Fraud Risks and Prevention Quiz

Fraud Risks and Prevention Quiz

12th Grade

30 Qs

quiz-placeholder

Similar activities

PreTest - Character Education

PreTest - Character Education

9th - 12th Grade

30 Qs

Final Exam Review 6

Final Exam Review 6

KG - University

25 Qs

NATIONAL INCOME ACCOUNTING

NATIONAL INCOME ACCOUNTING

12th Grade

35 Qs

Workplace Readiness Pre-Eval: 1

Workplace Readiness Pre-Eval: 1

12th Grade

25 Qs

Your Professional Image

Your Professional Image

11th - 12th Grade

25 Qs

AnToan

AnToan

KG - University

25 Qs

TEMA 1 CDI

TEMA 1 CDI

1st Grade - University

30 Qs

Leadership Test

Leadership Test

9th - 12th Grade

25 Qs

Fraud Risks and Prevention Quiz

Fraud Risks and Prevention Quiz

Assessment

Quiz

Professional Development

12th Grade

Medium

Created by

MUJIB MUNDEWADI

Used 8+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a category of operational risk?

Internal fraud

Market risk

Damage to physical assets

Execution, delivery, and process management

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the Fraud Triangle consist of?

Opportunity, Impact, Recovery

Opportunity, Pressure, Rationalization

Rationalization, Impact, Recovery

Pressure, Recovery, Prevention

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of internal fraud?

Phishing attacks

Insider trading

SIM cloning

Malware attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of the Probability-Impact Matrix?

To assess fraud mechanisms

To analyze risk severity

To identify vulnerabilities in IT systems

To measure customer satisfaction

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of digital banking fraud involves using fraudulent voice calls to extract sensitive information?

Vishing

Phishing

Malware attacks

SIM cloning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key characteristic of money mule operations?

They use cloned SIM cards to conduct fraud.

They involve third parties to launder illicit funds.

They exploit unverified links for fraud.

They use advanced AI for phishing.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of multi-factor authentication (MFA)?

Password only

Fingerprint and password

Username and CAPTCHA

Email ID and password

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?