0% found this document useful (0 votes)
51 views

Banking Regulation Act of India Enacted in The Year

The document discusses various terms related to cybercrimes, financial crimes, and their investigation. It provides definitions and full forms of organizations like NPCI, DEAF, SFIO, ED, CBI. It also discusses types of financial frauds like lapping, data diddling, weaknesses in internal controls that enable fraud, and sections of acts like IPC, CrPC, IEA, and PMLA relevant to investigation of such crimes.

Uploaded by

Rakesh Pandey
Copyright
© © All Rights Reserved
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views

Banking Regulation Act of India Enacted in The Year

The document discusses various terms related to cybercrimes, financial crimes, and their investigation. It provides definitions and full forms of organizations like NPCI, DEAF, SFIO, ED, CBI. It also discusses types of financial frauds like lapping, data diddling, weaknesses in internal controls that enable fraud, and sections of acts like IPC, CrPC, IEA, and PMLA relevant to investigation of such crimes.

Uploaded by

Rakesh Pandey
Copyright
© © All Rights Reserved
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Phishing the term used for

Duplication of Credit Card - the crime named as


Scam 419 is also called
Which one of the following is not an example of peer to peer cyber crime
What is the full form of CVC
What is the full form of ABBF
What is the full form of NPCI
Who has established the "The Depositor Education and Awarness Fund Scheme" or DEAF
Banking Regulation Act of India enacted in the year
Full form of ATM
In banking terms CASA means
Which of the following is a Fraud Investigating agency of India
What is the full form of SFIO
What is the full form of ED
SFIO head quarters situated in
What is the full form of SEBI
What is the full form of NPA
_________ _________ happens when the fraudster avails multiple loans for the same
property simultaneously for a total amount in excess of the actual value of the
property.
A ______ is termed as an indication of a danger or a warning signal
A case where an employee doesn't take travel advance but always pays from his pocket is a
Analysing non verbal cues is important for a forensic auditor while
A model categorizing known frauds which lists about 49 different individual fraud schemes grouped by categories
and sub categories is known as
When the fraudster is able to give a personal justification of dishonest actions, it is known as
Various frauds in banking sector are
Fraudsters may alter cheques to change the name or the amount on the face of cheques. This is called
Ratio analysis is one of the key aspects which a forensic auditor has to look at
“Fraud is a deliberate act of omission or commission by any person, carried out in the course of a banking
transaction or in the books of accounts maintained manually or under computer system in banks, resulting into
wrongful gain to any person for a temporary period or otherwise, with or without any monetary loss to the bank” is
a definition given by

Which of the following is a method used to embezzle money a small amount at a time from many different
accounts?
Payment to vendors who are not on approval list is a
Weakness in internal control environment will lead which kind of fraud
In which Section of IT act 2008 Electronic Evidence is mentioned
_____________ is the practice of concealing a file, message, image, or video within another file, message, image, or
video
Which among the following are the three payroll fraud schemes

Stealing money from one customer’s account and crediting it into another customer’s account is known as

Which of the following scheme referes to the falsification of personnel or payroll records, causing paychecks to be
generated to someone who does not actually work for the victim company?
Why Do People Commit Financial Statement Fraud
The process by which several bidders conspire to split contracts up and ensure each gets a certain amount of work is
called
Which of the following types of organizations typically use Forensic Accountants?
______________ can be described as the use of that stolen identity in criminal activity to obtain goods or services
by deception
White collar crimes are the ones which damage the organisation
The Fraud Exposure Rectangle includes
Motivation for Financial Statements Fraud can be
Management & directors, relationship with others, organization & industry, financial results & operating
characteristics are components of
Introduction, rapport, questioning, summary & close are elements of
Voice Analysis can detect?
Weak internal controls in an organization will affect which of the following elements of fraud?
When individually any financial items/ transactions are not much relevant, however if used wisely together to
commit a fraud, it is known as
Disaster situation, incomplete information, disorderliness are
Orphan funds, excess knowledge, close nexus with vendors etc are
Types of questions that could be asked in an interview could be
A type of question wherein the Interviewer provides an answer within the question is know as
Information Technology bill was passed in
IT Act contained
Punishment for publishing or transmitting of material dipicting children in sexully explicit act in electronic form
Punishment for Violation of Privacy
Punishment of Identity Theft in IT act
The given line is explained in which section of IT Act “Punishment of Dishonestly receiving stolen computer
resources or communication devices”
Identify the odd one out according to Felony and Misdemeanor
What is ACL
ACL is a software
ACL used for Forensic Accounting
Software used for Forensic Accounting
Stamp paper forgery scam was done by
PMLA enacted in the year
Full form of FCPA
FCPA used in the country
UK Briebary Act used in the country
The Banking regulatory authority in India
Regulatory authority for Insurance Companies in India
Share Exchange Regulatory Body is
Mutual Funds Regulatory Organization
SIP and Mutual Funds are different
RBI is a independent organization
SEBI is a independent organization
AMFI is a independent organization
IRDA is a independent organization
General Insurance and Life Insurance are same
GIC full form
LIC and GIC are different
RBI act under Ministry of Finance, Govt. of India
SEBI act under Ministry of Finance, Govt. of India
AMFI act under Ministry of Finance, Govt. of India
IRDA act under Ministry of Finance, Govt. of India
Full form of PSU
Hawala is a form of money laundering
It is a criminally deceitful process of obtaining sensitive data such as username, passwords and credit card
particulars by disguising as a trustworthy entity in an electronic communication - What kind of crime it is

It means stealing of trade secrets through illegal means such as wiretapping or illegal incursions - This activity is
called
The term refers to forceful taking of control of a website by cracking the administrative password - This activity
called
Software that can replicate it and spread to other computers or are programmed to damage a computer by deleting
files, deleting the contents of hard disk, or using up computer memory - What is this

Software that is monetarily maintain (or economically supports another program) by showing ads when you're
linked to the Internet - What is this called

It is software that secretly collects information, and then sends it out to the concerned parties. A type of information
that is gathered includes the Websites visited, browser and
system information, and your computer IP address - What is this called

Nowadays, malware is used by both black hat hackers and governments, to steal personal, monetary, or business
information and sometimes for
damage - one of the main example is
Which one is not a part of malware
These viruses infect the files formed using several applications or programs that include macros like doc, pps, xls and
mdb. They involuntarily infect the archive with macros and also templates and documents that are enclosed in the
file. They hide in files shared from e-mail and networks - These viruses are called

When a certain condition is met, the viruses will act by infecting the files in the directory or the folder specified in
the AUTOEXEC.BAT. The viruses are usually seen in the hard disk’s root
index, but they keep on changing location - These viruses are called
A nasty little program can cause less speed in a network. These will duplicate itself and multiply from computer to
computer. These are commonly spread through email attachments - What is this
A virus will cover your web browser and involuntarily readdress you to another website - This is called
Findout the exact example of Worms
What is P2P concept in cyber world

Brute-force attacks can crack any password if given ample time.


Brute-force attacks attempts every combination of numbers, letters, and special characters until the password is
discovered - What kind of attack is this
"Dishonesty" defined in the which sections of IPC
"Counterfeit" defined in the which sections of IPC
"Injury" defined in the which sections of IPC
"Good Faith" defined in the which sections of IPC
Which Sections of IPC defined Criminal Breach of Trust
Which Sections of IPC defined Offences relating to documents and property marks
Which Sections of IPC defined Offences relating to Defamation
Prevention of Money Laundering Act estabslished in the year of
Full form of PMLA
Section - 70 of PMLA (Prevention of Money Laundering Act, 2002) defined as
Power of Investigation Officer describes in the which sections of CrPC (1973)
FIR can be made under which sections of CrPC
The statements of witnesses as per the provisions of Section
Section - 45 of Indian Evidence Act defined as without Section 293 of CrPC
" Provisions Covering Examination of Witnesses in The Court" describes in the which sections of IEA
What is the full form of CVC
What is the full form of ABBF
What is the full form of NPCI
Who has established the "The Depositor Education and Awarness Fund Scheme" or DEAF
Banking Regulation Act of India enacted in the year
Full form of ATM
In banking terms CASA means
Which of the following is a Fraud Investigating agency of India
What is the full form of SFIO
Full form of CBI
Full form of ED
Home Loan and Mortgage Loan is same
Credit Card is a plastic money
Debit Card and Credit Card is same
Banking Ombudsman recruited by RBI
Data diddling

Lapping
Current Account Savings Accounts
The Serious Fraud Investigation Office (SFIO) 
Serious Fraud Investigation Office
Central Bureau of Investigation 
Directorate of Enforcement
0
1
0
1

You might also like