#1
Which of the following is NOT a common method used in phishing attacks?
#2
What is the term for the practice of sending emails claiming to be from reputable companies to induce individuals to reveal personal information, such as passwords and credit card numbers?
#3
What is the term for the unauthorized access, use, disclosure, or destruction of information?
#4
What is the term for the act of an employee taking cash from a cash register and replacing it with funds from their pocket?
#5
What is the term for the fraudulent practice of sending emails claiming to be from a trustworthy source to trick individuals into revealing sensitive information?
#6
Which of the following is NOT a common method of identity theft?
#7
Which of the following is an example of identity theft?
#8
What is the term used for a fraudulent scheme where returns are paid to early investors using the investments of later investors?
#9
What is the term used to describe a type of fraud where someone pretends to be a legitimate entity to obtain sensitive information?
#10
Which of the following is NOT a red flag that might indicate fraudulent activity?
#11
Which of the following is an example of internal fraud?
#12
Which of the following is NOT a common indicator of potential fraudulent activity?
#13
In a corporate setting, what is a common method of fraud involving financial statements?
#14
Which of the following is a form of financial statement fraud that involves the deliberate overstatement or understatement of revenues, expenses, or assets?
#15
What is the term for the illegal practice of manipulating financial markets, often through spreading false or misleading information?
#16
What is the term for the illegal practice of manipulating financial markets, often through the rapid buying and selling of securities to create artificial activity?
#17
What is the term for the practice of manipulating financial data to present a more favorable picture of a company's financial position?
#18