authorizations and appropriate security clearances. Examples of effective administrative controls for cybersecurity include:

  • Security policies and awareness training
  • Separation of duties
  • Data classification
  • Computer security risk assessments
  • Security audits and tests
  • Incident response plans
137
Q

Which of the following does NOT constitute an electronic funds transfer (EFT)?

A. An airline ticket purchased through the internet with the use of a credit card
B. A transfer of funds from a checking account to a savings account performed on a personal computer
C. A customer’s use of a debit card to purchase dinner at a restaurant
D. The computer-initiated deposit of an employee’s paycheck directly into the employee’s bank account

A

A. An airline ticket purchased through the internet with the use of a credit card

See pages 1.1031-1.1032 in the Fraud Examiner’s Manual

An electronic funds transfer (EFT) is any transfer of funds, other than one originated by a check or similar paper instrument, that is initiated through an electronic terminal, telephonic instrument, or computer or magnetic tape that orders or purports to authorize a financial institution to debit or credit an account. Because it does not result in a transfer of funds, the use of a credit card to make a payment does not constitute an EFT. Although jurisdiction-specific regulations and terminology might differ, each of the following could generally be considered an EFT:

  • A customer’s withdrawal of funds from the customer’s own account by use of an automated teller machine (ATM)
  • A customer’s transfer of funds from the customer’s checking account to the customer’s savings account at the same financial institution initiated by the customer through a personal computer
  • A customer’s transfer of funds from the customer’s checking account to the customer’s savings account at the same financial institution initiated by the customer through the bank’s automated telephone service
  • A customer’s use of a debit card to purchase goods from a merchant who swipes the card through a point-of-sale (POS) device to authorize the deduction of the amount of the sale from the customer’s checking account
  • A customer’s transfer of funds from the customer’s bank account to a third party initiated by the customer through a personal computer
  • An employer’s instruction, initiated by computer or through a magnetic tape, to a financial institution to deposit funds representing an employee’s pay into the employee’s account
  • A noncustomer’s instruction, initiated by computer or through a magnetic tape, to a financial institution to withdraw funds from a customer’s checking account and transfer the funds to a noncustomer’s bank account
138
Q

A Ponzi scheme can BEST be described as an illegal business structure that might offer merchandise or services but generates almost all its revenues from the relentless recruitment of new members.

A. True
B. False

A

B. False

See pages 1.1334, 1.1339 in the Fraud Examiner’s Manual

A Ponzi scheme is generally defined as an illegal business practice in which new investors’ money is used to make payments to earlier investors. The investment opportunity is typically presented with the promise of uncommonly high returns. While the scam is presented as a legitimate investment, there is minimal or no actual commerce involved.

In contrast, an illegal pyramid scheme is unique in that the more members that are recruited, the higher the investor is purported to rise in the ranks of the enterprise and the more money the investor is supposed to make.

139
Q

An unauthorized withdrawal is a type of embezzlement scheme in which financial institution employees debit the general ledger to credit their own accounts or conceal a theft from a customer account.

A. True
B. False

A

B. False

See pages 1.901-1.902 in the Fraud Examiner’s Manual

There are various embezzlement schemes that have been used over time against financial institutions. In false accounting entry schemes, employees debit the general ledger to credit their own accounts or conceal a theft from a customer account. In other words, employees adjust the general ledger to conceal the stolen amount.

In an unauthorized withdrawal scheme, employees simply make unauthorized withdrawals from customer accounts; they do not attempt to conceal the theft by adjusting the financial institution’s general ledger.

140
Q

Glenn has just inherited a large amount of money from a deceased relative. Several weeks later, a colleague of Glenn’s suggests an investment in a security that is sure to generate returns of 20% every six months. Glenn is intrigued, but he is also worried that it might be a Ponzi scheme. Which of the following actions should Glenn take before investing?

A. Ensure that he can comprehend the details and strategy of the investment
B. Find out if the financial manager is licensed and if the security is registered
C. Determine if the investment’s returns have been abnormally consistent
D. All of the above

A

D. All of the above

See pages 1.1338 in the Fraud Examiner’s Manual

The following are red flags of Ponzi schemes:

  • Sounds too good to be true—If an investment opportunity seems suspiciously better than it should be, then it is probably a Ponzi scheme.
  • Promises of low risk or high rewards—Promoters of Ponzi schemes typically promise implausibly high or quick returns with little risk. As all legitimate investments include some risk, any guarantee that an investment will perform in a certain way is a clear signal that it might be part of a Ponzi scheme.
  • History of consistent returns—Any firm that generates remarkably consistent returns regardless of market conditions should raise suspicions.
  • High-pressure sales tactics—Reputable investment firms and agents do not push potential investors to act immediately, and legitimate investment opportunities are rarely that time sensitive.
  • Pressure to reinvest—Often, fraudsters keep Ponzi schemes going by convincing investors to reinvest their profits rather than take a payout.
  • Complex trading strategies—Legitimate agents should be able to provide clear explanations about their investment strategies. For obvious reasons, Ponzi-scheme boosters purposefully employ complicated strategies that confound unsophisticated investors.
  • Lack of transparency or access—Secrecy surrounding the operations of a financial company should be an immediate warning sign. Ponzi operators are often unlicensed, and their supposed investments are typically unregistered. Additionally, a lack of access to regular statements or an online account should trigger alarm.
  • Lack of separation of duties—Investors should be wary of any financial manager who manages, administers, and retains custody of the fund in question.
141
Q

Which of the following is a type of physical access control device that can be used to control access to physical objects?

A. Locks and keys
B. Biometric systems
C. Electronic access cards
D. All of the above

A

D. All of the above

See pages 1.1443 in the Fraud Examiner’s Manual

There are various types of physical access control devices that can be used to control access to physical objects. Some common types include:

  • Locks and keys
  • Electronic access cards
  • Biometric systems
142
Q

Matthew receives a voice mail message telling him that his credit card might have been used fraudulently. He is asked to call a phone number. When he calls the number, he hears a menu and a list of choices that closely resembles those used by his credit card company. The phone number even appears to be similar to that of his card issuer. Of which of the following types of schemes has Matthew become the target?

A. Smishing
B. Vishing
C. Pharming
D. Spear phishing

A

B. Vishing

See pages 1.1410 in the Fraud Examiner’s Manual

Vishing, or voice phishing, is the act of leveraging Voice over Internet Protocol (VoIP) in using the telephone system to falsely claim to be a legitimate enterprise to scam users (both consumers and businesses) into disclosing personal information or executing an act that furthers a scheme. Government and financial institutions, as well as online auctions and their payment services, can be targets of voice phishing.

A vishing scheme is generally transmitted as an incoming recorded telephone message that uses a spoofed (fraudulent) caller ID matching the identity of a misrepresented organization. The message uses an urgent pretext to direct unsuspecting users to another telephone number. The victim is invited to input their personal information using their telephone keypad. The criminals capture the key tones and convert them back to numerical format.

143
Q

Which of the following is TRUE concerning the different types of workers’ compensation fraud schemes?

A. In an agent fraud scheme, agents sometimes issue certificates of coverage to the insured customer while pilfering the premium
B. In premium fraud, an employer might understate the amount of the payroll for higher-risk classifications to get a lower-cost premium
C. In an organized fraud scheme, a lawyer, a capper, a doctor, and the claimant often collude to defraud the insurance company
D. All of the above

A

D. All of the above

See pages 1.1110-1.1113 in the Fraud Examiner’s Manual

Workers’ compensation schemes are generally broken into four categories: premium fraud, agent fraud, claimant fraud, and organized fraud schemes.

  • Premium fraud involves the misrepresentation of information to the insurer by employers to lower the cost of workers’ compensation premiums. For example, an employer might understate the amount of the payroll for higher-risk classifications, thus receiving lower-cost premiums.
  • Agent fraud schemes consist primarily of pilfering premiums and conspiring to reduce premiums. Underhanded agents sometimes issue certificates of coverage to the ostensibly insured customer while misappropriating the premium rather than forwarding it to the insurance carrier. Agents might also conspire to alter or improperly influence insurance applications to offer lower premiums to their clients.
  • Claimant fraud involves misrepresenting the circumstances of any injury or fabricating that an injury occurred.
  • Organized fraud schemes are composed of the united efforts of a lawyer, a capper, a doctor, and the claimant. This type of scheme is used not only in workers’ compensation cases but also in other medical frauds, such as automobile injuries.
144
Q

Which of the following is a red flag of a procurement fraud scheme in which vendors are colluding to evade the competitive bidding process?

A. There is a pattern indicating that the last party to bid wins the contract
B. The winning bidder subcontracts work to losing bidders
C. Qualified contractors do not submit bids
D. All of the above

A

D. All of the above

See pages 1.1513-1.1514 in the Fraud Examiner’s Manual

Common red flags of procurement fraud schemes involving collusion among contractors include:

  • The industry has limited competition.
  • The same contractors bid on each project or product.
  • The winning bid appears too high.
  • All contractors submit consistently high bids.
  • Qualified contractors do not submit bids.
  • The winning bidder subcontracts work to one or more losing bidders or to non-bidders.
  • Bids appear to be complementary bids by companies unqualified to perform the work.
  • Some bids fail to conform to the essential requirements of the solicitation documents (i.e., some bids do not comply with bid specifications).
  • Some losing bids were poorly prepared.
  • Fewer competitors than usual submit bids on a project or product.
  • When a new contractor enters the competition, the bid prices begin to decline.
  • There is a rotational pattern to winning bidders (e.g., geographical, customer, job, or type of work).
  • There is evidence of collusion in the bids (e.g., bidders make the same mathematical or spelling errors; bids are prepared using the same typeface, handwriting, stationery, or envelope; or competitors submit identical bids).
  • There is a pattern indicating that the last party to bid wins the contract.
  • There are patterns of conduct by bidders or their employees that suggest the possibility of collusion (e.g., competitors regularly socialize, hold meetings, visit each other’s offices, or subcontract with each other).
145
Q

Which of the following activities is included in the post-award and administration phase of procurements involving open and free competition among contractors?

A. The procuring entity evaluates the bids or proposals.
B. The procuring entity develops the bid specifications.
C. The procuring entity performs its contractual obligations.
D. The procuring entity issues the solicitation document.

A

C. The procuring entity performs its contractual obligations.

See pages 1.1510 in the Fraud Examiner’s Manual

During the post-award and administration phase, the parties that were contracted fulfill their respective duties through the performance of their contractual obligations. Activities that occur during this phase include contract modifications (i.e., change orders); review of completed portions and release of monies; and assessment of deliverables for compliance with the contract terms, including quality control.

146
Q

Examples of fraud schemes perpetrated by health care institutions and their employees include all the following EXCEPT:

A. DRG creep
B. Billing for experimental procedures
C. Unintentional misrepresentation of the diagnosis
D. Improper contractual relationships

A

C. Unintentional misrepresentation of the diagnosis

See pages 1.1218 in the Fraud Examiner’s Manual

Fraud schemes perpetrated by institutions and their employees include those commonly used by doctors and other providers. However, the more common schemes in which hospitals are primarily involved include:

  • Filing of false cost reports
  • DRG creep
  • Billing for experimental procedures
  • Improper contractual and other relationships with physicians
  • Revenue recovery firms to (knowingly or unknowingly) bill extra charges
147
Q

The chances of being arrested and prosecuted for check fraud are high, and the penalties are relatively severe in most jurisdictions.

A. True
B. False

A

B. False

See pages 1.1007 in the Fraud Examiner’s Manual

Check fraud is considered a relatively low-risk crime; the chances of being arrested and prosecuted are low, and the penalties are relatively mild in most jurisdictions.

148
Q

Second-hand computers, media drives, and mobile phones are safe from identity thieves if the former owner has manually deleted all personal information from such devices.

A. True
B. False

A

B. False

See pages 1.809 in the Fraud Examiner’s Manual

Fraudsters commonly obtain personal and business information from improperly discarded computers, media drives, copiers, printers, mobile phones, and other devices. Like computers, some copiers and printers have internal hard drives that store sensitive data. Because it is possible to recover deleted data, fraudsters might search for sensitive information on second-hand devices that they purchase online or obtain from another source. Data can be permanently erased from such devices with specialized software.

149
Q

Which of the following practices is a potential indicator of a bid splitting scheme?

A. Two or more purchases from the same supplier in amounts just above competitive bidding limits
B. Sequential purchases under the competitive bidding limits that are followed by change orders
C. Frequent use of sole-source procurement contracts
D. Low employee turnover in an organization’s procurement department

A

B. Sequential purchases under the competitive bidding limits that are followed by change orders

See pages 1.1519-1.1520 in the Fraud Examiner’s Manual

In general, procuring entities must use competitive methods for projects over a certain amount. To avoid this requirement, a dishonest employee might divide a large project into several small projects that fall below the mandatory bidding level and award some or all of the component jobs to a contractor with whom the employee is conspiring.

Some common red flags of bid splitting schemes include:

  • Two or more similar or identical procurements from the same supplier in amounts just under upper-level review or competitive-bidding limits
  • Two or more consecutive, related procurements from the same contractor that fall just below the competitive-bidding or upper-level review limits
  • Unjustified split purchases that fall under the competitive-bidding or upper-level review limits
  • Sequential purchases just under the upper-level review or competitive-bidding limits
  • Sequential purchases under the upper-level review or competitive-bidding limits that are followed by change orders
150
Q

When a medical provider performs a service for a patient but bills the patient’s health care program for a more complex and more expensive service, this practice is called upcoding.

A. True
B. False

A

A. True

See pages 1.1217 in the Fraud Examiner’s Manual

Upcoding occurs when a provider bills for a higher level of service than actually rendered. In a typical upcoding scheme, a durable medical equipment (DME) company provides patients with an inexpensive product (e.g., a manual wheelchair) but bills the government for a more expensive product (e.g., an electric wheelchair).

Another common upcoding scheme is to falsely claim that an established patient is a new patient. A new patient generally requires an extensive examination and consumes more of the provider’s time. Therefore, under some medical coding systems, providers are reimbursed more for new patients than established patients.

151
Q

Which of the following is NOT a type of scheme that is commonly used by fraudsters to take advantage of older individuals?

A. Fill-and-split games schemes
B. Sweepstake and prize schemes
C. Tech-support schemes
D. Home improvement schemes

A

A. Fill-and-split games schemes

See pages 1.1314, 1.1340 in the Fraud Examiner’s Manual

The following are common types of elder fraud schemes:

  • Home improvement schemes
  • Sweepstakes and prize schemes
  • Travel, vacation, and timeshare schemes
  • Tech-support schemes
  • Romance schemes
  • Work-at-home schemes
  • Grandparent schemes

Fill-and-split games are a type of pyramid scheme that uses gaming elements to keep the victims’ attention and distract them from the absurdity of the scheme. Fill-and-split games are not commonly used to take advantage of older individuals.

152
Q

A property flipping scheme occurs when someone purchases a piece of real estate and sells it shortly thereafter at an unjustly inflated value.

A. True
B. False

A

A. True

See pages 1.933 in the Fraud Examiner’s Manual

Property flipping is the process by which an investor purchases a home and then resells it at a higher price shortly thereafter. For example, an investor buys a house in need of work, renovates the kitchen and bathrooms, and landscapes the yard. The investor then resells the house two months later (the time it takes to complete the renovations) for a price that is reflective of the market for a house in that condition. This is a legitimate business transaction, and many individuals and groups make an honest living flipping properties.

Property flipping is not intrinsically illegal or fraudulent, but it becomes so when a property is purchased and resold within a short period of time at an artificially or unjustly inflated value, often as the result of a fraudulent appraisal. In a flipping scheme, the property is sold twice in rapid succession at a significant increase in value (also known as an ABC transaction, whereby the property moves from party A to party B to party C very quickly).

153
Q

Which of the following is the MOST ACCURATE description of logical access?

A. The process by which computer systems’ contents are encrypted
B. The process by which users are allowed to access and use physical objects
C. The process by which users can bypass application security over the software and libraries
D. The process by which users are allowed to use computer systems and networks

A

D. The process by which users are allowed to use computer systems and networks

See pages 1.1445 in the Fraud Examiner’s Manual

Logical access refers to the process by which users are allowed to use computer systems and networks, and logical access control refers to a process by which users are identified and granted certain privileges to information, systems, or resources. These controls are designed to protect the confidentiality, integrity, and availability of informational resources.

Logical access controls can be used to verify a person’s identity and privileges before granting the person logical access to information or other online resources.

154
Q

Shimming devices differ from skimming devices in that shimmers are designed to read a smart card’s _________.

A. Signature panel
B. Microchip
C. Expiration date
D. Magnetic strip

A

B. Microchip

See pages 1.1017 in the Fraud Examiner’s Manual

A card skimming scheme requires a device, often referred to as a skimmer or shimmer, that scans and stores a large amount of payment card numbers; skimmers scan magnetic strips, while shimmers read microchips in smart cards.

155
Q

In credit repair scams, the fraudster promises to “erase” or “doctor” an applicant’s credit history, but in reality there is no way to erase bad credit.

A. True
B. False

A

A. True

See pages 1.1324 in the Fraud Examiner’s Manual

Similar to loan scams are those that promise to repair credit. Fraudsters who pitch credit repair services claim that they can “wipe away,” “doctor,” or “cosmeticize” negative items on credit, insinuating they have ways of changing or disguising a person’s credit history. Although there is really no way to erase bad credit, many people are tricked into this scam, paying large sums of money to expunge their records.

156
Q

In which of the following scenarios might a card skimming or shimming scheme be conducted?

A. An employee processes a payment concealed from the customer’s view
B. A server walks away from a customer’s table to process a card payment
C. A customer is pumping gasoline and notices a strange device attached to the self-payment apparatus
D. All of the above

A

D. All of the above

See pages 1.1017-1.1018 in the Fraud Examiner’s Manual

A card skimming or shimming scheme requires a device, often referred to as a skimmer or shimmer, that scans and stores a large amount of payment card numbers; skimmers scan magnetic strips, while shimmers read microchips in smart cards. Card skimming or shimming is more frequent in businesses where an employee can remove the card from the customer’s view to process the transaction before returning it to the customer.

Skimming or shimming can also be performed via the attachment of covert devices to automated teller machines (ATMs), automated fuel dispensers, vending machines, point-of-sale (POS) terminals, or self-service checkout kiosks. These devices are sometimes paired with a tiny hidden camera meant to record the input of a user’s personal identification number (PIN).

157
Q

Which of the following is a measure that management can take to prevent an organization’s computers from infection by malicious software?

A. Only allow systems to boot with removable storage devices.
B. Regularly update the organization’s operating systems.
C. Prevent employees from opening any emails with attachments.
D. Require that users reuse passwords for important accounts.

A

B. Regularly update the organization’s operating systems.

See pages 1.1431-1.1432 in the Fraud Examiner’s Manual

The following measures can help avoid infection from a malicious program:

  • Use anti-malware software to scan all incoming email messages and files.
  • Regularly update virus definitions in anti-malware programs.
  • Use precaution when opening emails from acquaintances.
  • Do not open email attachments unless they are from trusted sources.
  • Only download files from reputable sources.
  • Regularly update the operating system.
  • Regularly update the computer with the latest security patches available for the operating system, software, browser, and email programs.
  • Ensure that there is a clean boot disk to facilitate testing with antivirus software.
  • Use a firewall and keep it turned on.
  • Consider testing all computer software on an isolated system before loading it.
  • In a network environment, do not place untested programs on the server.
  • Secure the computer against unauthorized access from external threats such as hackers.
  • Keep backup copies of production data files and computer software in a secure location.
  • Scan pre-formatted storage devices before using them.
  • Consider preventing the system from booting with a removable storage device (such as a USB flash drive); this might prevent accidental infection.
  • Establish corporate policies and an employee education program to inform employees of how malware is introduced and what to do if malware is suspected.
  • Encourage employees to protect their home systems as well. Many malware infections result from employees bringing infected storage devices or files from home.
158
Q

Latoya, a loan officer, and other real estate insiders colluded to steal a homeowner’s identity, take out a second mortgage on the individual’s property, and split the proceeds. Latoya and her co-conspirators’ actions would BEST be described as a fraudulent second lien scheme.

A. True
B. False

A

A. True

See pages 1.929 in the Fraud Examiner’s Manual

Fraudulent second liens are a variation of the fraudulent sale scheme. In a second lien scheme, a person assumes a homeowner’s identity and takes out an additional loan or a second mortgage in the homeowner’s name. If there is not enough equity in the home to warrant a second loan, an inflated appraisal is obtained. This scheme often involves a high level of collusion between a loan officer, an appraiser, and a title agent (or other real estate document service provider).

159
Q

Which of the following is a common area for construction loan fraud schemes?

A. Developer overhead
B. Retainage
C. Estimates of costs to complete
D. All of the above

A

D. All of the above

See pages 1.907 in the Fraud Examiner’s Manual

Construction lending has different vulnerabilities than other permanent or interim lending. More risks are associated with construction projects than with already-built projects. Construction loan fraud schemes are numerous; the more common ones are related to estimates of costs to complete, developer overhead, draw requests, and retainage/holdback schemes.

160
Q

Which of the following situations would NOT constitute a type of insurer health care fraud?

A. Instituting procedures to detect fraudulent claims when acting as an intermediary for a government health care program
B. Submitting false cost data to health care regulators to justify rate increases
C. Negotiating discounts with providers but not providing the discount to consumers
D. Failing to pay a claim when it is properly submitted, all of the required information is included, and there are benefits available

A

A. Instituting procedures to detect fraudulent claims when acting as an intermediary for a government health care program

See pages 1.1231-1.1232 in the Fraud Examiner’s Manual

An insurance company might be guilty of fraud if it fails to apply discounts that have been negotiated with providers. The alleged overcharging occurs when an insurance company negotiates a discount on a medical bill. If the company does not provide the discount, then the consumer’s copayment is made on the full price rather than the discounted price, causing the consumer to pay a higher percentage of their bill than they should.

When an insurance company acts as an intermediary administering a government health care program, the insurance company has a duty to try to detect false claims by providers and beneficiaries. Although it is impossible to detect every fraudulent claim, if a company bypasses its own claims verification procedures, it can be found guilty of fraud in some jurisdictions.

Additionally, the insurance company or carrier is required to pay a claim if there are benefits available, the claim is properly submitted and contains all of the required information, and there is no fraud. An insurance company might commit fraud when claims are consistently rejected even though the required information has been submitted. Denying a claim because material information is missing is not fraud in itself.

Insurance companies or carriers needing regulatory approval for rate increases may use cost data to justify their increases. The act is fraudulent if they purposefully submit false cost data to get a raised rate.

161
Q

Which of the following BEST describes social engineering?

A. A method for gaining unauthorized access to a computer system in which an attacker searches through large quantities of available data to find sensitive information that they can use to facilitate their intended scheme
B. A method for gaining unauthorized access to a computer system in which an attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme
C. A method for gaining unauthorized access to a computer system in which an attacker bypasses a system’s security using an undocumented operating system and network functions
D. A method for gaining unauthorized access to a computer system in which an attacker hides near the target to obtain sensitive information that they can use to facilitate their intended scheme

A

B. A method for gaining unauthorized access to a computer system in which an attacker deceives victims into disclosing personal information or convinces them to commit acts that facilitate the attacker’s intended scheme

See pages 1.1407 in the Fraud Examiner’s Manual

Social engineering is a method for gaining unauthorized access to a computer system in which the attacker deceives victims into disclosing personal information, such as their password, or convinces them to commit acts that facilitate the attacker’s intended scheme.

162
Q

Which of the following is NOT a red flag of a fraudulent payment card transaction?

A. A customer charges many expensive items to a newly valid card.
B. A customer buys a small number of expensive items at one time.
C. A customer cannot provide a photo identification when requested.
D. A customer insists on taking a large item home even when delivery is included.

A

B. A customer buys a small number of expensive items at one time.

See pages 1.1022-1.1023 in the Fraud Examiner’s Manual

While any of the following can occur in a perfectly legitimate transaction, these characteristics are frequently present during fraudulent transactions. Tellers and merchants should be advised to be alert for customers who:

  • Purchase an unusually large number of expensive items.
  • Make random purchases, selecting items with little regard to size, quality, or value.
  • Do not ask questions on major purchases.
  • Sign the sales draft slowly or awkwardly.
  • Charge expensive items on a newly valid card.
  • Cannot provide a photo identification when asked.
  • Rush the merchant or teller.
  • Purchase a large item, such as a television, and insist on taking it at the time even when delivery is included in the price.
  • Make purchases and leave the store but then return to make more purchases.
  • Become argumentative with the teller or merchant while waiting for the transaction to be completed.
  • Make large purchases just as the store is closing.
163
Q

Which of the following is NOT an appropriate technique for detecting a nonconforming goods or services scheme?

A. Conducting unannounced inspections of questioned goods or materials
B. Reviewing the inspection and test reports of questioned goods or materials
C. Determining if the costs of the contract have exceeded or are expected to exceed the value of the contract
D. Interviewing procurement personnel about the presence of any red flags

A

C. Determining if the costs of the contract have exceeded or are expected to exceed the value of the contract

See pages 1.1523, 1.1525-1.1526, 1.1531 in the Fraud Examiner’s Manual

Determining if the costs of the contract have exceeded or are expected to exceed the value of the contract is a technique for detecting a cost mischarging scheme involving materials, not a nonconforming goods or services scheme.

Nonconforming goods or services fraud, also known as product substitution or failure to meet contract specifications, refers to attempts by contractors to deliver goods or services to the procuring entity that do not conform to the underlying contract specifications. Once contractors deliver goods that do not conform to the contract, they bill and receive payment for conforming goods or services without informing the purchaser of the deficiency.

To detect nonconforming schemes, the fraud examiner should, at a minimum, examine the following for red flags:

  • Contract or purchase order (PO) specifications
  • Contractor’s statements, claims, invoices, and supporting documents
  • Received product
  • Test and inspection results for the relevant period, searching for discrepancies between tests and inspection results and contract specifications

To detect nonconforming schemes through more extensive methods, the fraud examiner should:

  • Review correspondence and contract files for indications of noncompliance regarding specifications.
  • Request assistance from outside technical personnel to conduct after-the-fact tests.
  • Inspect or test questioned goods or materials by examining packaging, appearance, and description to determine if the items are appropriate.
  • Segregate and identify the source of the suspect goods or materials.
  • Review inspection reports to determine whether the work performed and materials used in a project were inspected and considered acceptable.
  • Review the contractor’s books, payroll, and expense records to see if they incurred necessary costs to comply with contract specifications.
  • Review the inspection and testing reports of questioned goods or materials.
  • Conduct routine and unannounced inspections and tests of questioned goods or materials.
  • Examine the contractor’s books and manufacturing or purchase records for additional evidence, looking for discrepancies between claimed and actual costs, contractors, etc.
  • Interview procurement personnel about the presence of any red flags or other indications of noncompliance.
  • Search and review external records (e.g., court records, prior complaints, audit reports, investigative reports, media sources) to determine if there is any history of misconduct.
164
Q

Which of the following is NOT a problem situation regarding a construction loan that might be concealed using change orders?

A. Shortcuts are uncovering other problems.
B. Design changes were requested.
C. The original project is not feasible.
D. Collusive bidding is occurring.

A

B. Design changes were requested.

See pages 1.912 in the Fraud Examiner’s Manual

Change orders are often submitted along with draw requests. Although many times the change orders represent legitimate construction changes (e.g., for design or cost), they can also indicate fraud schemes. For example, an increasing trend in the number of change orders or amounts on change orders might indicate that construction changes have occurred that would alter the originally planned project to such an extent as to render the underwriting inappropriate. Change orders might have the same impact on a project as altering the original documents; with anything that is contracted on a bid basis, change orders could indicate collusive bidding. Furthermore, change orders might indicate that the original project was not feasible and that shortcuts are uncovering other problem areas. Change orders should be approved by the architect and engineer on the project in addition to the lender’s inspector.

165
Q

Which of the following is the MOST ACCURATE definition of spyware?

A. Any software application that displays advertisements while it is operating
B. A program or command procedure that appears useful but contains hidden code that causes damage
C. A type of software that collects and reports information about a computer user without the user’s knowledge or consent
D. A computer program that replicates itself and penetrates operating systems to spread malicious code to other computers

A

C. A type of software that collects and reports information about a computer user without the user’s knowledge or consent

See pages 1.1426 in the Fraud Examiner’s Manual

Spyware is a type of software that collects and reports information about a computer user without the user’s knowledge or consent.

166
Q

Which of the following is NOT an appropriate technique for detecting a nonconforming goods or services scheme?

A. Reviewing the contractor’s statements, claims, invoices, and supporting documents
B. Segregating and identifying the source of the suspect goods or materials
C. Reviewing the number of qualified bidders who submitted proposals
D. Reviewing correspondence and contract files for indications of noncompliance regarding specifications

A

C. Reviewing the number of qualified bidders who submitted proposals

See pages 1.1523, 1.1525-1.1526 in the Fraud Examiner’s Manual

Nonconforming goods or services fraud, also known as product substitution or failure to meet contract specifications, refers to attempts by contractors to deliver goods or services to the procuring entity that do not conform to the underlying contract specifications. Once contractors deliver goods that do not conform to the contract, they bill and receive payment for conforming goods or services without informing the purchaser of the deficiency.

To detect nonconforming schemes, the fraud examiner should, at a minimum, examine the following for red flags:

  • Contract or purchase order (PO) specifications
  • Contractor’s statements, claims, invoices, and supporting documents
  • Received product
  • Test and inspection results for the relevant period, searching for discrepancies between tests and inspection results and contract specifications

To detect nonconforming schemes through more extensive methods, the fraud examiner should:

  • Review correspondence and contract files for indications of noncompliance regarding specifications.
  • Request assistance from outside technical personnel to conduct after-the-fact tests.
  • Inspect or test questioned goods or materials by examining packaging, appearance, and description to determine if the items are appropriate.
  • Segregate and identify the source of the suspect goods or materials.
  • Review inspection reports to determine whether the work performed and materials used in a project were inspected and considered acceptable.
  • Review the contractor’s books, payroll, and expense records to see if they incurred necessary costs to comply with contract specifications.
  • Review the inspection and testing reports of questioned goods or materials.
  • Conduct routine and unannounced inspections and tests of questioned goods or materials.
  • Examine the contractor’s books and manufacturing or purchase records for additional evidence, looking for discrepancies between claimed and actual costs, contractors, etc.
  • Interview procurement personnel about the presence of any red flags or other indications of noncompliance.
  • Search and review external records (e.g., court records, prior complaints, audit reports, investigative reports, media sources) to determine if there is any history of misconduct.
167
Q

In a construction loan, the budget line item designated for developer overhead creates an opportunity for the developer to use it to their advantage. The purpose of developer overhead is to provide:

A. Labor reimbursements
B. Profit margin
C. Operating capital
D. Budget shortfall

A

C. Operating capital

See pages 1.908 in the Fraud Examiner’s Manual

It is not uncommon in construction financing to have a budget line item for developer overhead. This creates an opportunity for the developer to use it to their advantage. The purpose of developer overhead is to supply the developer with operating capital while the project is under construction. This overhead allocation should not include a profit percentage, as the developer realizes profit upon completion.

168
Q

Advance-fee schemes, debt consolidation schemes, and diploma mills are all examples of consumer fraud schemes.

A. True
B. False

A

A. True

See pages 1.1301 in the Fraud Examiner’s Manual

Consumer fraud schemes involve a range of fraudulent conduct, usually committed by professional scammers, against unsuspecting victims. Scammers are skilled fraudsters who develop strategies, select targets, and use an appropriate method of delivery to lure their victims. Scammers usually act alone, but they might group together for a particularly complex endeavor.

Some examples of consumer fraud schemes include advance-fee schemes, debt consolidation schemes, and diploma mills.

169
Q

In the process of data minimization, organizations protect against theft of proprietary information by collecting and storing only the amount of information necessary for employees to perform a given task.

A. True
B. False

A

A. True

See pages 1.752 in the Fraud Examiner’s Manual

Organizations should practice data minimization. Data minimization refers to collecting and storing the minimal amount of information necessary to perform a given task. Data minimization is important to data security because thieves cannot steal what an entity does not have.

170
Q

Which of the following factors enables or enhances fraudsters’ abilities to conduct account takeover schemes?

A. The increased use of multifactor authentication
B. Consumers using the same log-in and password information on multiple accounts
C. Payment accounts offering the ability to be notified when they are accessed or changed
D. Customers regularly checking their online accounts for changes

A

B. Consumers using the same log-in and password information on multiple accounts

See pages 1.1039-1.1040 in the Fraud Examiner’s Manual

Account takeover fraud occurs when a fraudster surreptitiously takes control of a payment account. Targeted accounts can include credit cards, banking, brokerage, or any type of online retail account (e.g., Amazon).

Because consumers often use the same username and password for multiple accounts, hackers commonly write code that can run credentials obtained from a data breach at one company to see if they are valid at another.

Account takeover fraud has increased significantly in recent years. Consumers should opt for multifactor authentication when available, request notification of account access or changes when offered, and regularly check any online accounts that hold payment information.

171
Q

Workers’ compensation schemes are generally broken into four categories. Which of the following is NOT one of these categories?

A. Claimant fraud
B. Premium fraud
C. Double duty fraud
D. Agent fraud

A

C. Double duty fraud

See pages 1.1110-1.1113 in the Fraud Examiner’s Manual

Workers’ compensation schemes are generally broken into four categories: premium fraud, agent fraud, claimant fraud, and organized fraud schemes.

  • Premium fraud involves the misrepresentation of information to the insurer by employers to lower the cost of workers’ compensation premiums. For example, an employer might understate the amount of the payroll for higher-risk classifications, thus receiving lower-cost premiums.
  • Agent fraud schemes consist primarily of pilfering premiums and conspiring to reduce premiums. Underhanded agents sometimes issue certificates of coverage to the ostensibly insured customer while misappropriating the premium rather than forwarding it to the insurance carrier. Agents might also conspire to alter or improperly influence insurance applications to offer lower premiums to their clients.
  • Claimant fraud involves misrepresenting the circumstances of any injury or fabricating that an injury occurred.
  • Organized fraud schemes are composed of the united efforts of a lawyer, a capper, a doctor, and the claimant. This type of scheme is used not only in workers’ compensation cases but also in other medical frauds, such as automobile injuries.
172
Q

When should an employee be made aware of the need to maintain the confidentiality of an organization’s proprietary information, as well as which information is considered confidential?

A. Upon being hired
B. During an exit interview
C. When signing a nondisclosure agreement
D. All of the above

A

D. All of the above

See pages 1.749 in the Fraud Examiner’s Manual

Often, employees are willing to abide by nondisclosure agreements, but they do not understand that the information they are communicating might be confidential. To more effectively implement nondisclosure agreements, employees must be clearly informed about what information is considered confidential upon hiring, upon signing a nondisclosure agreement, and during exit interviews.

173
Q

Jason, a server at a popular restaurant, takes a customer’s credit card to process a payment. While he is on the other side of the dining area with his back facing the customer, Jason swipes the card through a small device that he regularly uses to steal his customers’ card information. Jason is engaging in a scheme known as card ________.

A. Scanning
B. Skimming or shimming
C. Counterfeiting or duplicating
D. Probing

A

B. Skimming or shimming

See pages 1.1017 in the Fraud Examiner’s Manual

A card skimming or shimming scheme requires a device, often referred to as a skimmer or shimmer, that scans and stores a large amount of payment card numbers; skimmers scan magnetic strips, while shimmers read microchips in smart cards. Card skimming or shimming is more frequent in businesses where an employee can remove the card from the customer’s view to process the transaction before returning it to the customer. This scam might occur in a retail situation in which a payment card is processed behind a concealable counter or in a restaurant scenario wherein a server walks away with a customer’s card to process the transaction.

174
Q

Frequent check deposits in round numbers or for the same amount and checks written to individuals for large, even amounts might be indicators of check fraud.

A. True
B. False

A

A. True

See pages 1.1009 in the Fraud Examiner’s Manual

Frequent deposits in round numbers or for the same amount and checks issued to individuals for large, even amounts are both indicators of check fraud.

175
Q

Competitive intelligence is a legitimate business function that involves assembling competitor data into relevant, accurate, and usable knowledge about competitors’ positions, performance, capabilities, and intentions.

A. True
B. False

A

A. True

See pages 1.702 in the Fraud Examiner’s Manual

Competitive intelligence can be defined as the process by which competitor data are assembled into relevant, accurate, and usable knowledge about competitors’ positions, performance, capabilities, and intentions. Competitive intelligence is a legitimate business function that aligns with marketing and research and development (R&D), as well as general business strategy and the newer discipline of knowledge management. It helps businesses to anticipate competitors’ R&D strategies and to determine their operating costs, pricing policies, financial strength, and capacity.

176
Q

Which of the following is the MOST ACCURATE definition of a software keylogger?

A. A type of program that monitors and logs the keys pressed on a system’s keyboard
B. A computer program that replicates itself and penetrates operating systems to spread malicious code to other computers
C. A program or command procedure that appears useful but contains hidden code that causes damage
D. A type of software that, while not definitely malicious, has a suspicious or potentially unwanted aspect to it

A

A. A type of program that monitors and logs the keys pressed on a system’s keyboard

See pages 1.1428 in the Fraud Examiner’s Manual

Keyloggers monitor and log (or track) the keys pressed on a system’s keyboard, and they can be either software or hardware based. Accordingly, some keyloggers are malware, but others are not.

177
Q

All the following activities are included in the presolicitation phase of procurements involving open and free competition among contractors EXCEPT:

A. The procuring entity develops the bid specifications.
B. The procuring entity determines the method for acquiring the goods or services.
C. The procuring entity issues the solicitation document.
D. The procuring entity identifies its needs.

A

C. The procuring entity issues the solicitation document.

See pages 1.1508-1.1509 in the Fraud Examiner’s Manual

In the presolicitation phase, the procuring entity identifies its needs, develops the bid specifications (what, how much, and how good), determines the method to use for acquiring the goods or services, and develops the criteria used to award the contract.

Bid specifications are a list of elements, measurements, materials, characteristics, required functions, and other specific information detailing the goods and services that a procuring entity needs from a contractor.

The procuring entity issues the solicitation document in the solicitation phase of the procurement process.

178
Q

All organizations with a pyramid structure are illegal.

A. True
B. False

A

B. False

See pages 1.1339 in the Fraud Examiner’s Manual

Not all organizations with a pyramid structure are engaging in illegal activity. Some legitimate merchandising companies use a pyramid structure to rank and determine the compensation of their employee-owners. A pyramid structure becomes an illegal pyramid scheme when the recruitment of new members takes precedence over the product or service that the company is ostensibly promoting. The more members that are recruited, the higher the investor is purported to rise in the ranks of the enterprise and the more money the investor is supposed to make.

179
Q

Which of the following is the MOST ACCURATE definition of a firewall?

A. A system that blocks unauthorized or unverified access to network assets by surveying incoming and outgoing transmissions
B. A system that authenticates users by monitoring their statistical characteristics, such as typing speed and keystroke touch
C. A device that takes information and scrambles it so that it is unreadable by anyone who does not have a specific code
D. None of the above

A

A. A system that blocks unauthorized or unverified access to network assets by surveying incoming and outgoing transmissions

See pages 1.1449 in the Fraud Examiner’s Manual

Firewalls are network hardware and software that block unauthorized or unverified access to computer systems and network assets. These tools survey incoming and outgoing transmissions and decide what type of traffic to permit onto an organization’s internal network based on factors such as origination or destination address, content of the message, protocol used to transmit the message, and other filtering methods.

180
Q

Which of the following is NOT a common red flag of a bid tailoring scheme?

A. A contract is not rebid even though fewer than the minimum number of bids are received.
B. Only a few bidders respond to bid requests.
C. There are unusually broad specifications for the type of goods or services being procured.
D. Competitive awards vary among several suppliers.

A

D. Competitive awards vary among several suppliers.

See pages 1.1515-1.1517 in the Fraud Examiner’s Manual

Bid tailoring schemes (also known as specifications schemes) occur during the presolicitation phase. In these schemes, an employee with procurement responsibilities, often in collusion with a contractor, drafts bid specifications in a way that gives an unfair advantage to a certain contractor.

Some common red flags of bid tailoring include:

  • Weak controls over the bidding process
  • Only one or a few bidders respond to bid requests
  • Contract is not rebid even though fewer than the minimum number of bids are received
  • Similarity between specifications and the winning contractor’s product or services
  • Bid specifications and statements of work are tailored to fit the products or capabilities of a single contractor
  • Unusual or unreasonably narrow or broad specifications for the type of goods or services being procured
  • Requests for bid submissions do not provide clear bid submission information (e.g., no clear time, place, or manner of submitting bids)
  • Unexplained changes in contract specifications from previous proposals or similar items
  • High number of competitive awards to one supplier
  • Socialization or personal contacts among contracting personnel and bidders
  • Specifications developed by or in consultation with a contractor who is permitted to compete in the procurement
  • High number of change orders for one supplier
181
Q

Credit card receipts, bank statements, and birthday cards can all provide dumpster divers with useful information for committing an identity theft scheme.

A. True
B. False

A

A. True

See pages 1.809 in the Fraud Examiner’s Manual

Dumpster diving involves looking through someone else’s trash. Fraudsters often engage in dumpster diving to find the personal and business information that makes identity theft possible.

Most people do not destroy their personal financial data; they simply throw away the information with the rest of their trash. Dumpster diving can yield bills, credit card receipts, bank statements, and other items that contain a person’s name, address, and telephone number. Solicitations for pre-approved credit cards are especially valuable to identity thieves, but even nonfinancial information can be useful. For example, a discarded birthday card might contain a potential victim’s name, birthdate, and address.

182
Q

AD&N Railway solicits bids to lay several miles of new railroad track. Bob, who works for AD&N, writes the specifications for the project to provide that AD&N will only contract with companies that have more than 25 years of experience. Bob knows that only B&P Track Co., one of the prospective bidders, has more than 25 years of experience. What type of procurement fraud scheme has taken place?

A. Bid suppression
B. Bid alteration
C. Bid division
D. Bid tailoring

A

D. Bid tailoring

See pages 1.1515-1.1516 in the Fraud Examiner’s Manual

Bid tailoring schemes (also known as specifications schemes) occur during the presolicitation phase. In these schemes, an employee with procurement responsibilities, often in collusion with a contractor, drafts bid specifications in a way that gives an unfair advantage to a certain contractor.

Bid specifications are a list of elements, measurements, materials, characteristics, required functions, and other specific information detailing the goods and services that a procuring entity needs from a contractor. Specifications assist prospective contractors in the bidding process, informing them of what they are required to do and providing a firm basis for making bids, and they provide procurement officials with a firm basis for selecting bids.

There are three primary methods used to commit bid tailoring schemes. One method involves drafting narrow specifications. In these schemes, a corrupt employee tailors the bid specifications to accommodate a vendor’s capabilities and to eliminate other competitors so that the favored contractor is effectively guaranteed to win the contract. For instance, the tailored bid might require potential contractors to have a certain percentage of female or minority ownership. Such a requirement is not illegal, but if it is placed in the specifications as a result of a bribe, then the employee has sold their influence to benefit a dishonest vendor.

A second method involves drafting broad specifications. In these schemes, a corrupt employee of the buyer designs unduly broad qualification standards to qualify an otherwise unqualified contractor.

A third method involves drafting vague specifications. In these schemes, the buyer’s personnel and the contractor collude to write vague specifications or intentionally omit bid specifications. This enables subsequent contract amendments, allowing the contractor to increase the contract’s price.

183
Q

Management at Blue Oak, Inc., has established a task force and charged it with developing a program for safeguarding proprietary information (SPI). Which of the following should be the first step that the task force takes?

A. Determine what information should be protected.
B. Shred sensitive documents.
C. Institute an encryption policy.
D. Develop an employee awareness program.

A

A. Determine what information should be protected.

See pages 1.744 in the Fraud Examiner’s Manual

To coordinate a company-wide program for safeguarding proprietary information (SPI), management should establish a task force and charge it with developing the program. The task force should include managers and staff from departments that deal with proprietary information, such as research and development (R&D) and production. The task force should also include representatives from the following departments: corporate security, human resources (HR), records management, data processing, and legal.

Once the task force is assembled, it must identify the information that is to be protected. To make this determination, the task force should identify those areas that give the company its competitive edge (e.g., quality of the product, service, price, manufacturing technology, marketing, and distribution). When doing so, the task force should ask, “What information would a competitor like to know?”

184
Q

Shareholders’ reports, company newsletters, and staff biographies on the company website might give a competitor valuable information about a company’s product secrets.

A. True
B. False

A

A. True

See pages 1.714 in the Fraud Examiner’s Manual

Publications such as newsletters or reports to shareholders and speeches or papers that are presented at conferences can inadvertently provide valuable information to competitors.

A company’s website might also contain accidental leaks. Corporate spies frequently visit their targets’ websites to gather information that these companies have unknowingly made public. Employee telephone and email directories, financial information, key employees’ biographical data, product features and release dates, details on research and development (R&D), and job postings can all be found on many corporate websites.

185
Q

A Ponzi scheme can be characterized as an ostensibly legitimate, yet ultimately fraudulent, investment opportunity wherein the promoter pays previous investors with money gained from new victims.

A. True
B. False

A

A. True

See pages 1.1334-1.1345 in the Fraud Examiner’s Manual

A Ponzi scheme is generally defined as an illegal business practice in which new investors’ money is used to make payments to earlier investors. The investment opportunity is typically presented with the promise of uncommonly high returns. While the scam is presented as a legitimate investment, there is minimal or no actual commerce involved. When an enterprise promotes an investment opportunity that invests a minimal amount or none of the participants’ money and uses new investments to make dividend payments, the enterprise is running a Ponzi scheme.

186
Q

Which of the following is a common method used by fraudsters to physically infiltrate and spy on organizations?

A. Fabricate or steal an employee badge
B. Pose as a contractor
C. Secure a position as an employee
D. All of the above

A

D. All of the above

See pages 1.716-1.717 in the Fraud Examiner’s Manual

Corporate spies might use physical infiltration techniques to obtain sensitive information. Physical infiltration is the process whereby an individual enters a target organization to spy on the organization’s employees. One common infiltration technique is to secure a position, or pose, as an employee or contract laborer of the target organization. For example, a spy might obtain work as a security officer or a member of the maintenance staff for the target organization.

Another common physical infiltration technique is to steal or fabricate employee badges belonging to the target organization.

187
Q

Which of the following terms describes the use of illegal, covert means to acquire information for commercial purposes?

A. Corporate espionage
B. Technical surveillance
C. Competitive intelligence
D. Traditional espionage

A

A. Corporate espionage

See pages 1.702, 1.707 in the Fraud Examiner’s Manual

Espionage is the term used to describe the use of illegal, covert means to acquire information; therefore, it does not cover legitimate intelligence collection and analysis using legal means. Espionage can be further subdivided into two categories: traditional and corporate. Traditional espionage refers to government-sanctioned espionage conducted to collect protected information from a foreign government. Corporate espionage (also known as industrial espionage) is the term used to describe the use of illegal, covert means to acquire information for commercial purposes.

Competitive intelligence can be defined as the process by which competitor data are assembled into relevant, accurate, and usable knowledge about competitors’ positions, performance, capabilities, and intentions. Competitive intelligence is a legitimate business function that aligns with marketing and research and development (R&D), as well as general business strategy and the newer discipline of knowledge management. It helps businesses to anticipate competitors’ R&D strategies and to determine their operating costs, pricing policies, financial strength, and capacity.

Technical surveillance is the practice of covertly acquiring audio, visual, or other types of data from targets through the use of technical devices, procedures, and techniques.

188
Q

The primary reason for a company’s management to construct an electronically and acoustically shielded quiet room is to protect data hosted on the company’s computer servers and other sensitive electronic devices.

A. True
B. False

A

B. False

See pages 1.755 in the Fraud Examiner’s Manual

Management can prevent corporate spies from listening to meetings through the use of a quiet room. A quiet room is an area that is acoustically and radio-frequency shielded so that conversations that occur within the room cannot be monitored or heard outside the room.

189
Q

For corporate espionage purposes, technical surveillance generally consists of gathering documentary evidence or information that can be found via open sources.

A. True
B. False

A

B. False

See pages 1.707, 1.729 in the Fraud Examiner’s Manual

Technical surveillance is the practice of covertly acquiring audio, visual, or other types of data from targets through the use of technical devices, procedures, and techniques. When corporate spies resort to the use of technical surveillance, it is usually to gather nondocumentary evidence or information that cannot be found through open sources.

190
Q

To help prevent identity theft, businesses should strive to limit the personal information they collect from customers.

A. True
B. False

A

A. True

See pages 1.816 in the Fraud Examiner’s Manual

The following are some of the steps that businesses can take to protect personal information and prevent identity theft:

  • Limit the personal information collected from customers. For example, do not collect government identification numbers from customers unless there is a legal requirement to gather that information.
  • Restrict employees from accessing the personal information of customers and coworkers.
  • Use network-security tools to monitor who accesses personal information.
  • Do not retain personal information for longer than necessary.
  • Adopt a policy regarding the handling of information that governs how personal information is stored, protected, and disposed of. Strictly enforce the policy, and discipline employees who violate it.
  • Conduct regular employee training on the company’s policy regarding the handling of information and best practices for preventing identity theft.
  • Ensure the security of buildings by using locks, access codes, and other security features.
  • Keep physical documents containing personal information in locked rooms or locked file cabinets.
  • Secure all computer networks and electronic information.
  • Use encryption to protect all personal information stored by the company or sent to third parties. Encryption should also be used to protect information sent over the company’s wireless network.
  • Restrict the use of laptops to those employees who need them to do their jobs.
  • Require employees to use complex passwords or passphrases.
  • Where permitted by law, perform background checks on prospective employees.
  • Thoroughly investigate contractors and vendors before hiring them.
  • Do not use government identification numbers as employee identification numbers or print them on paychecks.
  • Perform regular audits of practices involving the handling of information, network security, and other internal controls.
  • Create a data breach response plan.
191
Q

An address similarity report can help detect insurance fraud by showing a payment defalcation or funds that might have been fraudulently sent to which of the following parties?

A. A fictitious payee
B. Another insurance company
C. A broker
D. All of the above

A

D. All of the above

See pages 1.1123 in the Fraud Examiner’s Manual

Data analysis is an effective tool used to detect insurance fraud schemes. By using data analytics, fraud examiners can generate reports that provide good leads to possible fraud. For example, address similarity reports electronically compare multiple payments going to the same address. These reports are extremely useful because they might show a payment defalcation or funds going to another insurance company, broker, or fictitious payee.

192
Q

Vishing is a type of phishing scheme that uses text messages or other short message systems to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, internet service provider (ISP), or other entity.

A. True
B. False

A

B. False

See pages 1.1410 in the Fraud Examiner’s Manual

Smishing is a hybrid of phishing and short message service (SMS), also known as text messaging. These schemes use text messages or other short message systems to conduct phishing activities. That is, in smishing schemes, the attacker uses text messages or other SMSs to dupe an individual or business into providing sensitive data by falsely claiming to be from an actual business, bank, internet service provider (ISP), or other entity with which the target does business.

In vishing schemes, the attacker leverages Voice over Internet Protocol (VoIP) in the telephone system to falsely claim to be a legitimate enterprise to scam users into disclosing personal information or executing an act that furthers a scheme.

193
Q

Which of the following is a common avenue through which proprietary company information is compromised?

A. Company website
B. Speeches by executives
C. Publications
D. All of the above

A

D. All of the above

See pages 1.714 in the Fraud Examiner’s Manual

Publications such as newsletters or reports to shareholders and speeches or papers that are presented at conferences can inadvertently provide valuable information to competitors.

A company’s website might also contain accidental leaks. Corporate spies frequently visit their targets’ websites to gather information that these companies have unknowingly made public. Employee telephone and email directories, financial information, key employees’ biographical data, product features and release dates, details on research and development (R&D), and job postings can all be found on many corporate websites.

194
Q

Rowena, a Certified Fraud Examiner (CFE), is an auditor for the government’s Office of Audit and Evaluation. While conducting a routine audit of ten construction contracts from the Public Works Department, Rowena notices some unusual characteristics in the contracts’ bidding documents. The contracts were all awarded to the same contractor, and the specifications in all ten contracts had unreasonably narrow specifications for the types of goods being procured. Which of the following types of procurement fraud schemes is MOST LIKELY at issue here?

A. A procurement employee divided a large project into several small projects that fall below the mandatory bidding level.
B. A procurement employee has intentionally included unallowable costs in the projects’ contracts and budgets.
C. A procurement employee convinced their employer that it needs excessive or unnecessary products or services.
D. A procurement employee has drafted bid specifications in a way that gives an unfair advantage to a certain contractor.

A

D. A procurement employee has drafted bid specifications in a way that gives an unfair advantage to a certain contractor.

See pages 1.1515-1.1517 in the Fraud Examiner’s Manual

Bid tailoring schemes (also known as specifications schemes) occur during the presolicitation phase. In these schemes, an employee with procurement responsibilities, often in collusion with a contractor, drafts bid specifications in a way that gives an unfair advantage to a certain contractor.

Some common red flags of bid tailoring include:

  • Weak controls over the bidding process
  • Only one or a few bidders respond to bid requests
  • Contract is not rebid even though fewer than the minimum number of bids are received
  • Similarity between specifications and the winning contractor’s product or services
  • Bid specifications and statements of work are tailored to fit the products or capabilities of a single contractor
  • Unusual or unreasonably narrow or broad specifications for the type of goods or services being procured
  • Requests for bid submissions do not provide clear bid submission information (e.g., no clear time, place, or manner of submitting bids)
  • Unexplained changes in contract specifications from previous proposals or similar items
  • High number of competitive awards to one supplier
  • Socialization or personal contacts among contracting personnel and bidders
  • Specifications developed by or in consultation with a contractor who is permitted to compete in the procurement
  • High number of change orders for one supplier
195
Q

Liam is the manager of a small bank that has recently experienced an increase in the amount of fraud related to electronic funds transfers (EFTs). Which of the following methods can Liam implement to reduce his bank’s exposure to EFT fraud?

A. Ensure that PINs are mailed to the customer separately from other associated account information
B. Separate the duties of bank employees so that the responsibilities for the issuance of access devices are separate from the issuance of PINs
C. Send a welcome letter to new customers to determine if the address submitted on the account application is valid
D. All of the above

A

D. All of the above

See pages 1.1037-1.1038 in the Fraud Examiner’s Manual

The following are safeguards that banks can perform to reduce the risk that they or their customers become victimized by unauthorized electronic funds transfers (EFTs):

  • Confirm phone numbers and mailing addresses on the application to ensure that they are consistent with information about the applicant that is available from other sources and, with respect to existing customers, consistent with current records about these customers. This might involve obtaining credit reports about the applicant or obtaining copies of utility bills that show the applicant’s address.
  • Ensure that the area or city code in the applicant’s phone number matches the geographical area for the applicant’s address.
  • Send a welcome letter to the address on the application with the bank’s return address so that the letter is returned if the applicant does not live there.
  • Verify by phone or additional mailings any change of address requests in the same way that new account applications are verified.
  • If a customer reports the loss or theft of an access device, cancel the existing card, personal identification number (PIN), or other form of access and issue a new one.
  • If a customer reports that a person previously authorized to use an access device no longer has that authority, cancel all cards, PINs, or other access devices and issue new ones to the customer.
  • Always mail PINs separately from other information, such as usernames, with which they are associated.
  • Separate the responsibility of bank employees who have custody of information relating to access devices from those who have responsibility for issuance, verification, or reissuance of PINs.
  • Ensure that any communication concerning usernames or passwords is sent in a secure, encrypted format.
  • Require customers who register for electronic bill presentment and payment (EBPP) or person-to-person (P2P) systems to provide information indicating that they are authorized to use the bank account or credit card from which payments will be made.
  • Employ multifactor authentication to verify transfers via EBPP or P2P systems.
196
Q

Which of the following is NOT considered to be a red flag of a Ponzi scheme?Which of the following is NOT considered to be a red flag of a Ponzi scheme?

A. A financial manager who puts an unusual amount of pressure on investors to act immediately
B. A financial manager who manages, administers, and retains custody of the investment funds
C. An investment that promises extremely high or short-term returns with little risk involved
D. An investment that has a history of inconsistent returns coinciding with fluctuations in financial markets

A

D. An investment that has a history of inconsistent returns coinciding with fluctuations in financial markets

See pages 1.1338 in the Fraud Examiner’s Manual

The following are red flags of Ponzi schemes:

  • Sounds too good to be true—If an investment opportunity seems suspiciously better than it should be, then it is probably a Ponzi scheme.
  • Promises of low risk or high rewards—Promoters of Ponzi schemes typically promise implausibly high or quick returns with little risk. As all legitimate investments include some risk, any guarantee that an investment will perform in a certain way is a clear signal that it might be part of a Ponzi scheme.
  • History of consistent returns—Any firm that generates remarkably consistent returns regardless of market conditions should raise suspicions.
  • High-pressure sales tactics—Reputable investment firms and agents do not push potential investors to act immediately, and legitimate investment opportunities are rarely that time sensitive.
  • Pressure to reinvest—Often, fraudsters keep Ponzi schemes going by convincing investors to reinvest their profits rather than take a payout.
  • Complex trading strategies—Legitimate agents should be able to provide clear explanations about their investment strategies. For obvious reasons, Ponzi-scheme boosters purposefully employ complicated strategies that confound unsophisticated investors.
  • Lack of transparency or access—Secrecy surrounding the operations of a financial company should be an immediate warning sign. Ponzi operators are often unlicensed, and their supposed investments are typically unregistered. Additionally, a lack of access to regular statements or an online account should trigger alarm.
  • Lack of separation of duties—Investors should be wary of any financial manager who manages, administers, and retains custody of the fund in question.
197
Q

Which of the following situations would be MOST INDICATIVE of a customer committing new account fraud at a bank?

A. A customer deposits a substantial amount of funds in a new personal account and does not spend or withdraw them for several months.
B. A customer opens a new personal account and immediately requests two ATM cards.
C. An invalid address or phone number is listed in the customer’s account information.
D. A customer opens a business account and soon after has payroll transactions on the account.

A

C. An invalid address or phone number is listed in the customer’s account information.

See pages 1.936-1.937, 1.940 in the Fraud Examiner’s Manual

Fraud is much more likely to occur in new accounts than in established accounts. New account fraud is generally defined as fraud that occurs on an account within the first ninety days that it is open; often, perpetrators open these accounts with the sole intent of committing fraud. Prompt, decisive action is necessary to manage and/or close apparent problem accounts. Some of the more common red flags of potential new account schemes are:

  • Customer residence outside the bank’s trade area
  • Dress and/or actions inconsistent or inappropriate for the customer’s stated age, occupation, or income level
  • New account holder requesting immediate cash withdrawal upon deposit
  • Request for large quantity of temporary checks
  • Services included with the account that do not match the customer’s purpose
  • Missing or inaccurate customer application information
  • Invalid phone numbers or addresses in customer account information
  • Use of a mail drop address (a service where a non-affiliated party collects and distributes mail for individuals or entities)
  • Large check or automated teller machine (ATM) deposits followed by rapid withdrawal or transfer of funds (a pass-through account)
  • Business accounts without standard business transactions, such as payroll or transactions that would be expected in that business
  • Transactions without a clear purpose in jurisdictions known for high levels of corruption
  • Opening deposit that is a nominal cash amount
  • Rare customer ID type
  • Applicants over the age of 25 with no credit history
  • Customers who cannot remember basic application information (e.g., phone number or address)
198
Q

A patient goes to the doctor for a medical condition. The doctor identifies the condition but decides to order additional lab testing even though it is unnecessary. The patient is sent to a lab owned by the same doctor, so the doctor will profit from the unnecessary testing. Which of the following BEST describes the doctor’s scheme?

A. Clinical lab
B. Rolling lab
C. Fictitious provider
D. Front organization

A

A. Clinical lab

See pages 1.1207 in the Fraud Examiner’s Manual

Clinical lab schemes occur when a provider advises a patient that additional medical testing is needed to diagnose a problem when the testing is not actually required or advisable. The fee for the unnecessary work is often split with physicians. In some cases, physicians own the medical testing service. Additional medical testing, which is later viewed as excessive, is not always fraud. Many doctors have a genuine fear of retaliation from their patients; they are afraid of malpractice lawsuits that might result from a delayed or erroneous diagnosis.

199
Q

Which of the following would be the LEAST LIKELY target of an affinity fraud scheme?

A. Professional associations
B. Immigrant groups
C. Large corporations
D. Religious communities

A

C. Large corporations

See pages 1.1320 in the Fraud Examiner’s Manual

Affinity fraud targets groups of people who have some social connection. Neighborhoods chiefly populated by racial minorities, especially immigrant groups, are often the site of affinity frauds, and older individuals and language minorities are frequent targets as well. In addition, religious and professional affiliations are often exploited.

200
Q

A fraudster uses the email account of a company’s president to impersonate the president and ask an employee to make a wire transfer. This can BEST be described as which of the following types of fraud schemes?

A. Business email compromise
B. Shoulder surfing
C. Pharming
D. Reverse social engineering

A

A. Business email compromise

See pages 1.1408 in the Fraud Examiner’s Manual

Business email compromise (BEC) is a form of spear phishing attack that directly targets employees who can make large payments or who have access to sensitive proprietary information. BEC schemes typically involve fraudulent emails that appear to be from the company’s own chief executive officer (CEO) or from the head of a foreign supplier that the company has done business with for years. The emails often instruct the employee to perform a time-sensitive wire transfer to ensure that the supply chain is not disturbed, but the scheme has evolved to feature other methods or requests. Increasingly, these emails are paired with an insistent phone call from someone posing as the email sender or as the sender’s attorney.

201
Q

A contractor who delivers materials of lesser quality than specified in the contract or uses a lower quality staff than specified in the contract might be involved in which of the following types of procurement fraud schemes?

A. Material mischarging fraud
B. Nonconforming goods or services fraud
C. Labor mischarging fraud
D. Product division fraud

A

B. Nonconforming goods or services fraud

See pages 1.1523 in the Fraud Examiner’s Manual

Nonconforming goods or services fraud, also known as product substitution or failure to meet contract specifications, refers to attempts by contractors to deliver goods or services to the procuring entity that do not conform to the underlying contract specifications. Once contractors deliver goods that do not conform to the contract, they bill and receive payment for conforming goods or services without informing the purchaser of the deficiency.

These schemes can involve a wide variety of conduct, but, generally, they include any deliberate departures from contract requirements to increase profits or comply with contract time schedules.

202
Q

Logical access controls, encryption, and application security are all technical security controls used to safeguard computer systems and communication networks.

A. True
B. False

A

A. True

See pages 1.1441, 1.1445 in the Fraud Examiner’s Manual

Technical security involves the use of safeguards incorporated into computer hardware or systems, operations or applications software, communications hardware and software, and related devices. Computer networks and communications are inherently insecure and vulnerable to attack and disruption. Consequently, management must use technical controls to protect systems against threats like unauthorized use, disclosure, modification, destruction, or denial of service.

Common technical controls used to secure computer systems and communication networks include:

  • Logical access controls
  • Network security
  • Operating system security
  • Encryption
  • Application security
203
Q

Which of the following is NOT a recommended method for safeguarding an organization’s proprietary information?

A. Changing locks and reprogramming door access codes regularly
B. Classifying data into categories according to value and sensitivity levels
C. Creating an incident response plan after a data breach occurs
D. Constructing a quiet room to prevent eavesdropping

A

C. Creating an incident response plan after a data breach occurs

See pages 1.751, 1.754-1.755 in the Fraud Examiner’s Manual

All organizations should have an incident response plan that describes the actions the organization will take when a data breach occurs. To be effective, an incident response plan must be in place and communicated to all relevant employees before a breach occurs.

According to the CERT (Computer Emergency Response Team) Division, organizations should implement a data classification policy that establishes what protections must be afforded to data of different value and sensitivity levels. Data classification allows organizations to follow a structured approach for establishing appropriate controls for different data categories. Moreover, establishing a data classification policy will help employee awareness. In short, classifying an organization’s data involves (1) organizing the entity’s data into different security levels based on the data’s value and sensitivity and (2) assigning each level of classification different rules for viewing, editing, and sharing the data.

Management should monitor and limit visitor access. Visitors should be required to sign in and out of an organization logbook. It is considered a best practice to issue each visitor a badge that identifies them as a nonemployee. Also, visitors should be escorted by a host for the entirety of their visit and not be allowed into areas containing sensitive information. Additionally, locks on doors leading to secure areas should be changed or reprogrammed regularly, especially if an employee has recently quit or been terminated.

Management can prevent corporate spies from listening to meetings through the use of a quiet room. A quiet room is an area that is acoustically and radio-frequency shielded so that conversations that occur within the room cannot be monitored or heard outside the room.

204
Q

Which of the following is NOT a red flag of health care provider fraud?

A. Details in supporting documents that are inconsistent with the claim
B. Lack of supporting documentation for claims under review
C. Medical records that were created long after the alleged patient visit
D. Consistently low percentage of coding outliers present

A

D. Consistently low percentage of coding outliers present

See pages 1.1211 in the Fraud Examiner’s Manual

Warning signs that a health care provider is engaging in fraudulent practices include:

  • Lack of supporting documentation for claims under review
  • Details in supporting documents that do not match the claim
  • Medical records that have been altered
  • Medical records that were created long after the alleged patient visit
  • Medical records that seem sloppy, disorganized, or otherwise unprofessional
  • Missing pages of medical records that would cover the period of time under review
  • Routine, nonspecialized treatment for patients living several hours away from the provider
  • An unusually high volume of patients
  • An unusually large number of claims for reimbursement
  • Unusually high profits compared to similar businesses in the same geographic region
  • Matching addresses on the claim form for the patient and the provider
  • High percentage of coding outliers
  • Pressure for rapid processing of bills or claims
  • Threats of legal action for delay in making payments
205
Q

Michael, a medical provider, performs an appendectomy, a procedure that is supposed to be billed as one code. Instead, he intentionally submits two codes for the same procedure: one for an abdominal incision and one for the removal of the appendix. Which of the following BEST describes Michael’s scheme?

A. Procedure compounding
B. Decompressing
C. Fictitious services
D. Unbundling

A

D. Unbundling

See pages 1.1215 in the Fraud Examiner’s Manual

Because health care procedures often have special reimbursement rates for a group of procedures typically performed together (e.g., blood test panels by clinical laboratories), some providers attempt to increase profits by billing separately for procedures that are actually part of a single procedure. This process is called unbundling. Simple unbundling occurs when a provider charges a comprehensive code, as well as one or more component codes.

206
Q

Victims of consumer fraud are more likely to be organizations or businesses rather than individuals.

A. True
B. False

A

B. False

See pages 1.1301 in the Fraud Examiner’s Manual

Consumer fraud schemes involve a range of fraudulent conduct, usually committed by professional scammers, against unsuspecting victims. Scammers are skilled fraudsters who develop strategies, select targets, and use an appropriate method of delivery to lure their victims. Scammers usually act alone, but they might group together for a particularly complex endeavor.

The victims can be organizations but more commonly are individuals. Victims can be old or young, male or female, or wealthy or poor, and they are usually dispersed geographically. Many victims who become the targets of consumer fraud are considered to be in the naïve segments of the population, such as older individuals. It is important to note, however, that even the savviest consumers can become targets if they are not aware of the schemes involving consumer fraud.

207
Q

An inaccurate vendor master file can result in greater risks of duplicate payments, unfavorable payment terms, and noncompliance regarding regulations.

A. True
B. False

A

A. True

See pages 1.1536 in the Fraud Examiner’s Manual

Procurement entities must maintain an accurate and up-to-date vendor master file. An inaccurate or incomplete vendor master file can result in greater risks of duplicate payments, unfavorable payment terms, and noncompliance regarding regulations. Thus, the vendor master file should be updated continuously and reviewed on a regular basis for inaccurate or incomplete records.

208
Q

Calendars and schedules displayed at an employee’s workstation can inadvertently provide a company’s competitors with valuable proprietary information.

A. True
B. False

A

A. True

See pages 1.753 in the Fraud Examiner’s Manual

Organizations must take reasonable measures to protect manual file systems, which are composed of all human-readable files and documents. These include items like contact lists, schedules, and calendars located at employees’ workstations. To attack a manual file system, an information thief might pilfer trash, act as a cleaning crew member, or commit theft or burglary.

209
Q

Which of the following BEST describes the difference between a flipping scheme and a flopping scheme in the context of mortgage fraud?

A. In a flopping scheme, the lender is not one of the potential victims of the scheme.
B. In a flopping scheme, the value of the first transaction is deflated instead of inflating the second transaction.
C. In a flopping scheme, the second transaction in the scheme usually occurs several years after the first.
D. In a flopping scheme, the original seller always ends up as the final owner of the property.

A

B. In a flopping scheme, the value of the first transaction is deflated instead of inflating the second transaction.

See pages 1.933-1.934 in the Fraud Examiner’s Manual

Property flipping is the process by which an investor purchases a home and then resells it at a higher price shortly thereafter. For example, an investor buys a house in need of work, renovates the kitchen and bathrooms, and landscapes the yard. The investor then resells the house two months later (the time it takes to complete the renovations) for a price that is reflective of the market for a house in that condition. This is a legitimate business transaction, and many individuals and groups make an honest living flipping properties.

Property flipping is not intrinsically illegal or fraudulent, but it becomes so when a property is purchased and resold within a short period of time at an artificially or unjustly inflated value, often as the result of a fraudulent appraisal. In a flipping scheme, the property is sold twice in rapid succession at a significant increase in value (also known as an ABC transaction, whereby the property moves from party A to party B to party C very quickly).

Property flopping is a variation on property flipping, but it generally involves a property subject to a short sale (meaning the owner sells the property at a lower value than the unpaid mortgage amount on the property). This variation is typically conducted by industry insiders or unscrupulous entrepreneurs rather than the homeowner. Property flopping involves a rapid transfer of property with an unjustified, significant change in value (like the ABC transaction in flipping schemes), but instead of inflating the value on the second transaction, the value on the first transaction is deflated.

To prevent problematic short sale flopping, some lenders require all interested parties to sign an affidavit requiring disclosure of an immediate subsequent sale.

210
Q

Karl finds a residential property with a nonresident owner. He then forges contractual property documents showing that the owner is transferring ownership of the property completely to Karl, such as would normally happen during a property sale. The property owner is unaware that Karl has created and filed the documents. Later, Karl takes the falsified documents to a lender and borrows money against the property. Which of the following MOST ACCURATELY describes Karl’s scheme?

A. Unauthorized draw on home equity line of credit
B. Air loan
C. Fraudulent sale
D. Property flipping

A

C. Fraudulent sale

See pages 1.929 in the Fraud Examiner’s Manual

Fraudulent sale scams are particularly harmful because they involve the fraudulent acquisition of real estate by filing a fraudulent deed or respective real estate document that makes it appear that the property legally belongs to the criminal. This scam does not happen at the origination of the loan; it might occur without the homeowner’s knowledge decades after the property was originally sold.

The perpetrator identifies a property—typically belonging to an estate or nonresident owner—that is owned free and clear. They then create fictitious property transfer documents that claim to grant all rights and title on the property to the fraudster. The true owner’s signature is forged on the documents, and the scammer files them in the jurisdiction’s real property records. Once the ownership documents are filed, they apply for and execute a loan on the property (using a straw borrower). Often, the value is inflated. The perpetrator absconds with 100% of the loan proceeds.

211
Q

Telemarketing schemes target individuals, not businesses.

A. True
B. False

A

B. False

See pages 1.1317 in the Fraud Examiner’s Manual

Telemarketing offenses are classified as consumer fraud, yet many businesses are affected by office supply and marketing services scams. The nature of phone rooms, the geographical distances between the perpetrators and their victims, and the resources and priorities of law enforcement agencies make enforcement efforts difficult.

212
Q

Which of the following is a recommended step that businesses should take to protect their customers and employees from identity theft?

A. Conduct regular employee training on best practices regarding the handling of information
B. Require employees to use complex passwords or passphrases
C. Only retain personal information for as long as it is necessary
D. All of the above

A

D. All of the above

See pages 1.816 in the Fraud Examiner’s Manua

The following are some of the steps that businesses can take to protect personal information and prevent identity theft:

  • Limit the personal information collected from customers. For example, do not collect government identification numbers from customers unless there is a legal requirement to gather that information.
  • Restrict employees from accessing the personal information of customers and coworkers.
  • Use network-security tools to monitor who accesses personal information.
  • Do not retain personal information for longer than necessary.
  • Adopt a policy regarding the handling of information that governs how personal information is stored, protected, and disposed of. Strictly enforce the policy, and discipline employees who violate it.
  • Conduct regular employee training on the company’s policy regarding the handling of information and best practices for preventing identity theft.
  • Ensure the security of buildings by using locks, access codes, and other security features.
  • Keep physical documents containing personal information in locked rooms or locked file cabinets.
  • Secure all computer networks and electronic information.
  • Use encryption to protect all personal information stored by the company or sent to third parties. Encryption should also be used to protect information sent over the company’s wireless network.
  • Restrict the use of laptops to those employees who need them to do their jobs.
  • Require employees to use complex passwords or passphrases.
  • Where permitted by law, perform background checks on prospective employees.
  • Thoroughly investigate contractors and vendors before hiring them.
  • Do not use government identification numbers as employee identification numbers or print them on paychecks.
  • Perform regular audits of practices involving the handling of information, network security, and other internal controls.
  • Create a data breach response plan.
213
Q

Which of the following types of malware can be used to generate illicit income in the form of cryptocurrency while slowing an infected computer and causing victims to incur costs related to power usage or cloud storage?

A. Spyware
B. Keyloggers
C. Coin miners
D. Overwrite viruses

A

C. Coin miners

See pages 1.1429 in the Fraud Examiner’s Manual

Coin miners, or cryptojacking malware, are programs that, upon infecting a computer, use that computer’s processing power to mine for cryptocurrencies without the owner’s knowledge or consent. Coin miners are relatively simple programs, so there is a low barrier of entry for cyberfraudsters. Cryptojacking can slow infected devices due to the processing power required for cryptocurrency mining and potentially cause serious or permanent damage. Victims, including companies or corporate networks, can also incur exorbitant costs for power usage or cloud storage related to coin miners. Internet of things (IoT) devices could be of particular risk due to their frequent lack of security or monitoring.

214
Q

Which of the following is NOT one of the key phases of procurement processes that employ competitive bidding mechanisms?

A. The solicitation phase
B. The purchase and procurement phase
C. The presolicitation phase
D. The post-award and administration phase

A

B. The purchase and procurement phase

See pages 1.1508 in the Fraud Examiner’s Manual

For the purpose of fraud detection, procurement processes that employ competitive bidding mechanisms can be reduced to four basic stages:

  • The presolicitation phase
  • The solicitation phase
  • The bid evaluation and award phase
  • The post-award and administration phase
215
Q

Shredding sensitive documents using a cross-cut shredder, sending and receiving mail at a secure site such as a post office box, and employing a perimeter security system at the office are all measures aimed to do which of the following?

A. Prevent misappropriation of office supplies.
B. Protect digital documentation.
C. Catch a fraudster in the act.
D. Guard manual file systems.

A

D. Guard manual file systems.

See pages 1.753-1.754 in the Fraud Examiner’s Manual

Organizations must take reasonable measures to protect manual file systems, which are composed of all human-readable files and documents. These include items like contact lists, schedules, and calendars. To attack a manual file system, an information thief might pilfer trash, act as a cleaning crew member, or commit theft or burglary. Reasonable measures to protect manual file systems include the following:

  • Place sensitive documents in high-grade locked filing cabinets. It is advisable to lock sensitive documents in a safe when not in use.
  • Use a cross-cut shredder for sensitive documentary waste, or have sensitive trash disposed of by a bonded waste-disposal company.
  • Receive and send mail at a secure site (e.g., mail drops, post office boxes, or locked mailboxes). The key is that the site remains secure.
  • Provide reasonable perimeter security for offices by using an alarm system and securing locks to doors and windows.
  • Pay attention to securing auxiliary materials.
216
Q

Which of the following is NOT an appropriate technique for detecting a cost mischarging scheme involving labor?

A. Inspecting questioned goods or materials by examining packaging, appearance, and description
B. Reviewing the standard and actual labor rates to determine if there are any significant differences
C. Examining the total hours expended on the contract and comparing them to hours billed
D. Comparing the direct and indirect labor account totals from the prior year to the current year

A

A. Inspecting questioned goods or materials by examining packaging, appearance, and description

See pages 1.1525, 1.1533-1.1534 in the Fraud Examiner’s Manual

Inspecting questioned goods or materials by examining packaging, appearance, and description is a technique for detecting a nonconforming goods or services scheme, not a cost mischarging scheme involving labor.

Labor cost mischarges can be detected by engaging in the following activities:

  • Examining labor cost records for the presence of red flags
  • Reviewing audit reports, reimbursement requests, construction reports, engineering reports, and so on
  • Conducting site visits to verify that selected employees’ labor costs are being properly charged to the work actually being performed
  • Examining time cards, totaling the hours expended on the contract, and comparing them to the hours billed
  • Noting, in particular, repeated instances or a pattern of labor charges that increase the cost of cost-plus contracts
  • Reviewing journal entries used to transfer labor costs
  • Comparing labor costs over a specific period to identify any unusual changes and determining the reason for the changes
  • Reviewing the standard and actual labor rates to determine if there are any significant differences between the two
  • Calculating the percentage of total direct labor charged to each contract to determine which had the highest percentage of direct labor charges
  • Reviewing and comparing the labor distribution summaries with payroll records to determine whether the total labor distributions agree with the total labor charges
  • Comparing the direct and indirect labor account totals from the prior year to the current year and noting the percentage change
  • Determining the percentage of total direct labor charged to each contract or work order to reveal which charge numbers had the highest percentage of direct labor charges
  • Analyzing the labor charges to determine if there were any shifts in charging pattern
  • Preparing a schedule of salary or wage changes and comparing it to contract award dates and labor rates
  • Looking for terminated employees who are charged to contracts
  • Comparing employee personnel records to contract position qualification requirements
  • Interviewing individuals who changed their charging patterns during the year
  • Searching and reviewing external records (e.g., court records, prior complaints, audit reports, investigative reports, media sources) to find any history of misconduct
217
Q

*

Real estate scams are easily recognized, as the perpetrator’s pitch almost always includes an element of time pressure or an emphasis that the victim is missing a rare opportunity.

A. True
B. False

A

A. True

See pages 1.1325 in the Fraud Examiner’s Manual

Real estate scams are easily recognized. There is almost always an element of time pressure, with the victims being convinced they are participating in a deal that is extremely rare. Perpetrators mislead victims into thinking they will miss the opportunity to make a large sum of money if they do not agree to participate immediately.

218
Q

Which of the following is NOT a common type of payment card fraud?

A. Advance payments
B. Card counterfeiting
C. Profiling
D. Skimming

A

C. Profiling

See pages 1.1014-1.1016 in the Fraud Examiner’s Manual

Advance payments, card counterfeiting, and skimming are all forms of payment card fraud; profiling is not a type of payment card fraud.

219
Q

After purchasing an insured’s government identification number on the dark web, a fraudster pretends to be the insured and obtains medical care under the insured’s health insurance policy. This patient health care fraud scheme can BEST be described as misrepresentations fraud.

A. True
B. False

A

B. False

See pages 1.1229 in the Fraud Examiner’s Manual

This scenario can best be described as third-party fraud. Third-party fraud involves the unauthorized use of an insured’s identity to obtain their insurance benefits. The insured usually discovers the fraud when they receive a benefit statement containing medical services they did not receive.

In misrepresentations on applications schemes, patients sometimes make misrepresentations on their insurance applications to circumvent coverage restrictions. Misrepresentations can include false information or the omission of relevant information.

220
Q

Which of the following is NOT one of the recommended steps for responding to a cybersecurity incident?

A. Detection and analysis
B. Preparation
C. Containment and eradication
D. Authorization

A

D. Authorization

See pages 1.1462-1.1467 in the Fraud Examiner’s Manual

Every organization should be ready to respond to a wide range of cybersecurity incidents, including cyberattacks and data breaches. The recommended methodology for responding to cybersecurity incidents can be summarized in the following steps:

  1. Preparation
  2. Detection and analysis
  3. Containment and eradication
  4. Breach notification
  5. Recovery and follow-up

Authorization is a step required when allowing a user to gain logical access to computer systems and networks. It is not a step in the recommended methodology for responding to cybersecurity incidents.

221
Q

Which of the following is an information security goal that an e-commerce system should endeavor to meet for its users and asset holders?

A. Systems reliability
B. Non-repudiation
C. Exactness
D. Access authority

A

B. Non-repudiation

See pages 1.1437-1.1439 in the Fraud Examiner’s Manual

Non-repudiation is an information security goal that an e-commerce system should strive to provide its users and asset holders. It refers to a method used to guarantee that the parties involved in an e-commerce transaction cannot repudiate (deny) participation in that transaction. Non-repudiation is obtained by digital signatures, confirmation services, and time stamps.

Additional information security goals that should be achieved to ensure the security of information systems for users and account holders include:

  • Confidentiality of data
  • Integrity of data
  • Availability of data
  • Authentication
222
Q

Which of the following is an example of an indicator of intrusion that an employee might encounter when working on their company’s network?

A. The user’s contacts are receiving strange email messages from the user’s account
B. The user’s computer is sending an abnormal amount of data to other countries
C. The user’s web searches are automatically redirected to other websites
D. All of the above

A

D. All of the above

See pages 1.1402-1.1403 in the Fraud Examiner’s Manual

Regardless of the technical labels a cybersecurity professional might use to describe an indication of intrusion, it is important for fraud examiners and other computer system users to recognize signs that intruders have accessed or affected the system, which can include unusual inbound or outbound network traffic, anomalies in user access to network files, or unusual network or computer performance.

Every day, organizations’ networks experience inbound and outbound traffic as part of normal business operations. Among the typical types of traffic are emails sent to and from employees, as well as data transmitted to or from the internet. Abnormal traffic, either higher or lower than usual, could be an indication that an attacker has gained access to an organization’s network and is manipulating traffic by sending malicious software to the network or exfiltrating data from it. Common signs of unusual network traffic might include:

  • Geographical irregularities related to network access and traffic
  • Mismatched port-application traffic
  • Unusual domain name system (DNS) requests
  • Web traffic with unhuman behavior
  • Contacts receiving strange messages from email accounts
  • Redirected web searches
223
Q

Both corporate espionage and competitive intelligence are legitimate forms of information gathering that businesses engage in to anticipate competitors’ research and development (R&D) strategies.

A. True
B. False

A

B. False

See pages 1.702 in the Fraud Examiner’s Manual

Competitive intelligence can be defined as the process by which competitor data are assembled into relevant, accurate, and usable knowledge about competitors’ positions, performance, capabilities, and intentions. Competitive intelligence is a legitimate business function that aligns with marketing and research and development (R&D), as well as general business strategy and the newer discipline of knowledge management. It helps businesses to anticipate competitors’ R&D strategies and to determine their operating costs, pricing policies, financial strength, and capacity.

Espionage, which is subdivided into both traditional espionage and corporate or industrial espionage categories, is the term used to describe the use of illegal, covert means to acquire information; therefore, it does not cover legitimate intelligence collection and analysis using legal means.

224
Q

Which of the following lists the information security goals that an e-commerce system should achieve for its users and asset holders?

A. Penetrability, accuracy, exactness, materiality, and systems reliability
B. Penetrability, accuracy, availability, authentication, and systems reliability
C. Confidentiality, integrity, availability, authentication, and non-repudiation
D. Exactness, invulnerability, accuracy, materiality, and data/systems response

A

C. Confidentiality, integrity, availability, authentication, and non-repudiation

See pages 1.1437 in the Fraud Examiner’s Manual

All branches of an information system, including the e-commerce branch, strive to provide security for their users and asset holders. The following is a list of common information security goals that should be achieved to ensure the security of information systems for users and account holders:

  • Confidentiality of data
  • Integrity of data
  • Availability of data
  • Authentication
  • Non-repudiation
225
Q

Which of the following health care frauds would BEST be described as a fictitious provider scheme?

A. A thief steals a health care provider’s identification information and bills a government health care program under the name of a fake clinic.
B. A doctor at a hospital inflates the cost of services by coding them as being more complex than they should be.
C. A group of people posing as medical professionals provide services without proper licenses.
D. A provider operates a mobile lab that bills a health care program for unnecessary tests and then relocates.

A

A. A thief steals a health care provider’s identification information and bills a government health care program under the name of a fake clinic.

See pages 1.1205 in the Fraud Examiner’s Manual

In a fictitious provider scheme, corrupt providers or other criminals fraudulently obtain and use another provider’s identification information and steal or purchase lists of patients’ identifying information. Thereafter, the perpetrator submits bills using the fictitious provider’s information to the insurance provider or government health care program for medical services although no services are performed.

226
Q

Which of the following types of procurement fraud schemes involves procurement employees who convince their employer, the procuring entity, that it needs excessive or unnecessary products or services?

A. Bid manipulation schemes
B. Need recognition schemes
C. Bid tailoring schemes
D. Nonconforming goods schemes

A

B. Need recognition schemes

See pages 1.1514 in the Fraud Examiner’s Manual

Generally, procurement actions begin with the procuring entity making a determination of its general needs. These initial determinations include assessments of the types and amounts of goods or services required to meet the entity’s needs. In need recognition schemes, procurement employees convince their employer that it needs excessive or unnecessary products or services.

227
Q

Which of the following statements concerning fraud that involves special care facilities is TRUE?

A. Many patients in special care facilities are less likely to report fraud because they are often not responsible for their own financial affairs
B. When fraud is committed against special care facilities, it is common for victims to obtain repayment from the perpetrators
C. It is difficult to commit fraud in high volume in special care facilities because patients are located in close proximity to each other
D. All of the above

A

A. Many patients in special care facilities are less likely to report fraud because they are often not responsible for their own financial affairs

See pages 1.1225-1.1226 in the Fraud Examiner’s Manual

Medical facilities that offer special care services, such as nursing homes and psychiatric hospitals, and the patients in them are at a greater risk of fraud than most other medical institutions. Many health care fraud schemes are revealed after a patient reports strange charges or other red flags. Unfortunately, criminals take advantage of the fact that patients in special care facilities are more vulnerable to fraud. There are several features unique to special care facilities that make them particularly vulnerable to fraud:

  • Unscrupulous providers can operate their schemes in volume because the patients are all in the same facility.
  • Many patients in special care facilities do not have the legal capacity or ability to be responsible for their own financial affairs and, consequently, are not as likely to report fraud involving their care.
  • In some instances, special care facilities make patient records available to outside providers who are not responsible for the direct care of the patient (sometimes in violation of regulations).
  • In automated claims environments, scrutiny of the claims at the processor level is inadequate because the automated systems used do not accumulate data that would promptly flag indications of improbably high charges or levels of service.
  • Even when abusive practices are detected and prosecuted, repayment is rarely received from wrongdoers because they usually go out of business or deplete their resources so that they lack any resources to repay the funds.
  • Patient personal funds are often controlled by the facility’s administration and are an inviting target for embezzlement. Individually, patients generally maintain a relatively small balance in their personal funds accounts. Collectively, however, these funds generate a considerable source of income for an unscrupulous special care facility operator or employee.