Customer Authentication
Cash & Vault Controls
EIV Documentation & Disclosures
Keys, Combinations & Branch Access
Safe Deposit Box & Custody
100

 Purpose of the authentication script.

Verify identity consistently to reduce social engineering and fraud risk.

100

Why must month‑end net cash differences be resolved promptly?

To ensure books match physical cash and reduce loss/fraud exposure and findings.

100

Control purpose of imaging required account documents into EIV before or at account activation.

Evidence of disclosures and authorization; prevents “missing from EIV” exceptions and ensures audit traceability.

100

Why must key/combination logs be current?

Proves access control and deters misuse; supports reviews.

100

Why are timely updates after SDB surrender critical?

Prevents unauthorized access and ensures correct billing/records.

200

 One thing you must never solicit or accept over the phone

Sensitive credentials such as PINs or full passwords

200

 Define dual control in vault operations

Two associates jointly access, count, and record to prevent single‑person risk.

200

Best action when a required disclosure isn’t in EIV after opening

Obtain/confirm client acknowledgment, image and index correctly, and document remediation and timing.

200

First step if a key is lost or unaccounted for.

Escalate, resecure per procedure (rekey/change combo), and document end‑to‑end.

200

Required evidence for SDB access changes.

Signed access update plus identity verification, imaged and indexed.

300

A red flag that should trigger stepped‑up verification

Urgency pressure, inconsistent answers, or unusual requests outside normal patterns.

300

A practice that avoids quarterly vault fine‑count misses.

Calendar holds with alternates, checklist sign‑offs, and manager review with documented evidence.

300

Name two indexing pitfalls that trigger exceptions

Wrong document‑type label and incomplete or mismatched customer or account identifiers.

300

Best practice when changing combinations

Dual control, immediate log updates, and confirm the change works.

300

A common SDB maintenance error that drives exceptions.

Not removing surrendered access in all required systems/logs.

400

Control‑correct response when a phone request fails authentication

Do not proceed; offer in‑person verification or call back using a verified number on file.

400

First steps when a variance exceeds threshold.

Stop and recount, reconcile logs, review transactions/footage as required, escalate per policy, and document.

400

Client refuses a disclosure acknowledgment—what is the control‑correct next step?

Do not proceed; escalate per procedure and document both refusal and guidance received

400

Handling temporary vendor key custody.

Use sign‑in/out log, dual control where required, and escort policy adherence.

400

Practice to prevent SDB exceptions during staffing gaps.

Dual‑verification checklist and end‑of‑day audit of SDB transactions.

500

Why documenting failed authentication attempts matters.

Provides evidence of control effectiveness and supports investigations and trend analysis

500

Documentation miss that turns a small variance into a CMR finding.

Missing investigation notes or lack of evidence of timely manager review.

500

One proactive step to prevent “signature card(s) missing from EIV"

Use a new‑account checklist with an EIV imaging/verification step before completion.

500

Evidence reviewers look for on access logs.

Completeness, dates/times, signatures/initials, and manager review.

500

Logs and system disagree—what’s the control‑correct path?

Investigate, correct records, document actions, and escalate as required.

M
e
n
u