Fraud Risks and Prevention Quiz

Fraud Risks and Prevention Quiz

12th Grade

30 Qs

quiz-placeholder

Similar activities

Chapter 4: Preparing Correspondence TEST

Chapter 4: Preparing Correspondence TEST

9th - 12th Grade

25 Qs

Bricklaying and Concreting Class test

Bricklaying and Concreting Class test

10th Grade - Professional Development

25 Qs

Resume Building

Resume Building

KG - University

25 Qs

Lesson 3 Financial Accounting

Lesson 3 Financial Accounting

9th - 12th Grade

25 Qs

MINI TRYOU MASUK.STAN #2

MINI TRYOU MASUK.STAN #2

10th Grade - University

25 Qs

Navigate College Readiness review

Navigate College Readiness review

10th - 12th Grade

25 Qs

5.01 & 5.02 Review

5.01 & 5.02 Review

9th - 12th Grade

33 Qs

AHA Heartsaver 1st Aid, CPR and AED

AHA Heartsaver 1st Aid, CPR and AED

9th - 12th Grade

33 Qs

Fraud Risks and Prevention Quiz

Fraud Risks and Prevention Quiz

Assessment

Quiz

Professional Development

12th Grade

Medium

Created by

MUJIB MUNDEWADI

Used 8+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a category of operational risk?

Internal fraud

Market risk

Damage to physical assets

Execution, delivery, and process management

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Fraud Triangle consist of?

Opportunity, Impact, Recovery

Opportunity, Pressure, Rationalization

Rationalization, Impact, Recovery

Pressure, Recovery, Prevention

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of internal fraud?

Phishing attacks

Insider trading

SIM cloning

Malware attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of the Probability-Impact Matrix?

To assess fraud mechanisms

To analyze risk severity

To identify vulnerabilities in IT systems

To measure customer satisfaction

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of digital banking fraud involves using fraudulent voice calls to extract sensitive information?

Vishing

Phishing

Malware attacks

SIM cloning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key characteristic of money mule operations?

They use cloned SIM cards to conduct fraud.

They involve third parties to launder illicit funds.

They exploit unverified links for fraud.

They use advanced AI for phishing.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of multi-factor authentication (MFA)?

Password only

Fingerprint and password

Username and CAPTCHA

Email ID and password

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?