CFCI Certification Study Guide
48 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a common method used by employees to test an organization's anti-fraud controls?

  • Submitting high-value receipts for personal expenses
  • Offering kickbacks to the expense auditors
  • Providing fake employee identification
  • Submitting receipts for expenses incurred during a personal trip (correct)
  • What type of fraud is characterized by corporate cardholders charging non-business expenses to their employer?

  • Credit Card Skimming Fraud
  • Identity Theft Fraud
  • Expense Account Fraud
  • Purchasing Card Fraud (correct)
  • Which activity is primarily associated with payments fraud conducted outside the legitimate card holder?

  • Submitting inaccurate expense reports
  • Creating false invoices
  • Writing unauthorized checks
  • Forged checks (correct)
  • What type of check fraud involves the alteration of the check to change the payee's name?

    <p>Check washing (D)</p> Signup and view all the answers

    How does an insider commit electronic payee alteration?

    <p>By modifying the Vendor Master File (A)</p> Signup and view all the answers

    What does check alteration by inserting letters refer to?

    <p>Changing the payee name by adding words (C)</p> Signup and view all the answers

    When an employee steals blank checks to forge them, what type of offense are they committing?

    <p>Forgery and theft (D)</p> Signup and view all the answers

    What is an Automated Clearing House (ACH)?

    <p>An electronic network for financial transactions (A)</p> Signup and view all the answers

    What are common misconceptions regarding financial fraud?

    <p>Fraud is an unavoidable cost of doing business. (A), All organizations experience no fraud at all. (B), Ethics training ensures that fraud cannot happen. (C), Fraud is only a minor concern for financial institutions. (D)</p> Signup and view all the answers

    What percentage of financial institutions experienced attempted payment fraud in 2020?

    <p>74% (C)</p> Signup and view all the answers

    According to the 20-60-20 rule, what percentage of people are considered inherently dishonest?

    <p>20% (B)</p> Signup and view all the answers

    What are the three factors that contribute to fraudulent activity according to the Fraud Triangle?

    <p>Opportunity, financial pressure, and rationalization (C)</p> Signup and view all the answers

    Which statement about management level fraud is true?

    <p>Management level fraud is committed less frequently than employee level fraud. (C)</p> Signup and view all the answers

    What is a broad definition of fraud?

    <p>Illegal activity that represents theft or deception. (C)</p> Signup and view all the answers

    What type of fraud is referred to as employee level fraud?

    <p>Fraud committed by individuals within the organization. (C)</p> Signup and view all the answers

    Why is complacency about fraud considered risky for organizations?

    <p>It can lead to financial losses and long-term damage. (A)</p> Signup and view all the answers

    What is check kiting?

    <p>Depositing a legitimate check, writing a bad check for more, and withdrawing cash. (C)</p> Signup and view all the answers

    What characterizes new account fraud?

    <p>Involves fraudulent transactions on newly opened accounts within 90 days. (C)</p> Signup and view all the answers

    Which is the first step in the money laundering process?

    <p>Placement (A)</p> Signup and view all the answers

    Which method is NOT part of the layering phase in money laundering?

    <p>Purchasing luxury items (A)</p> Signup and view all the answers

    What is the main purpose of the Bank Secrecy Act (BSA)?

    <p>To track the movement of cash and monetary instruments. (C)</p> Signup and view all the answers

    What significant event prompted the signing of the USA PATRIOT Act?

    <p>The September 11 attacks (A)</p> Signup and view all the answers

    What typically happens during the integration phase of money laundering?

    <p>Funds are used in businesses that appear legitimate. (A)</p> Signup and view all the answers

    How is layering typically achieved in the money laundering process?

    <p>By executing numerous transactions to obscure money's origin. (D)</p> Signup and view all the answers

    What is the primary purpose of a Currency Transaction Report (CTR)?

    <p>To file reports for transactions over $10,000. (C)</p> Signup and view all the answers

    Which of the following is NOT one of the four pillars of AML compliance?

    <p>External Financial Reviewing. (A)</p> Signup and view all the answers

    What type of fraud is primarily committed by prospective homeowners?

    <p>Fraud for property. (C)</p> Signup and view all the answers

    What is the percentage of construction expenditures lost to fraud each year?

    <p>10 percent. (C)</p> Signup and view all the answers

    Which technique is NOT associated with AML investigation?

    <p>Public advertisement solutions. (A)</p> Signup and view all the answers

    What is the definition of phishing?

    <p>A social engineering tactic using email. (D)</p> Signup and view all the answers

    Which of the following describes bid-rigging schemes?

    <p>Schemes to inflate project costs through collusion. (A)</p> Signup and view all the answers

    Social engineering is primarily aimed at:

    <p>Obtaining personal information. (A)</p> Signup and view all the answers

    What is the first step in assessing potential fraud schemes within an organization?

    <p>Identify past incidents of fraud (D)</p> Signup and view all the answers

    Which of the following best describes the risk level labeled as 'probable'?

    <p>Risk expected to occur frequently (D)</p> Signup and view all the answers

    What category of materiality should be addressed, according to the FRA team?

    <p>More than inconsequential risks (A)</p> Signup and view all the answers

    How is the likelihood of a fraud scheme categorized in the organization?

    <p>Based on internal controls and historical data (A)</p> Signup and view all the answers

    What is the significance of identifying existing anti-fraud controls?

    <p>To evaluate the effectiveness of risk mitigation (B)</p> Signup and view all the answers

    In fraud risk assessments, which level indicates that a risk is very unlikely to happen?

    <p>Remote (C)</p> Signup and view all the answers

    What should be done for risks categorized as more than inconsequential?

    <p>They should be investigated and addressed (D)</p> Signup and view all the answers

    Which of the following has the highest effective risk mitigation according to the control scale?

    <p>1 - Optimal control design (B)</p> Signup and view all the answers

    Which entity was established under the Dodd-Frank Act to oversee insurance companies deemed risky?

    <p>Federal Insurance Office (D)</p> Signup and view all the answers

    What major financial entity required a taxpayer-funded intervention during the 2008 crisis due to a liquidity issue?

    <p>AIG (C)</p> Signup and view all the answers

    What was one of the major criticisms leading to the regulation of credit rating agencies under Dodd-Frank?

    <p>Misleading investors by overrating securities (D)</p> Signup and view all the answers

    Which bureau was created by Dodd-Frank to protect consumers from financial malpractice?

    <p>Consumer Financial Protection Bureau (A)</p> Signup and view all the answers

    What incentive does the Dodd-Frank whistleblower provision provide?

    <p>Financial rewards for reporting violations (D)</p> Signup and view all the answers

    What regulatory body was created to oversee credit rating agencies following the Dodd-Frank Act?

    <p>Office of Credit Rating (C)</p> Signup and view all the answers

    Which of the following is true about the financial services industry in relation to Dodd-Frank?

    <p>It is the most heavily regulated sector. (A)</p> Signup and view all the answers

    How did the Dodd-Frank Act primarily affect the operations of credit rating agencies?

    <p>By subjecting them to federal regulation (C)</p> Signup and view all the answers

    Flashcards

    Financial Services Fraud

    Illegal activity (theft, deception, or both) targeting financial institutions.

    Fraud Myths

    Common misconceptions about fraud, for example, that fraud is rare or easily preventable.

    20-60-20 Rule

    Describes the distribution of individuals in terms of fraud susceptibility: 20% will never commit fraud; 60% are likely to commit if opportunity presents itself; and 20% are inherently dishonest.

    Insider Fraud Threats

    Fraud committed by employees or managers within a financial institution.

    Signup and view all the flashcards

    Management Level Fraud

    Insider fraud committed by managers, often resulting in greater financial loss compared to employee-level fraud, but less frequent.

    Signup and view all the flashcards

    Fraud Triangle

    A model explaining employee fraud, highlighting the three factors of opportunity, financial pressure, and rationalization.

    Signup and view all the flashcards

    Opportunity in Fraud

    Part of the Fraud Triangle, favorable conditions that allow for fraudulent activities.

    Signup and view all the flashcards

    Financial Pressure (Fraud Triangle)

    A cause of fraud, stemming from employee's financial strain. This is a part of the Fraud Triangle.

    Signup and view all the flashcards

    Expense-Based Fraud (Meals)

    Submitting false receipts for expenses under the threshold (e.g., under $25 for meals) to claim fraudulent amounts.

    Signup and view all the flashcards

    Out-of-Policy Expense Claiming

    Claiming expenses not allowed by the company policy (e.g., personal expenses disguised as business-related costs).

    Signup and view all the flashcards

    P-Card Fraud

    Legitimate cardholders using company cards for personal expenses and misrepresenting them as legitimate business purchases.

    Signup and view all the flashcards

    Payments Fraud (General)

    Fraudulent processing of payment transactions, often involving forged checks or stolen credit card details, executed by someone external to a legitimate cardholder.

    Signup and view all the flashcards

    Forged Check

    A check signed by someone other than the legitimate authorized signer without their consent.

    Signup and view all the flashcards

    Check Interception & Forgery

    Stealing checks made payable to a legitimate party and altering the payee information to oneself or a different party.

    Signup and view all the flashcards

    Electronic Payee Alteration

    Internal fraud where an insider in accounts payable changes vendor information within the payment system, to a look-alike company, often just for a short-time.

    Signup and view all the flashcards

    Check Alteration (Numbers)

    Changing the numerical amount written on a check by modifying the amount.

    Signup and view all the flashcards

    Check Kiting

    Fraudulent activity involving depositing a legitimate check, writing a bad check for more, and depositing it in a second bank account, to withdraw money before the bad check bounces.

    Signup and view all the flashcards

    New Account Fraud

    Fraudulent activity targeting accounts newly opened within 90 days, often opened solely for fraud.

    Signup and view all the flashcards

    Money Laundering

    Process of making illegally obtained money appear legitimate by putting it into the banking system and using it for transactions to hide origins.

    Signup and view all the flashcards

    Money Laundering Placement

    First stage of money laundering, where cash is physically given to legitimate businesses (like banks or casinos).

    Signup and view all the flashcards

    Money Laundering Layering

    Second stage of money laundering, where ill-gotten cash is converted into different forms and moved through numerous transactions to obscure its origins (e.g., stock purchases, real estate).

    Signup and view all the flashcards

    Money Laundering Integration

    Third stage of money laundering, where laundered cash is incorporated into seemingly legitimate financial activities (e.g., real estate, luxury goods).

    Signup and view all the flashcards

    Bank Secrecy Act (BSA)

    First anti-money-laundering law to establish reporting and record-keeping requirements for financial institutions to track cash and monetary instruments.

    Signup and view all the flashcards

    USA Patriot Act

    Law signed after the 9/11 attacks, aimed at deterring terrorism and increasing the government's ability to track financial transactions.

    Signup and view all the flashcards

    AML Compliance

    A set of rules and procedures financial institutions must follow to prevent money laundering and terrorist financing.

    Signup and view all the flashcards

    CTR (Currency Transaction Report)

    A report filed with FinCEN when a financial transaction involving cash exceeds $10,000.

    Signup and view all the flashcards

    Construction Fraud

    Crimes committed during construction projects, often involving inflated costs, fake bids, or misappropriated funds.

    Signup and view all the flashcards

    Mortgage Fraud for Property

    Fraud committed by borrowers who falsify loan documents to obtain a mortgage they wouldn't normally qualify for.

    Signup and view all the flashcards

    Mortgage Fraud for Profit

    Fraud committed by professionals like brokers or appraisers, who manipulate loan documents for financial gain.

    Signup and view all the flashcards

    Social Engineering

    A psychological tactic used to manipulate people into giving up confidential information or taking actions that benefit the fraudster.

    Signup and view all the flashcards

    Phishing

    A form of social engineering using emails or websites to deceive victims into giving up their personal details.

    Signup and view all the flashcards

    Bid-rigging Schemes

    Fraudulent arrangements where contractors secretly agree on prices before bidding, ensuring one gets the contract.

    Signup and view all the flashcards

    Fraud Risk Assessment

    A process to identify, analyze, and manage potential fraud risks within an organization.

    Signup and view all the flashcards

    Likelihood of Fraud

    The probability that a specific type of fraud will occur, considering factors like past incidents and industry trends.

    Signup and view all the flashcards

    Materiality of Risk

    The potential financial impact of fraud on stakeholders like shareholders or lenders.

    Signup and view all the flashcards

    Risk Levels

    Categorizations of fraud risks based on their likelihood of occurrence.

    Signup and view all the flashcards

    More Than Inconsequential Risk

    A fraud risk with a significant potential financial impact that requires investigation and evidence gathering.

    Signup and view all the flashcards

    Assessing Controls Against Fraud

    Evaluating existing controls to determine their effectiveness in preventing specific fraud scenarios.

    Signup and view all the flashcards

    Control Design and Effectiveness

    The design and effectiveness of controls in minimizing the likelihood of fraud occurring and control failures.

    Signup and view all the flashcards

    Fraud Risk Mitigation

    Measures taken to reduce or eliminate the likelihood or impact of fraud risks.

    Signup and view all the flashcards

    Dodd-Frank & Insurance

    The Dodd-Frank Act created the Federal Insurance Office (FIO) to identify insurance companies that pose systemic risks, like AIG during the 2008 financial crisis.

    Signup and view all the flashcards

    Credit Rating Agencies & Dodd-Frank

    Dodd-Frank established the Office of Credit Rating at the SEC to regulate agencies like Moody's and Standard & Poor's, which were criticized for inflating ratings during the 2008 crisis.

    Signup and view all the flashcards

    Consumer Protection in Dodd-Frank

    The Consumer Financial Protection Bureau (CFPB), created by Dodd-Frank, protects consumers from unfair practices by banks and lenders.

    Signup and view all the flashcards

    Dodd-Frank Whistleblower Provision

    This provision encourages individuals with information about securities law violations to report them to the government for financial rewards, combating corruption and insider trading.

    Signup and view all the flashcards

    How does Dodd-Frank affect derivatives?

    Dodd-Frank created a public clearinghouse, similar to the stock exchange, for derivatives trades to increase transparency and oversight.

    Signup and view all the flashcards

    What is the FIO's role?

    The Federal Insurance Office (FIO) under the Treasury Department aims to identify and manage systemic risks posed by insurance companies.

    Signup and view all the flashcards

    What is the Office of Credit Rating's purpose?

    The Office of Credit Rating, part of the SEC, aims to regulate credit rating agencies, ensuring accurate and unbiased assessments of investment risk.

    Signup and view all the flashcards

    How does the CFPB protect consumers?

    The Consumer Financial Protection Bureau (CFPB) protects consumers from unfair and deceptive practices by banks and other lenders, ensuring fair treatment in financial transactions.

    Signup and view all the flashcards

    Study Notes

    CFCI Study Guide - Updated with Certified Solutions

    • This document is a 51-page study guide for the Certified Financial Services Institute (CFCI) certification.
    • It covers financial management topics.
    • The guide is updated with certified solutions.
    • It was shared on docsity.com.

    Fraud

    • Fraud is any illegal act characterized by deceit, concealment, or violation of trust, done to obtain money, property, or services or to avoid payment.
    • Main Types of Fraud:
      • Internal Fraud: Criminal activities within an organization, typically by an employee against the employer.
      • External Fraud: Deceptive conduct by non-employees to deprive the organization of value for financial gain.
    • Examples of Fraud:
      • Larceny: The taking of another's property with intent to keep it.
      • Financial Fraud: "Cooking the books," falsely representing a company's financial condition to inflate stock value or boost bonuses.
      • Skimming (cash larceny): Stealing cash before it enters the accounting system.
      • Billing Schemes: Using false documents to get payment for non-existent services or purchases.
      • Check Tampering: Using blank checks to create counterfeit or computer-generated checks.
      • Employee reimbursement scheme: Making false claims for reimbursement.
      • Corruption: Bribery, extortion, and illegal gratuities.
      • Kickback Schemes: Employees and vendors inflate invoices in return for a portion of the inflated cost.
      • Credit Card Fraud: Creating, selling, or using stolen credit/debit cards.
      • Identity Theft/Fraud: Unauthorized use of another person's information for illegal financial gain.
      • Wildcat Banking: Banks issuing notes without sufficient security.

    Additional Topics

    • Savings and Loan Crisis: The failure of many savings and loan institutions due to risky policies.
    • Myths about Fraud:
      • Myth 1: "We have very little fraud here"
      • Myth 2: "Ethics and training compliance has us covered"
      • Myth 3: "Fraud is an unavoidable cost of doing business".
    • Fraud Triangle: The three factors contributing to fraudulent activity: opportunity, financial pressure, and rationalization.
    • Fraud Diamond: This expanded approach adds greed as a core motivator.
    • Types of Mortgage Fraud: Application fraud, tax returns, appraisals, verification of deposits, employment verification, escrow/closing documents, and credit documents.
    • Soft/Hard indicators of fraud:
      • Soft indicators are intangible behavioral signs a person might exhibit (emotional changes, stress, etc.)
      • Hard indicators are tangible (for example, numbers such as sales figures).
    • Segregation of Duties (SoD): Separating job functions to prevent one person from committing fraud.
    • Delegation of Authority (DoA): Clearly defined levels and limits of authority within an organization.
    • Employee Level Embezzlement: Looting customer accounts, control weakness exploitation, looting with false records, dormant account fraud, fictitious deposits, and theft of consignment items.
    • Collusion with Vendors: Pre-solicitation, solicitation, and submission stages. Pre-solicitation is when dishonest people receive bribes to recognize the need for the specific vendor or their services. During solicitation, vendors can pay corrupt employees to write contract specifications that favor the contract vendor. During submission, vendors are given the details of already-submitted bids. Bid-pooling is another issue, whereby bidders conspire to split contracts to ensure that they get some of the work done without extensive collusion.
    • Fraudulent Fee Reversal.
    • Theft/Forgery of Stolen/Blank Checks.
    • Check Interception and Forgery of Endorsement.
    • Electronic Payee Alteration.
    • Types of Payroll Fraud:
      • Creation of ghost employees
      • Altering hourly rate
      • Altering employee status, etc.
    • Fraudulent Reporting regarding Loans & Financial Reporting:
      • Loans to Phantom Borrowers
      • Loan Lapping
      • Nominee or Straw Borrowers
      • Kickbacks
      • Reciprocal Loans
      • Linked Financing
      • Asset-based or working capital loan fraud.
      • External Mortgage Fraud
    • Mortgage Fraud Modus Operandi
    • Builder Bailout Scheme
    • Equity Skimming
    • Identity fraud to obtain mortgage
    • Overstating Appraisal Values etc.
    • Social Engineering.
    • Phishing Scams.
    • Business Email Compromise (BEC)
    • Credit Card Fraud.
    • Carding.
    • EMV chip technology.
    • Forged On-us Checks.
    • Cashier's Check Fraud.
    • Check Kiting.
    • New Account Fraud
    • Money Laundering

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    CFCI Study Guide PDF

    Description

    This study guide provides comprehensive insights into the topics necessary for passing the Certified Financial Services Institute (CFCI) certification. It covers essential financial management concepts and includes certified solutions to aid your preparation. Perfect for anyone looking to enhance their knowledge in financial services.

    Use Quizgecko on...
    Browser
    Browser