Cyberfraud
Fraudulent Disbursements
Payment Fraud
Financial Statement Fraud
Theft of Data and Intellectual Property
100

A method for acquiring sensitive information by falsely claiming through electronic communication to be from an entity with which the target does business

What is phishing?

100

Someone on the payroll who does not actually work for the victim company

What is a ghost employee?

100

A device that scans magnetic strips from cards

What is a skimmer?

100

The deliberate misrepresentation of the financial condition of an enterprise accomplished through the intentional misstatement or omission of amounts or disclosures in the financial statements to deceive financial statement users 

What is Financial Statement Fraud?

100

Agreements whereby employees agree not to work for competing companies within a certain period of time after leaving their current employer

What is noncompetition agreements?

200

A type of software that collects and reports information about a computer user without the user's knowledge or consent

What is spyware?

200

A fictitious entity created for the sole purpose of committing fraud

What is a shell company?

200

What do fraudsters use to purchase prepaid gift cards to quickly convert illicit card funds?

What is stolen credit or debit cards?

200

Recording expenses in the wrong period and early revenue recognition are classified as what type of financial fraud scheme?

What is timing differences?

200

Information in the public domain, that is available for free or at a fee

What is open-source information?

300

A type of attack in which users are fooled into entering sensitive data (such as a password or credit card number) into a malicious website that imitates a legitimate website.

What is pharming?

300

What happens when an employee records a fictitious refund of goods at the employee's cash register?

What is the company's inventory is overstated?

300

Mario, an employee of a person-to-person (P2P) payment company, has been writing down the account numbers and passwords of customer accounts with the intent of fraudulently using them to pay for items he purchases online. Mario is engaging in:

What is electronic funds transfer fraud?

300

Calculated by dividing total liabilities by total equity

What is debt-to-equity ratio?

300

Information gathered from subject matter experts and informed individuals

What is human intelligence?

400

A program or command procedure that gives the appearance that it is useful but actually contains hidden malicious code that causes damage.

What is Trojan Horse?

400

Sean is responsible for delivering time sheets to the payroll department on behalf of his supervisor. One day he decides to withhold his time sheet from those being sent to his supervisor for approval. He falsely increases the number of hours he has worked and then forges his supervisor’s signature on his time sheet. He adds the time sheet to the stack of authorized sheets and delivers them to payroll. This is an example of:

What is a falsified hours and salary scheme?

400

What is the most difficult aspect of a card to reproduce?

What is the hologram?

400

A technique for analyzing the relationships among the items on an income statement, balance sheet or statement of cash flows during a specific accounting period by expressing components as percentages of a specified base value within the statement

What is a vertical analysis?

400

Cooper is an intelligence professional for Whetstone Intelligence, a competitive intelligence firm. He is tasked with gathering intelligence about Cryptic Global, the major competitor of Whetstone’s biggest client. To gather the intelligence, Cooper infiltrates Cryptic Global’s office by posing as a member of its cleaning crew and collects information left around employees’ computers and desks. Cooper’s approach is an example of:

What is  Scavenging?

500

Matthew receives a voice mail message telling him that his credit card might have been used fraudulently. He is asked to call a phone number. When he calls the number, he hears a menu and a list of choices that closely resembles those used by his credit card company. The phone number even appears to be similar to that of his card issuer. Whattype of scheme has Matthew become the target of?

What is Vishing?

500

White, an employee of ABC Corporation, intentionally issued two payments for the same invoice. After the checks had been mailed, White called the vendor and explained that a double payment had been made by mistake. She asked the vendor to return one of the checks to her attention. When the vendor returned the check, White took it and cashed it. This is an example of:

What is a pay and return scheme?

500

What type of payment fraud only requires a scanner printer and personal computer?

What is check fraud rings?

500

A fraud scheme in which an accountant fails to write down obsolete inventory to its current fair market value has what effect on the company’s current ratio?

What is the current ratio will be artificially inflated?

500

What is the first step of a program for Safeguarding Proprietary Information (SPI)?

What is identifying what information needs to be protected?