FAFD Questions
FAFD Questions
3) When the auditor tests the documents by keeping them side by side then it is
known as
a. Test of impossibility
b. Test of absurdity
c. Juxtaposition test
d. None of the above
6) A type of fraud where forged emails, forged websites are used to defraud the
user are known as
a. E frauds
b. Forgery
c. Phishing
d. None of the above.
7) _________ happens when the fraudster avails multiple loans for the same
property simultaneously for a total amount in excess of the actual value of the
property.
a. Phishing
b. Window dressing
c. Shot gunning
d. Skimming
12) A case where an employee doesn't take travel advance but always pays from
his pocket is a
a. Red flag
b. Green flag
c. Amber flag
d. White flag
13) Analysing non verbal cues is important for a forensic auditor while
a. Interviewing a suspect
b. Interrogating a suspect
c. a & b both
d. None of the above
14) A model categorizing known frauds which lists about 49 different individual
fraud schemes grouped by categories and sub categories is known as
a. Fraud triangle
b. Fraud square
c. Fraud model
d. Fraud tree
15) When the fraudster is able to give a personal justification of dishonest actions,
it is known as
a. Pressure
b. opportunity
c. rationalization
d. All of the above
17) Fraudsters may alter cheques to change the name or the amount on the face of
cheques. This is called
a. Phishing
b. Forgery
c. Disbursement fraud
d. Skimming
18) Ratio analysis is one of the key aspects which a forensic auditor has to look
at.
a. Correct
b. Incorrect
23) Theftof an employer’s property which was not entrusted to employee will be
defined as:
a. Lapping
b. Larceny
c. Check Kitting
d. None of the above
24) Weakness in internal control environment will lead which kind of fraud-
a. Employee Red Flag
b. Management Red Flag
c. General Red Flag
d. None of above
28) Which among the following are the three payroll fraud schemes
a. Ghost employees
b. Falsifying wages
c. Falsifying commission
d. All of the above
29) Stealing money from one customer’s account and crediting it into another
customer’s account is known as:
a. Larceny
b. Skimming
c. Lapping
d. None of the above
35) The process by which several bidders conspire to split contracts up and ensure
each gets a certain amount of work is called
a. Bid pooling
b. Fictitious suppliers
c. Kickback payments
d. Bidding agreements
39) White collar crimes are the ones which damage the organisation:
a. Many times
b. Many times & in huge amounts
c. Less times
d. Less times but in huge amounts
42) Management & directors, relationship with others, organization & industry,
financial results & operating characteristics are components of:
a. Fraud Tree
b. Fraud Exposure Rectangle
c. Fraud Triangle
d. None of the above
43) Relationship of the management with auditors, bankers, lawyers, regulatory
authorities etc is to be checked while analyzing
a. Management & Directors
b. Relationship with Others
c. Organisation & Industry
d. Financial Results & Operating Characteristics
45) Introduction, rapport, questioning, summary & close are elements of:
a. Interview
b. Investigation
c. Interrogation
d. None of the above
47) Allof the following are methods that organization can adopt to proactively
eliminate fraud opportunities EXCEPT:
a. Accurately identifying sources and measuring risks
b. Implementing appropriate preventative and detective controls
c. Creating widespread monitoring by employees
d. Eliminating protections for whistle blowers
50) If
a company wishes to improve detection methods, they should do all of the
following except:
a. Use forensic accountants
b. Conduct frequent audits
c. Conduct surprise checks
d. All of the above improve detection of fraud
54) Whenindividually any financial items/ transactions are not much relevant,
however if used wisely together to commit a fraud, it is known as:
a. Combined fraud
b. Gunpowder effect
c. Lapping
d. None of the above
57) Orphan funds, excess knowledge, close nexus with vendors etc are:
a. Red flags at macro level
b. Red flags at micro level
c. Green flags at macro level
d. Green flags at micro level
60) Atype of question wherein the Interviewer provides an answer within the
question is know as:
a. Open ended
b. Closed ended
c. Leading
d. All of the above
63) In cases where the interviewee in constantly denying the charges against him,
a. Detain him in a room
b. Present partial evidences
c. Make a direct accusation
d. None of the above.
66) The most cost effective way to minimize the cost of fraud is:
a. Prevention
b. Detection
c. Investigation
d. Prosecution
69) An employee not taking a single holiday during the entire year is
a. Red flag at macro level
a. Red flag at micro level
b. Green flag
c. None of the above
76) Reporting
of identified frauds is covered as per
a. SA 240
b. Sec 143(12) of Companies Act 2013
c. CARO, Clause x
d. All of the above.
78) As per the study of ACFE, following category of individuals commit highest
frauds (in monetary terms)
a. Low level management
b. Mid level management
c. Senior level management
d. All of the above
83) White collar crimes are the ones which damage the organisation:
a. Many times
b. Many times & in huge amounts
c. Less times
d. Less times but in huge amounts
84) Areas which are difficult to corroborate is perceived as _____________ by a
fraudster
a. Pressure
b. Opportunity
c. Rationalisation
d. Threat
87) Among the following which would be red flags for payroll?
e. Overtime charged during a slack period
f. Large number of write offs
g. Unjustified transactions
h. All of the above
88) The most cost effective way to minimize the cost of fraud is:
e. Prevention
f. Detection
g. Investigation
h. Prosecution
92) Atype of question wherein the Interviewer provides an answer within the
question is know as:
a. Open ended
b. Closed ended
c. Leading
d. All of the above
97) When individually any financial items/ transactions are not much relevant,
however if used wisely together to commit a fraud, it is known as:
a. Combined fraud
b. Gunpowder effect
c. Lapping
d. None of the above
1. Which of the file systems for Microsoft system provides the most
security?
a. NTFS
b. FAT
c. FAT32
d. FAT16
10.The unique 48-bit serial number assigned to each network interface card,
providing a physical address to the host machine is called:
a. MAC
b. NAC
c. IAC
d. HAC
12.An attack that overloads a system’s resources, either making the system
unusable or significantly slowing it down, is called:
a. Denial-of-service attack
b. Network Denial attack
c. Resource Denial attack
d. Server down attacks
20.As per global study, most cyber-attacks on corporates are performed by:
a. Outsiders
b. Insiders
c. Vendors
d. Unknown Hackers
24.The process of changing the caller ID to any number other than the
calling number is called:
a. Caller ID Tagging
b. Caller ID Changing
c. Caller ID Spoofing
d. Caller ID Rigging
25.A specific type of phishing attack that appears to come from a trusted
source is also known as:
a. Target Phishing
b. Spear Phishing
c. Knife Phishing
d. Sword Phishing
26.A general term for any encrypted overlay network that you can only
access with specific types of software, or authorization, or protocols, or
ports, is called:
a. Underground
b. Darkweb
c. Unknown Web
d. HardWeb
27.A system that is attractive to an attacker and serves no other purpose than
to keep attackers out of critical systems and observe their attack methods,
is known as:
a. Honeypot
b. Honeytoken
c. Sandbox
d. Sandtrap
28.An Internet protocol designed for accessing e-mail on a mail server is:
a. POP
b. ICMP
c. IMAP
d. TCP
29.An Internet protocol used to retrieve e-mail from a mail server is:
a. POP
b. ICMP
c. IMAP
d. TCP
36.What kind of hacker gains access to systems with a view to fix the
identified weaknesses?
a. Black hat hacker
b. Purple hat hacker
c. White hat hacker
d. Grey hat hacker
37.What kind of program allows the attacker to control the user's computer
from a remote location?
a. Virus
b. Trojan Horse
c. Malware
d. Keylogger
38.What is the art of exploiting the human elements to gain access to un-
authorized resources?
a. Ethical Hacking
b. Social Engineering
c. Caller ID Spoofing
d. Reverse Engineering
44.What can be used to intercept packages as they are transmitted over the
network?
a. MAC flooding
b. Active Sniffing
c. Passive Sniffing
d. Network Sniffing
49.This authentication process allows a user to enter one name and password
to access multiple applications.
a. RADIUS
b. security ID
c. SSO
d. user profile
51.What type of encryption uses a different key to encrypt the message than
it uses to decrypt the message?
a. private key
b. asymmetric
c. symmetric
d. secure
59.A system for locating phones by determining its distance from 3 different
towers.
a. Arson Can
b. Cell site
c. Dead spots
d. Triangulation
62.Which password recovery method uses every possible letter, number, and
character found on a keyboard?
a. rainbow table
b. dictionary attack
c. hybrid attack
d. brute-force attack
63.Validate your tools and verify your evidence with ____ to ensure its
integrity.
a. hashing algorithms
b. watermarks
c. steganography
d. digital certificates
64.E-mail administrators may make use of ???, which overwrites a log file
when it reaches a specified size or at the end of a specified time frame
a. log recycling
b. circular logging
c. log purging
d. log cycling
65.The ___ tool is an updated version of BackTrack, and contains more than
300 tools, such as password crackers, network sniffers, and freeware
forensics tools
a. Kali Linux
b. Ubuntu
c. OSForensics
d. Sleuth Kit
68.One of the most noteworthy e-mail scams was 419, otherwise known as
the?
a. Nigerian Scam
b. Lake Venture Scam
c. Conficker virus
d. Iloveyou Scam
69.What is a search query that can help identify some of the individuals
and/or companies associated with a given domain name, including the
registrant, when the domain was created, etc.
a. Email
b. Google
c. Whois
d. Cookies
79.Which term describes rooms filled with extremely large disk systems that
are typically used by large business data centers?
a. storage room
b. server farm
c. data well
d. storage hub
82.What is the name of the Microsoft solution for whole disk encryption?
a. drivecrypt
b. truecrypt
c. bitlocker
d. FileVault
83.What is the name of the Mac solution for whole disk encryption?
a. drivecrypt
b. truecrypt
c. bitlocker
d. FileVault
84.What virtual machine software supports all Windows and Linux OSs as
well as Macintosh and Solaris, and is provided as shareware?
a. KVM
b. Parallels
c. Microsoft Virtual PC
d. VirtualBox
85.In a ___ attack, the attacker keeps asking your server to establish a
connection, with the intent of overloading a server with established
connections
a. smurf
b. SYN flood
c. spoof
d. ghost
87.A computer network that spans a relatively large geographical area and
consists of two or more interconnected local area network (LAN)?
a. Network Share
b. Wide Area Network (WAN)
c. Local Area Network (LAN)
d. Cloud Network
88."A sender and receiver share a single, common key to encrypt and
decrypt the message" is called?
a. Anti-Forensics
b. Swap Partition
c. Public-Key Encryption
d. Symmetric-Key Encryption
91."A network of personal computers, each of which acts as both client and
server, so that each can exchange files and email directly with every other
computer on the network. "?
a. Peer-to-Peer Network
b. Local Area Network
c. Hypervisor
d. Brute-Force Attack
93.Using a very large magnet to destroy the magnetic data on the disk?
a. Sandboxing
b. Tunneling
c. Degaussing
d. Data Mining
94.This assumes that the password is a dictionary word or some variant of
one. The tool simply does a replacement of the password until it finds the
one that fits?
a. Metadata
b. Brute-Force Attack
c. Network Share
d. Dictionary Attack
96.A computer virus that replicates and spreads itself is also known as?
a. virus
b. worm
c. bot
d. zombie
98.People who would like to be hackers but don't have much technical
expertise?
a. hackitvists
b. rootkit
c. crackers
d. script kiddies
99.The process of keeping track of all upgrades and patches you apply to
your computer's OS and applications is called
a. Configuration Management
b. Hardware Management
c. Software Management
d. Server Management
MCQs on CAAT
1. What is the objective of using CAAT
a. Data Mining
b. Data Analysis
c. Data Analytics
d. Data Wrangling
Answer: C
2. Which functionality is NOT present in CAAT
a. Comparison
b. Statistics
c. Monetary unit
d. Split
Answer: D
3. Which of the following is not the outcome of joining two databases
a. Complete join
b. Partial join using look-up field
c. Selective join using look-up field
d. Merging
Answer: C
23. You are required to pick up random JVs per cost centre within the JV file
so that all cost centres are covered in the review. Which function will assist you
with the same?
a. Stratification - Numeric
b. Stratified Random Sampling - Character
c. Pivot Table
d. Stratified Random Sampling - Numeric
Answer: B
24. How will you capture JVs booked on Saturday/Sundays with an all
numeric narration (non-standard narrations)?
a. Field Statistics
b. Criteria
c. Save As Selected
d. All of the above
Answer: D
25. Which function will you apply in IDEA to look for a sudden drop in the
count of month ending JVs for accruals?
a. Pivot Table
b. Top Records Extraction
c. Control Total
d. Find Next
Answer: A
26. In a data file of Goods and Service Tax (GST) levy and payment how will
you check for product sales within State A but where Inter State GST has been
incorrectly levied and paid
a. Export
b. Print
c. Direct Extraction
d. Field Manipulation
Answer: C
27. In the GST data file, you need to re-compute the Central and State GST
levied and paid on the Invoice value to check whether the application system is
correctly computing the same. How will you perform this in IDEA?
a. Modify Field
b. Append Field
c. Remove Field
d. Hide Field
Answer: B
28. You are presented with the GST data file from the GSTIN portal which
contains GST returns filed by your Vendors over the last year. You need to
reconcile the portal file with your GST data file to identify entries in the portal
file based on Vendor Code and Vendor Invoice Number not in your GST data
file. How will you set about doing this in IDEA?
a. Join
b. Append Database
c. Stratification
d. Systematic Sampling
Answer: A
29. You are required to match the Vendor Code wise total of Inter State GST
levies for the current month from your data with the portal data to identify Vendor
wise mismatches on Inter State GST. Which function in IDEA will assist?
a. Criteria
b. Compare - CORRECT ANSWER
c. Send Email
d. Summarization
Answer: B
30. In your GST data how will you check for the Vendor Invoice number
containing special characters other than numbers and letters in IDEA?
a. Data - Append - use @split
b. Data - Append - use @left
c. Data - Append - use @strip
d. Data - Append - use @age
Answer: C
31. You are required to allocate a single Digital Advertisement Expense bill
for 12 months to various branch locations based on the number of walk in
customers in each branch. You have a file with 275 branches and the total walk
in count (footfall) per branch for 12 months. Which function in IDEA will you
apply for the Expense allocation branch wise
a) Key Value Extraction
b) Append Databases
c) Append Field
d) Gap Detection
Answer: C
32. How will you go about identifying in IDEA specific branches having a
rising footfall but falling Digital Advertisement Expense allocation or vice - versa
a) Trend Analysis
b) Correlation
c) Duplicate Key Exclusion
d) Search
Answer: B
33. How will you identify branches having a total footfall of 100 customers
and below in the entire 12 month’s period and below using IDEA
a) Publish to PDF
b) Create Project
c) Stratification
d) Summarization
Answer: D
34. Which function in IDEA will you apply to identify the 25 branches having
the highest Digital Advertisement Expense allocation
a) Bottom Records Extraction
b) Top Records Extraction
c) Group Records
d) Indexed Extraction
Answer: B
35. To capture manipulation in footfall data for any given branch how will you
identify in IDEA branches having the same footfall for 12 months
a) Duplicate Key Exclusion
b) Import
c) Save As
d) Duplicate Key Detection
Answer: D
36. You have been provided with an online content - TV Serial, Movie
Streaming website data file with the following key fields -
o Customer Number
o Plan Reference
o Date of Visit (DD-MMM-YY Format)
o Time of Visit (HH:MM:SS Format)
o Online Content Duration in Standard Minutes
o Actual State Time of Viewing (HH:MM:SS Format)
o Actual Stop Time of Viewing (HH:MM:SS Format)
o Standard Stop Time of Viewing (HH:MM:SS Format)
o Content Unique Serial Number
o Genre - Comedy, Horror, Action, Family Drama
o Category - Serial, Movie
o IP Number of Streaming Device
o Buffering Speed - Low, Medium, High
A. How will you identify Customers who have stopped watching content before
the Standard End Time for a Serial/Movie owing to Low Buffering Speed
a) Join
b) Export Databases
c) Direct Extraction
d) Save As
Answer: C
B. Which function in IDEA will you apply to identify the top content watching
Customer's based on count of Serial's watched per day
a) Direct Extraction
b) Summarization
c) Top Records Extraction
d) All of the Above
Answer: D
C. How will you report on Customers watching content from multiple devices on
the same date like Tablets, Smart Phones, Laptops etc.
a) Duplicate Key Exclusion
b) Duplicate Key Detection
c) Gap Detection
d) Field Manipulation
Answer: A
D. To identify Customers who use the Streaming site only less than 3 times a
month which Function in IDEA will help
a) Add Comments
b) Summarization
c) Stratification
d) Set Working Folder
Answer: B
F. To report on which Serial and Genre has minimum viewership online per
month how will you use IDEA
a. Summarization
b. Bottom Records Extraction
c. Export Databases
d. All of the Above
Answer: D
5 You want to track the progress of the stock market on a daily basis. Which type of chart should
you use?
a) Pie Chart
b) Bar Chart
c) Line Chart
d) Column Chart
6 Except for the ……………………. function, a formula with a logical function shows the word “TRUE” or
“FALSE” as a result.
a) IF
b) AND
c) OR
d) NOT
7 Which function will calculate the number of workdays between 6/9/2017 and 8/12/2018?
a) Workday
b) Date
c) Networkdays
d) All of the above
11 Which of the following functions is totally irrelevant for performing aging analysis?
a) IF Function
b) AND Function
c) TODAY Function
d) LEFT Function
12 In order to prevent identity thieves from finding personally identifiable information by looking
through your trash, you should:
a) Put your sensitive documents in your neighbors trash bin.
b) Shred, or otherwise destroy all account statements, account applications, cancelled checks or
other documents or information that contain personally identifiable information.
c) Never throw out any sensitive information. Keep it in a safe place within your home.
d) Take your sensitive information directly to the dump.
14 Which of the following are not recommended security practices when setting up a wireless
network in your home?
a) Place your router in a secure location in your home.
b) Change the name of your router from the default.
c) Change your router's pre-set password.
d) Turn on the encryption feature of your wireless routers.
16 Which of the following is a characteristic that asset hiders generally look for in the financial vehicles
they use to conceal assets?
a) Transparency
b) Inaccessibility
c) Liquidity
d) None of the above
17 Which of the following is a step in the general process for tracing illicit transactions?
a) Selecting a response team
b) Building a financial profile
c) Implementing litigation hold procedures
d) Establishing reporting protocols
18 When determining a subject's net worth for asset-tracing purposes, all assets should be valued at
current market value to eliminate any question about estimates.
a) True
b) False
19 Sachin is currently being prosecuted for financial statement fraud for allegedly intentionally over-
reporting earnings. Although Sachin did over-report income, he did not do so on purpose. Under
these facts, which of the following defenses, if any, would likely benefit Sachin as a defense?
a) Mistake
b) Ignorance
c) Duress
d) All of the above
20 Akbar works as a cashier in an antiques store. Since the merchandise lacks barcodes, he has to
enter the prices manually. One customer purchased a piece of furniture that cost Rs. 2500 and
paid in cash. Akbar recorded the sale at Rs. 2000 and pocketed the Rs. 500 bill. What type of fraud
did Akbar commit?
a) A cash larceny scheme
b) Lapping of receivables
c) An unrecorded sales (skimming) scheme
d) An understated sales (skimming) scheme
21 Amar, a fraud examiner, is conducting textual analytics on emails sent to and from specific
employees that his client has identified as fraud suspects. He is using the Fraud Triangle to come
up with a list of fraud keywords to use in his search. Which of the following words found in email
text might indicate a fraudster is rationalizing his actions?
a) Write off
b) Deserve
c) Override
d) Quota
22 If an information thief has long range interest in monitoring of a company, he might place a spy in
that target company as a permanent employee. This employee is known as ………………….
a) Sleeper
b) Mole
c) Detective
d) Insider Spies
24 In Health Care Fraud, ………………………….. reimbursement occurs when providers receive payment
for each service rendered.
a) Capitation
b) Fee for Service
c) Episode of Care
d) None of the above
25 Which of the following are the best for a comprehensive investigation …………………
a) Data vouching, trend analysis
b) Trend analysis and tests of logic and absurdities
c) Data vouching and tests of impossibilities
d) All of the above to the extent possible in every case
29 Which situation will not give rise to sanctions for failing to preservce evidence include intentionally
or accidentally?
a) Erasing computer file relevant to unanticiapated litigation
b) Destroying physical evidence relevant to existing litigation
c) Losing documents relevant to anticipated litigation
d) Failing to suspend routine destruction of electronic data relevant to existing litigation
31 To establish libility for public disclosure of private facts, the plaintiff must prove following
elements:
(i) The defendant made public statements about another party's private life.
(ii) The statements were not of public concern.
(iii) The statements would be highly offensive to a reasonable person.
a) (i) only
b) (i) and (ii) only
c) All of the above
d) None of the above
32 ……………………… software gives investigators the ability to image a drive and preserve it in a forensic
manner.
a) Stego Suite
b) Forensic Toolkit (FTK)
c) Recovery Toolkit
d) Encase Forensic
36 ………………………. is the impression a writing instrument leaves on sheets of paper below the sheet
that contains the original writing.
a) Indented Writing
b) Freehand Forgeries
c) Autoforgeries
d) Imitator style
37 To avoid smudging and contamination, fraud examiners should use …………………… when handling
latent finger print evidence.
a) Protective Gloves
b) Acid free paper envelopes
c) Dusting powder
d) None of the above
38 While interviewing, Amar, forensic auditor, locks the door of interview room. This can be claimed
as ……………………………. by the interviewee.
a) Human Right Violation
b) Actual Imprisonment
c) False Imprisonment
d) True Imprisonment
39 While doing interview, Amar, forensic auditor, was doing covert recording of interview process. It
helps Amar to deny the recording when asked without taking ownership of recording.
a) True
b) False
40 ……………………… is a defence mechanism that protects an individual from items that would cause
anxiety by prevneting the items from becoming concious.
a) Etiquette
Ego Threat
c) Depression
d) Repression
41 Amar, a Certified Fraud Examiner, has obtained an oral confession from Vijay, a fraud suspect.
Amar wants to probe Vijay for additional details. Which of the following is the most appropriate
question Amar should ask Vijay to find out if there are any remaining proceeds that can be used
to reduce losses?
a) "Did you spend everything?"
b) "What do you have left?"
c) "Is there anything left?"
d) "It’s all gone, isn’t it?"
43 In interview situations, it is sometimes recommended that the interviewer shake hands with the
respondent. What is the purpose of this?
a) Social courtesy
b) Professional courtesy
c) To establish the interview purpose
d) To break down psychological barriers
44 Forensic analysis can be performed directly on suspect devices because doing will not alter or
damage digital evidence.
a) True
b) False
a) Genuine need
b) Extrinsic rewards
c) Altruism
d) Depersonalizing the victim
47 Vijay, a fraud suspect, has confessed to Amar, a Fraud Examiner, that he has embezzled funds.
Amar is unsure whether Vijay had an accomplice. Which of the following is the most appropriate
question concerning accomplices?
a) "Who else knew about this besides you?"
b) "Was anyone else involved?"
c) "Did someone else know?"
d) "We have evidence someone else is involved. Who is it?"
48 Which of the following is a good practice for taking notes during an interview?
a) Slow down the interview process if necessary to take accurate notes.
b) Avoid making notes regarding opinions or impressions about a witness
c) Write down verbatim all responses given by the subject during the interview.
d) Make any necessary additions to interview notes within several weeks of the interview
49 During the introductory phase of the interview, the interviewer should avoid terms such as:
a) Investigation
b) Review
c) Inquiry
d) All of the above
50 Whenever possible, make a list of questions to be asked during the interview. It helps in maintaing
the flow of interview.
a) True
b) False
51 if the interviewer has reason to believe that the respondent is being deceptive, he should begin
asking ………………………..
a) Direct Questions
b) Closing Questions
c) Admission seeking Questions
d) Assessment Questions
54 We use Cryptography term to transforming messages to make them secure and immune to
……………………..
a) Change
b) Idle
c) Attacks
d) Defend
56 In a ____________ scheme, the fraudster leave malware infected USB flash drive in places where
people will find them easily.
a) Baiting
b) Pharming
c) Malware
d) Malicious Insider
60 Social engineering is one of the most successful attack methods of cybercriminals. What is
regarded as a form of social engineering?
a) Cryptoware
b) Denial of Service (DOS) attack
c) Phishing
d) Spam
61 Biometrics become ever more important as a means to verify the identity of users. Which feature
of biometrics represents a major consideration for organizations that want to implement it?
a) The so-called crossover error rate, which is the rate at which both acceptance and rejection
errors are equal.
b) The way users swipe their tablet or smartphone can be used as a behavioral mechanism for
biometrics.
c) The so-called crossover error rate, which is the rate at which both acceptance and rejection
errors are within acceptable levels.
d) Face recognition cannot be used as a biometric mechanism, because it is very inaccurate.
62 Digital certificates represent an important component in any Public Key Infrastructure (PKI). What
should never be included in a digital certificate?
a) The digital signature of the certificate authority (CA) that has issued the digital certificate.
b) The private key of the party to whom the digital certificate is tied.
c) The identity of the party that owns the digital certificate.
d) The start and end date of the period, in which the digital certificate is valid.
67 Having individuals provide personal information to obtain a free offer provided through the
Internet is considered what type of social engineering?
a) User-based
b) Computer-based
c) Human-based
d) Web-based
68 SQL injection is an attack in which …………………… code is inserted into strings that are later passed
to an instance of SQL Server.
a) Non malicious
b) Clean
c) Redundant
d) Malicious
76 As a good forensic practice, why would it be a good idea to wipe a forensic drive before using it?
a) No need to wipe
b) Chain of Custody
c) Different file and operating systems
d) Cross-contamination
80 When a hash function is used to provide message authentication, the hash function value is
referred to as ………………………
a) Message Field
b) Message Digest
c) Message Score
d) Message Leap
81 The main difference in MACs and digital signatures is that, in digital signatures, the hash value of
the message is encrypted with a user’s public key.
a) True
b) False
82 In which the database can be restored up to the last consistent state after the system failure?
a) Backup
b) Recovery
c) Both
d) None
83 Most backup and recovery commands in ………………….. are executed by server sessions.
a) Backup Manager
b) Recovery Manager
c) Backup and Recovery Manager
d) Database Manager
86 ………………………. means repeated acts of harassment or threatening behavior of the cyber criminal
towards the victim by using internet services.
a) Cyber Stalking
b) Pornography
c) Web Hijacking
d) Hacking
87 …………………….. register domain name identical to popular service provider’s name. So as to attract
their users and get benefit from them.
a) Cyber squatters
b) Phishing Attack
c) Identity Theft
d) Cyber Defamation
89 As per ………………….., the auditor’s report should state whether the company has adequate Internal
Financial Control system in place and the operating effectiveness of such controls.
a) Section 134
b) Section 137
c) Section 143
d) Section 177
96 Entries in the books of accounts regularly kept in the course of business are admissible under
section 34 of Evidence Act
a) If they by themselves create a liability
b) If they by themselves do not create a liability
c) Irrespective of whether they themselves create a liability or not
d) Either (a) or (b)
97 Amar, a Forensic Auditor, has obtained an oral confession from Vijay, a fraud suspect. Vijay
confessed to committing fraud, and he admitted to smuggling drugs in an unrelated case. How
should Amar handle these admissions in Gamma's written confession?
a) Amar should omit the information concerning the drug smuggling
b) Amar should take separate statements for each of the unrelated crimes
c) Amar should include both crimes in the same statement
d) None of the above
98 Amar, a Fraud Investigator, is investigating Vijay, who is active on an online social networking site
in which he voluntarily shares information about himself. Amar wants to search and extract
information from Vijay's social network profile. Which of the following is the most accurate
statement about the privacy of information Vijay shared through his social network profile?
a) To search for information that Vijay posted and made available to the public through his social
network profile, Amar must provide Vijay notice before hand.
b) To access any information posted on Vijay's social network profile, Amar must obtain some type
of legal order from the jurisdiction in which Vijay resides.
c) The Privacy of Social Networks Treaty is an international law that makes it illegal for Amar to
seek the login credentials from Vijay's social networking account.
d) Amar could be liable for violating Vijay's privacy rights if he hacks or breaks into areas of the
social networking site Vijay has designated as private
100 In most common law jurisdictions, for a document to be admitted into evidence, it must be
properly __________ that is, the party offering the document must produce some evidence to
show it is, in fact, what the party says it is.
a) Validated
b) Marked
c) Certified
d) Authenticated
1. The warehouse supervisor in ABC Ltd. has stolen ₹ 5 lakhs worth of inventory
over the last year. He has made no effect to conceal his theft in any of the inventory
records. During as analytical review of the financial statements, which of the
following red flag might the auditor find that would indicate the inventory theft?
a) The percentage change in cost of goods sold was significantly higher than the
percentage change in sales.
b) The percentage change in sales was significantly higher than the percentage
change in cost of goods sold.
c) Sales and cost of goods sold moved together.
d) None of the above.
2. When circumstantial evidence is offered to prove that a subject has more income
available than can be accounted for from legitimate sources, the subject often
responds with which of the following defences?
4. SQL injection is an attack in which …………… code is inserted into strings that
are later passed to an instance of SQL Server.
a) Non malicious
b) Clean
c) Redundant
d) Malicious
6. Which of the following is a method in which contractors can inflate labour costs
in negotiated contracts?
7. Which of the following is the most appropriate type of question for fraud
examiners to ask during interviews to confirm facts that are already known?
a) Open
b) Leading
c) Complex
d) Narrative
8. Which of the following activities are included in the bid evaluation and award
phase of procurement involving open and free competition?
9. In MS-Excel, what is the correct way to refer the cell C5 on Worksheet named
"Report" from Worksheet named "Sales Data"?
a) =[Sales Data]!C5
b) =$C$5
c) ='Sales Data'!C5
d) ="Sales Data"!$C$5
a) Aggregation
b) Data mining
c) Inference
d) Polyinstantiation
11. Bars, restaurants, and nightclubs are favourite businesses through which to
launder funds because:
a) It is easy to match the cost of providing food, liquor, and entertainment with
the revenues they produce.
b) They charge relatively low prices for services.
c) Sales are generally in cash.
d) All of these choices are correct.
a) Text Constant
b) Mixed Reference
c) Circular Reference
d) All of the above
13. In …………… fraud scheme, Procurement official acts above or below normal
scope of duties in awarding or administering contract.
14. Suppose you suspect there is a Ghost Employee scheme taking place in your
organisation and you want to compare the payroll records to the employee master
file. Which data analysis technique would you use to match these two data
records?
a) Compliance verification
b) Correlation analysis
c) Join function
d) Gap Testing
a) SHA
b) MFT
c) HAVAL
d) MD2
16. Common fraud schemes involving ATMs include all of the following Except:
a) Retrieval
b) Double Hustle
c) Advance Fee
d) Scavenger
18. ……………….. can act as a "National Focal Point" for gathering information on
threats and facilitating the Central Government's response to computer based
incidents.
a) Intelligence Bureau
b) CBI
c) CERT-IN
d) Cyber Cell
a) Linguistic Analytics
b) The Fog Index
c) Textual Analytics
d) Benford's Law
20. Amar, a Fraud Investigator, is investigating Vijay, who is active on an online social
networking site in which he voluntarily shares information about himself. Amar
wants to search and extract information from Vijay's social network profile.
Which of the following is the most accurate statement about the privacy of
information Vijay shared through his social network profile?
a) To search for information that Vijay posted and made available to the public
through his social network profile, Amar must provide Vijay notice before
hand.
b) To access any information posted on Vijay's social network profile, Amar
must obtain some type of legal order from the jurisdiction in which Vijay
resides.
c) The Privacy of Social Networks Treaty is an international law that makes it
illegal for Amar to seek the login credentials from Vijay's social networking
account.
d) Amar could be liable for violating Vijay's privacy rights if he hacks or breaks
into areas of the social networking site Vijay has designated as private
21. Which of the following is typically the most effective way to document chain of
custody for a piece of evidence?
a) Steganography
b) Computer Forensics
c) Both ( a & b )
d) None of the above
23. Because Digital evidence is different from tangible evidence, the rules regarding
its admissibility in court are very different from the rules governing the
admissibility of tangible evidence.
a) True
b) False
25. A fraud scheme in which an accountant fails to write down obsolete inventory to
its current fair market value has what effect on the company's current ratio?
26. Which of the following is a legal element that must be shown to prove a claim for
fraudulent misrepresentation of material facts?
27. Mr. Ram has been retained by an attorney to testily as an expert witness at Mr.
Mallya's trial. Coincidentally. Mr. Ram also met Mr. Mallya while attending a
university many years earlier. The attorney is compensating Mr. Ram for his
services. Which of the following statements concerning conflicts of interest is
MOST ACCURATE?
30. Keeping track of the amount of paper generated is one of the biggest challenges in
forensic audit. Which of the following is generally NOT a recommended practice
when organizing evidence?
31. Which of the following statements about how Forensic Auditors should approach
fraud examinations is CORRECT?
32. Mr. Ram, Forensic Auditor, determines that a document that purports to be the
original writing of a famous author created fifty years ago, is actually made from
paper created no more than 2 years ago. Which of the following best describes the
document?
a) An Auto forgery
b) An Anachronism
c) An Indented Writing
d) None of the above
a) Sender
b) Receiver
c) Sender and Receiver both
d) All the connected devices to the network
34. When gathering information for a fraud investigation, virtually all helpful
documentary evidence will come from internal sources.
a) True
b) False
36. Mr. Ram, Forensic Auditor, is conducting an admission seeking interview. Which
of the following strategies should Mr. Ram follow in his attempt to obtain a
confession?
a) Imply that time is of the essence to pressure the subject into confessing.
b) Conduct the interview in a firm, yet compassionate manner.
c) Minimise sympathy and maximise the perception of wrongdoing.
d) Avoid potential liability by making the accusation in the presence of outsiders.
37. Mr. Shyam is on the boards of two companies that compete in the highway
construction industry. Paul does not disclose this conflict, and he does not step
down from the board of either company. If Mr. Shyam's acts are discovered and
he is sued for violating his fiduciary duties, under what theory is the suit most
likely to be filed?
38. Which of the following is an information security goal that an e-commerce system
should strive to provide its users and asset holders?
a) Non repudiation
b) Exactness
c) Access authority
d) System reliability
a) Section 66A
b) Section 66D
c) Section 66E
d) Section 66F
41. As per DOT, using spoofed call service is illegal as per the ………………………
42. From a legal perspective, which rule must be addressed when investigating a
computer crime?
a) TRUE
b) FALSE
a) Norming
b) Rapport
c) Active Listening
d) Calibration
45. Which of the following is a recommended method for organising and presenting
information in a fraud examination report?
a) By the order in which the information was discovered
b) By party
c) Chronologically
d) All of the above
46. What is the advantage of using a tape backup system for forensic acquisitions of
large data sets?
47. During the introductory phase of the interview, the interviewer should avoid terms
such as:
a) Investigation
b) Review
c) Inquiry
d) All of the above
a) Formula Editor
b) Query Editor
c) Equation Editor
d) None of the above
49. …………………….. refers to any statistical process used to analyse data and draw
conclusions from the findings.
a) Data Analysis
b) Data Mining
c) Big Data
d) None of the above
a) Kinetic
b) Chronemic
c) Paralinguistic
d) Proxemic
53. Which of the following is true for the Statistical sampling of data?
a) Complex function
b) Multiple function
c) Nested function
d) Mixed function
a) Brute-Force Scripting
b) Bit locker
c) Hashing Algorithm
d) Binary Sniffing
57. For employee expense reimbursement request, electronic receipts are preferred to
paper receipts because they are more difficult to alter or forge.
a) True
b) False
58. When a caller ID display a phone number different from that of the telephone
from which the call was placed is called ………………………
a) Cellular Fraud
b) Caller ID Phishing
c) Caller ID Spoofing
d) Unethical Hacking
59. While examining a document, a fraud examiner notices some very faint indented
writings that might aid the examination if revealed. Which of the following would
be the forensic auditor's best course of action in analysing these indented writings?
60. During an interview, Mr. Shyam, an employee at ABC Ltd, confesses to Mr. Ram,
Forensic Auditor, that he has been embezzling money from the company. Which
of the following pieces of information does Mr. Ram NOT have to obtain from Mr.
Shyam?
61. ………………… was designed to protect against accidental errors, such as a digit
mistyping.
a) Relative Size Factor
b) Luhn algorithm
c) Benford's Law
d) None of the above
62. In MS-Excel, while splitting Text String in a column with Text to Columns, the
data in original column can be retained.
a) True
b) False
63. What is the health care industry concerned about the potential effect of the
Electronic Data Interchange (EDI) on fraudulent activity?
64. Which of the following statement is True regarding a fictitious refund scheme?
66. Which of the following is a method that investigators can use to detect
steganography?
67. When searching regulatory securities records for information on a publicly traded
company, which of the following information is least likely to be found?
a) Major events that are of interest to investors
b) Identity of the company's officers and directors
c) Identity of major owners of the company
d) The complete books and records of the company
68. Forensic Auditor visited a project site and discovered a road of sub-standard
quality. The road was built 50 percent narrower than specifications and lacked
road surfacing. Nevertheless, the contract was paid in full. It is
…………………………. Type of Fraud.
a) Product substitution
b) Substandard work
c) Deviation from specifications
d) Failure to deliver
a) True
b) False
70. Mr. Ram, Forensic Auditor, conducted an interview of Shyam, the controller of
the ABC Ltd. Mr. Ram asked the following question: "Since you were here when
the controls were developed, can you tell me how they came about?" This kind of
question is called ...........................
a) Complex Question
b) Controlled Answer Technique
c) Double Negative Question
d) Open Question
71. Which of the following is NOT a type of physical access control device that can be
used to control access to physical objects?
a) Biometric systems
b) Profiling software
c) Electronic access cards
d) Locks and keys
72. What part of a cloud implementation provides the virtual servers with access to
resources?
a) Hypervisor
b) Resource monitor
c) Resource auditor
d) Virtual Manager
73. A Forensic Auditor is deciding whether to conduct a traditional or a covert
examination for a suspected fraud. Which of the following factors would be most
favourable to conducting a covert examination?
a) There are sufficient details at the present time to apprehend the suspect.
b) The Forensic Auditor would like to determine who is responsible for known
losses occurring in a certain area.
c) The Forensic Auditor finds it important to collect information in a direct
manner from people possessing it.
d) The Forensic Auditor has several avenues through which he can obtain the
necessary information.
74. Before powering off a computer system, a computer crime investigator should
record contents of the monitor and ……………...
75. Which of the two key functions is included in IDEA to identify exceptions,
irregularities, anomalies and errors?
76. Which of the following types of transactions is most likely to use a Person-to-
person (P2P) payment system?
77. Which of the following statement best describes the function of metasearch
engines such as Sputtr, Dogpile and Mamma?
a) Metasearch engines contain links to websites that are sorted into categories
b) Metasearch engines send user requests to several search engines and aggregate
the results for display
c) Metasearch engines narrow searches to only those search engines that achieve
the best results
d) None of the above
78. Which of the following facts would best support the defence of a law enforcement
officer against an allegation of entrapment?
79. Which of the following evidence collection method is most likely accepted in a court
case?
81. Which of the following refers to investments that are designed to yield a tax benefit
to the investor?
a) Tax shelters
b) Tax havens
c) Secrecy jurisdictions
d) Money laundering havens
a) Benford's Law can only be applied to data sets listed in currency amounts.
b) Benford's Law cannot be applied to data sets with non-natural numbers.
c) Benford's Law only works on data sets with assigned numbers.
d) Benford's Law applies best to data sets with three digit numbers.
83. Mr. Ram, Forensic Auditor, is undertaking a data analysis engagement to identify
potential fraud at ABC Ltd. Which of the following lists the most appropriate
order in which he should conduct the steps involved in the data analysis process?
84. A Forensic Auditor discovers that Mr. Shyam, a fraud suspect, has made dozens
of cash deposits over the last few months into a bank account. None of the deposits
have been Rs. 50,000 or more, and none of them have been below Rs. 45,000,
either. The currency reporting threshold for cash deposits at financial institutions
in the jurisdiction is Rs. 50.000. Based on this information, which of the following
schemes is Mr. Shyam most likely committing?
a) The attacker delivers the solicitation via telephones using Voice over Internet
Protocol instead of email.
b) The attacker delivers the solicitation message via SMS instead of email.
c) The attacker does not have to rely on having the user click on a link in an
email to direct him to malicious website that is imitating a legitimate website.
d) The attacker has to rely on having the user click on a link in an email to direct
him to the malicious website that is imitating a legitimate website.
a) Multipartite
b) Armored
c) Changeling
d) Polymorphic
87. Which of the following functions does a Benford's Law analysis help to achieve?
89. The encoding step of a ………………… system identifies redundant bits and then
replaces a subset of them with data from a secret message.
a) Phishing
b) Steganographic
c) SQL Injection
d) Key Logging
90. Which of the following methods might be used to conceal a sham loan transaction
in which the loan officer receives part of the proceeds (kickback)?
91. Following are part of Planning Phase in Data Analysis Process, except:
a) =IF(A2:D4=3,MAX(A5:A10))
b) =IF(A2>=3,MAX(A5:A10))
c) =IF(A2<=3,MAX(A5:A10))
d) None of the above
93. Which of the following is TRUE concerning the volatility of digital evidence?
a) Even the integrity of digital evidence has been violated through alteration or
destruction, it can be restored easily.
b) The failure to preserve the integrity of digital evidence could result in
evidence being deemed inadmissible in a legal proceeding
c) Digital evidence is less volatile than tangible evidence because data cannot be
altered or destroyed easily than tangible information
d) None of the above
94. Which of the following situation is often present in real estate fraud schemes?
95. Which of the following is one of the objectives on which the international
Organization of Securities Commissions (IOSCO) Objectives and Principles of
Securities Regulation are based?
96. In MS-Excel, which of the following function would you use to compare two text
strings in a database?
a) EXACT
b) MATCH
c) VLOOKUP
d) All of the above
a) Phishing
b) Evading detection
c) URI Hacking
d) SQL Injection
98. Suppose that a forensic auditor is going to testify at trial about an examination
report for a complex case, and the report contains summaries of the key
documents that were created by someone other than the forensic auditor. Which
of the following best describes what the forensic auditor should know about the
documents underlying the summaries?
a) The forensic auditor must have read and analysed every document in the case.
b) The forensic auditor should conduct a complete review of the documents
underlying the summaries.
c) The forensic auditor does not need to review the documents underlying the
summaries.
d) The forensic auditor only needs to review some of the documents underlying
the summaries for quality assurance.
99. In MS-Excel, you can group non-contiguous worksheets with
………………………
100. Which of the following is a type of information that can be obtained from the deep
web?