CFCI Certification Study Guide

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is a common method used by employees to test an organization's anti-fraud controls?

  • Submitting high-value receipts for personal expenses
  • Offering kickbacks to the expense auditors
  • Providing fake employee identification
  • Submitting receipts for expenses incurred during a personal trip (correct)

What type of fraud is characterized by corporate cardholders charging non-business expenses to their employer?

  • Credit Card Skimming Fraud
  • Identity Theft Fraud
  • Expense Account Fraud
  • Purchasing Card Fraud (correct)

Which activity is primarily associated with payments fraud conducted outside the legitimate card holder?

  • Submitting inaccurate expense reports
  • Creating false invoices
  • Writing unauthorized checks
  • Forged checks (correct)

What type of check fraud involves the alteration of the check to change the payee's name?

<p>Check washing (D)</p> Signup and view all the answers

How does an insider commit electronic payee alteration?

<p>By modifying the Vendor Master File (A)</p> Signup and view all the answers

What does check alteration by inserting letters refer to?

<p>Changing the payee name by adding words (C)</p> Signup and view all the answers

When an employee steals blank checks to forge them, what type of offense are they committing?

<p>Forgery and theft (D)</p> Signup and view all the answers

What is an Automated Clearing House (ACH)?

<p>An electronic network for financial transactions (A)</p> Signup and view all the answers

What are common misconceptions regarding financial fraud?

<p>Fraud is an unavoidable cost of doing business. (A), All organizations experience no fraud at all. (B), Ethics training ensures that fraud cannot happen. (C), Fraud is only a minor concern for financial institutions. (D)</p> Signup and view all the answers

What percentage of financial institutions experienced attempted payment fraud in 2020?

<p>74% (C)</p> Signup and view all the answers

According to the 20-60-20 rule, what percentage of people are considered inherently dishonest?

<p>20% (B)</p> Signup and view all the answers

What are the three factors that contribute to fraudulent activity according to the Fraud Triangle?

<p>Opportunity, financial pressure, and rationalization (C)</p> Signup and view all the answers

Which statement about management level fraud is true?

<p>Management level fraud is committed less frequently than employee level fraud. (C)</p> Signup and view all the answers

What is a broad definition of fraud?

<p>Illegal activity that represents theft or deception. (C)</p> Signup and view all the answers

What type of fraud is referred to as employee level fraud?

<p>Fraud committed by individuals within the organization. (C)</p> Signup and view all the answers

Why is complacency about fraud considered risky for organizations?

<p>It can lead to financial losses and long-term damage. (A)</p> Signup and view all the answers

What is check kiting?

<p>Depositing a legitimate check, writing a bad check for more, and withdrawing cash. (C)</p> Signup and view all the answers

What characterizes new account fraud?

<p>Involves fraudulent transactions on newly opened accounts within 90 days. (C)</p> Signup and view all the answers

Which is the first step in the money laundering process?

<p>Placement (A)</p> Signup and view all the answers

Which method is NOT part of the layering phase in money laundering?

<p>Purchasing luxury items (A)</p> Signup and view all the answers

What is the main purpose of the Bank Secrecy Act (BSA)?

<p>To track the movement of cash and monetary instruments. (C)</p> Signup and view all the answers

What significant event prompted the signing of the USA PATRIOT Act?

<p>The September 11 attacks (A)</p> Signup and view all the answers

What typically happens during the integration phase of money laundering?

<p>Funds are used in businesses that appear legitimate. (A)</p> Signup and view all the answers

How is layering typically achieved in the money laundering process?

<p>By executing numerous transactions to obscure money's origin. (D)</p> Signup and view all the answers

What is the primary purpose of a Currency Transaction Report (CTR)?

<p>To file reports for transactions over $10,000. (C)</p> Signup and view all the answers

Which of the following is NOT one of the four pillars of AML compliance?

<p>External Financial Reviewing. (A)</p> Signup and view all the answers

What type of fraud is primarily committed by prospective homeowners?

<p>Fraud for property. (C)</p> Signup and view all the answers

What is the percentage of construction expenditures lost to fraud each year?

<p>10 percent. (C)</p> Signup and view all the answers

Which technique is NOT associated with AML investigation?

<p>Public advertisement solutions. (A)</p> Signup and view all the answers

What is the definition of phishing?

<p>A social engineering tactic using email. (D)</p> Signup and view all the answers

Which of the following describes bid-rigging schemes?

<p>Schemes to inflate project costs through collusion. (A)</p> Signup and view all the answers

Social engineering is primarily aimed at:

<p>Obtaining personal information. (A)</p> Signup and view all the answers

What is the first step in assessing potential fraud schemes within an organization?

<p>Identify past incidents of fraud (D)</p> Signup and view all the answers

Which of the following best describes the risk level labeled as 'probable'?

<p>Risk expected to occur frequently (D)</p> Signup and view all the answers

What category of materiality should be addressed, according to the FRA team?

<p>More than inconsequential risks (A)</p> Signup and view all the answers

How is the likelihood of a fraud scheme categorized in the organization?

<p>Based on internal controls and historical data (A)</p> Signup and view all the answers

What is the significance of identifying existing anti-fraud controls?

<p>To evaluate the effectiveness of risk mitigation (B)</p> Signup and view all the answers

In fraud risk assessments, which level indicates that a risk is very unlikely to happen?

<p>Remote (C)</p> Signup and view all the answers

What should be done for risks categorized as more than inconsequential?

<p>They should be investigated and addressed (D)</p> Signup and view all the answers

Which of the following has the highest effective risk mitigation according to the control scale?

<p>1 - Optimal control design (B)</p> Signup and view all the answers

Which entity was established under the Dodd-Frank Act to oversee insurance companies deemed risky?

<p>Federal Insurance Office (D)</p> Signup and view all the answers

What major financial entity required a taxpayer-funded intervention during the 2008 crisis due to a liquidity issue?

<p>AIG (C)</p> Signup and view all the answers

What was one of the major criticisms leading to the regulation of credit rating agencies under Dodd-Frank?

<p>Misleading investors by overrating securities (D)</p> Signup and view all the answers

Which bureau was created by Dodd-Frank to protect consumers from financial malpractice?

<p>Consumer Financial Protection Bureau (A)</p> Signup and view all the answers

What incentive does the Dodd-Frank whistleblower provision provide?

<p>Financial rewards for reporting violations (D)</p> Signup and view all the answers

What regulatory body was created to oversee credit rating agencies following the Dodd-Frank Act?

<p>Office of Credit Rating (C)</p> Signup and view all the answers

Which of the following is true about the financial services industry in relation to Dodd-Frank?

<p>It is the most heavily regulated sector. (A)</p> Signup and view all the answers

How did the Dodd-Frank Act primarily affect the operations of credit rating agencies?

<p>By subjecting them to federal regulation (C)</p> Signup and view all the answers

Flashcards

Financial Services Fraud

Illegal activity (theft, deception, or both) targeting financial institutions.

Fraud Myths

Common misconceptions about fraud, for example, that fraud is rare or easily preventable.

20-60-20 Rule

Describes the distribution of individuals in terms of fraud susceptibility: 20% will never commit fraud; 60% are likely to commit if opportunity presents itself; and 20% are inherently dishonest.

Insider Fraud Threats

Fraud committed by employees or managers within a financial institution.

Signup and view all the flashcards

Management Level Fraud

Insider fraud committed by managers, often resulting in greater financial loss compared to employee-level fraud, but less frequent.

Signup and view all the flashcards

Fraud Triangle

A model explaining employee fraud, highlighting the three factors of opportunity, financial pressure, and rationalization.

Signup and view all the flashcards

Opportunity in Fraud

Part of the Fraud Triangle, favorable conditions that allow for fraudulent activities.

Signup and view all the flashcards

Financial Pressure (Fraud Triangle)

A cause of fraud, stemming from employee's financial strain. This is a part of the Fraud Triangle.

Signup and view all the flashcards

Expense-Based Fraud (Meals)

Submitting false receipts for expenses under the threshold (e.g., under $25 for meals) to claim fraudulent amounts.

Signup and view all the flashcards

Out-of-Policy Expense Claiming

Claiming expenses not allowed by the company policy (e.g., personal expenses disguised as business-related costs).

Signup and view all the flashcards

P-Card Fraud

Legitimate cardholders using company cards for personal expenses and misrepresenting them as legitimate business purchases.

Signup and view all the flashcards

Payments Fraud (General)

Fraudulent processing of payment transactions, often involving forged checks or stolen credit card details, executed by someone external to a legitimate cardholder.

Signup and view all the flashcards

Forged Check

A check signed by someone other than the legitimate authorized signer without their consent.

Signup and view all the flashcards

Check Interception & Forgery

Stealing checks made payable to a legitimate party and altering the payee information to oneself or a different party.

Signup and view all the flashcards

Electronic Payee Alteration

Internal fraud where an insider in accounts payable changes vendor information within the payment system, to a look-alike company, often just for a short-time.

Signup and view all the flashcards

Check Alteration (Numbers)

Changing the numerical amount written on a check by modifying the amount.

Signup and view all the flashcards

Check Kiting

Fraudulent activity involving depositing a legitimate check, writing a bad check for more, and depositing it in a second bank account, to withdraw money before the bad check bounces.

Signup and view all the flashcards

New Account Fraud

Fraudulent activity targeting accounts newly opened within 90 days, often opened solely for fraud.

Signup and view all the flashcards

Money Laundering

Process of making illegally obtained money appear legitimate by putting it into the banking system and using it for transactions to hide origins.

Signup and view all the flashcards

Money Laundering Placement

First stage of money laundering, where cash is physically given to legitimate businesses (like banks or casinos).

Signup and view all the flashcards

Money Laundering Layering

Second stage of money laundering, where ill-gotten cash is converted into different forms and moved through numerous transactions to obscure its origins (e.g., stock purchases, real estate).

Signup and view all the flashcards

Money Laundering Integration

Third stage of money laundering, where laundered cash is incorporated into seemingly legitimate financial activities (e.g., real estate, luxury goods).

Signup and view all the flashcards

Bank Secrecy Act (BSA)

First anti-money-laundering law to establish reporting and record-keeping requirements for financial institutions to track cash and monetary instruments.

Signup and view all the flashcards

USA Patriot Act

Law signed after the 9/11 attacks, aimed at deterring terrorism and increasing the government's ability to track financial transactions.

Signup and view all the flashcards

AML Compliance

A set of rules and procedures financial institutions must follow to prevent money laundering and terrorist financing.

Signup and view all the flashcards

CTR (Currency Transaction Report)

A report filed with FinCEN when a financial transaction involving cash exceeds $10,000.

Signup and view all the flashcards

Construction Fraud

Crimes committed during construction projects, often involving inflated costs, fake bids, or misappropriated funds.

Signup and view all the flashcards

Mortgage Fraud for Property

Fraud committed by borrowers who falsify loan documents to obtain a mortgage they wouldn't normally qualify for.

Signup and view all the flashcards

Mortgage Fraud for Profit

Fraud committed by professionals like brokers or appraisers, who manipulate loan documents for financial gain.

Signup and view all the flashcards

Social Engineering

A psychological tactic used to manipulate people into giving up confidential information or taking actions that benefit the fraudster.

Signup and view all the flashcards

Phishing

A form of social engineering using emails or websites to deceive victims into giving up their personal details.

Signup and view all the flashcards

Bid-rigging Schemes

Fraudulent arrangements where contractors secretly agree on prices before bidding, ensuring one gets the contract.

Signup and view all the flashcards

Fraud Risk Assessment

A process to identify, analyze, and manage potential fraud risks within an organization.

Signup and view all the flashcards

Likelihood of Fraud

The probability that a specific type of fraud will occur, considering factors like past incidents and industry trends.

Signup and view all the flashcards

Materiality of Risk

The potential financial impact of fraud on stakeholders like shareholders or lenders.

Signup and view all the flashcards

Risk Levels

Categorizations of fraud risks based on their likelihood of occurrence.

Signup and view all the flashcards

More Than Inconsequential Risk

A fraud risk with a significant potential financial impact that requires investigation and evidence gathering.

Signup and view all the flashcards

Assessing Controls Against Fraud

Evaluating existing controls to determine their effectiveness in preventing specific fraud scenarios.

Signup and view all the flashcards

Control Design and Effectiveness

The design and effectiveness of controls in minimizing the likelihood of fraud occurring and control failures.

Signup and view all the flashcards

Fraud Risk Mitigation

Measures taken to reduce or eliminate the likelihood or impact of fraud risks.

Signup and view all the flashcards

Dodd-Frank & Insurance

The Dodd-Frank Act created the Federal Insurance Office (FIO) to identify insurance companies that pose systemic risks, like AIG during the 2008 financial crisis.

Signup and view all the flashcards

Credit Rating Agencies & Dodd-Frank

Dodd-Frank established the Office of Credit Rating at the SEC to regulate agencies like Moody's and Standard & Poor's, which were criticized for inflating ratings during the 2008 crisis.

Signup and view all the flashcards

Consumer Protection in Dodd-Frank

The Consumer Financial Protection Bureau (CFPB), created by Dodd-Frank, protects consumers from unfair practices by banks and lenders.

Signup and view all the flashcards

Dodd-Frank Whistleblower Provision

This provision encourages individuals with information about securities law violations to report them to the government for financial rewards, combating corruption and insider trading.

Signup and view all the flashcards

How does Dodd-Frank affect derivatives?

Dodd-Frank created a public clearinghouse, similar to the stock exchange, for derivatives trades to increase transparency and oversight.

Signup and view all the flashcards

What is the FIO's role?

The Federal Insurance Office (FIO) under the Treasury Department aims to identify and manage systemic risks posed by insurance companies.

Signup and view all the flashcards

What is the Office of Credit Rating's purpose?

The Office of Credit Rating, part of the SEC, aims to regulate credit rating agencies, ensuring accurate and unbiased assessments of investment risk.

Signup and view all the flashcards

How does the CFPB protect consumers?

The Consumer Financial Protection Bureau (CFPB) protects consumers from unfair and deceptive practices by banks and other lenders, ensuring fair treatment in financial transactions.

Signup and view all the flashcards

Study Notes

CFCI Study Guide - Updated with Certified Solutions

  • This document is a 51-page study guide for the Certified Financial Services Institute (CFCI) certification.
  • It covers financial management topics.
  • The guide is updated with certified solutions.
  • It was shared on docsity.com.

Fraud

  • Fraud is any illegal act characterized by deceit, concealment, or violation of trust, done to obtain money, property, or services or to avoid payment.
  • Main Types of Fraud:
    • Internal Fraud: Criminal activities within an organization, typically by an employee against the employer.
    • External Fraud: Deceptive conduct by non-employees to deprive the organization of value for financial gain.
  • Examples of Fraud:
    • Larceny: The taking of another's property with intent to keep it.
    • Financial Fraud: "Cooking the books," falsely representing a company's financial condition to inflate stock value or boost bonuses.
    • Skimming (cash larceny): Stealing cash before it enters the accounting system.
    • Billing Schemes: Using false documents to get payment for non-existent services or purchases.
    • Check Tampering: Using blank checks to create counterfeit or computer-generated checks.
    • Employee reimbursement scheme: Making false claims for reimbursement.
    • Corruption: Bribery, extortion, and illegal gratuities.
    • Kickback Schemes: Employees and vendors inflate invoices in return for a portion of the inflated cost.
    • Credit Card Fraud: Creating, selling, or using stolen credit/debit cards.
    • Identity Theft/Fraud: Unauthorized use of another person's information for illegal financial gain.
    • Wildcat Banking: Banks issuing notes without sufficient security.

Additional Topics

  • Savings and Loan Crisis: The failure of many savings and loan institutions due to risky policies.
  • Myths about Fraud:
    • Myth 1: "We have very little fraud here"
    • Myth 2: "Ethics and training compliance has us covered"
    • Myth 3: "Fraud is an unavoidable cost of doing business".
  • Fraud Triangle: The three factors contributing to fraudulent activity: opportunity, financial pressure, and rationalization.
  • Fraud Diamond: This expanded approach adds greed as a core motivator.
  • Types of Mortgage Fraud: Application fraud, tax returns, appraisals, verification of deposits, employment verification, escrow/closing documents, and credit documents.
  • Soft/Hard indicators of fraud:
    • Soft indicators are intangible behavioral signs a person might exhibit (emotional changes, stress, etc.)
    • Hard indicators are tangible (for example, numbers such as sales figures).
  • Segregation of Duties (SoD): Separating job functions to prevent one person from committing fraud.
  • Delegation of Authority (DoA): Clearly defined levels and limits of authority within an organization.
  • Employee Level Embezzlement: Looting customer accounts, control weakness exploitation, looting with false records, dormant account fraud, fictitious deposits, and theft of consignment items.
  • Collusion with Vendors: Pre-solicitation, solicitation, and submission stages. Pre-solicitation is when dishonest people receive bribes to recognize the need for the specific vendor or their services. During solicitation, vendors can pay corrupt employees to write contract specifications that favor the contract vendor. During submission, vendors are given the details of already-submitted bids. Bid-pooling is another issue, whereby bidders conspire to split contracts to ensure that they get some of the work done without extensive collusion.
  • Fraudulent Fee Reversal.
  • Theft/Forgery of Stolen/Blank Checks.
  • Check Interception and Forgery of Endorsement.
  • Electronic Payee Alteration.
  • Types of Payroll Fraud:
    • Creation of ghost employees
    • Altering hourly rate
    • Altering employee status, etc.
  • Fraudulent Reporting regarding Loans & Financial Reporting:
    • Loans to Phantom Borrowers
    • Loan Lapping
    • Nominee or Straw Borrowers
    • Kickbacks
    • Reciprocal Loans
    • Linked Financing
    • Asset-based or working capital loan fraud.
    • External Mortgage Fraud
  • Mortgage Fraud Modus Operandi
  • Builder Bailout Scheme
  • Equity Skimming
  • Identity fraud to obtain mortgage
  • Overstating Appraisal Values etc.
  • Social Engineering.
  • Phishing Scams.
  • Business Email Compromise (BEC)
  • Credit Card Fraud.
  • Carding.
  • EMV chip technology.
  • Forged On-us Checks.
  • Cashier's Check Fraud.
  • Check Kiting.
  • New Account Fraud
  • Money Laundering

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

CFCI Study Guide PDF
Use Quizgecko on...
Browser
Browser