Banking Regulation Act of India Enacted in The Year
Banking Regulation Act of India Enacted in The Year
Which of the following is a method used to embezzle money a small amount at a time from many different
accounts?
Payment to vendors who are not on approval list is a
Weakness in internal control environment will lead which kind of fraud
In which Section of IT act 2008 Electronic Evidence is mentioned
_____________ is the practice of concealing a file, message, image, or video within another file, message, image, or
video
Which among the following are the three payroll fraud schemes
Stealing money from one customer’s account and crediting it into another customer’s account is known as
Which of the following scheme referes to the falsification of personnel or payroll records, causing paychecks to be
generated to someone who does not actually work for the victim company?
Why Do People Commit Financial Statement Fraud
The process by which several bidders conspire to split contracts up and ensure each gets a certain amount of work is
called
Which of the following types of organizations typically use Forensic Accountants?
______________ can be described as the use of that stolen identity in criminal activity to obtain goods or services
by deception
White collar crimes are the ones which damage the organisation
The Fraud Exposure Rectangle includes
Motivation for Financial Statements Fraud can be
Management & directors, relationship with others, organization & industry, financial results & operating
characteristics are components of
Introduction, rapport, questioning, summary & close are elements of
Voice Analysis can detect?
Weak internal controls in an organization will affect which of the following elements of fraud?
When individually any financial items/ transactions are not much relevant, however if used wisely together to
commit a fraud, it is known as
Disaster situation, incomplete information, disorderliness are
Orphan funds, excess knowledge, close nexus with vendors etc are
Types of questions that could be asked in an interview could be
A type of question wherein the Interviewer provides an answer within the question is know as
Information Technology bill was passed in
IT Act contained
Punishment for publishing or transmitting of material dipicting children in sexully explicit act in electronic form
Punishment for Violation of Privacy
Punishment of Identity Theft in IT act
The given line is explained in which section of IT Act “Punishment of Dishonestly receiving stolen computer
resources or communication devices”
Identify the odd one out according to Felony and Misdemeanor
What is ACL
ACL is a software
ACL used for Forensic Accounting
Software used for Forensic Accounting
Stamp paper forgery scam was done by
PMLA enacted in the year
Full form of FCPA
FCPA used in the country
UK Briebary Act used in the country
The Banking regulatory authority in India
Regulatory authority for Insurance Companies in India
Share Exchange Regulatory Body is
Mutual Funds Regulatory Organization
SIP and Mutual Funds are different
RBI is a independent organization
SEBI is a independent organization
AMFI is a independent organization
IRDA is a independent organization
General Insurance and Life Insurance are same
GIC full form
LIC and GIC are different
RBI act under Ministry of Finance, Govt. of India
SEBI act under Ministry of Finance, Govt. of India
AMFI act under Ministry of Finance, Govt. of India
IRDA act under Ministry of Finance, Govt. of India
Full form of PSU
Hawala is a form of money laundering
It is a criminally deceitful process of obtaining sensitive data such as username, passwords and credit card
particulars by disguising as a trustworthy entity in an electronic communication - What kind of crime it is
It means stealing of trade secrets through illegal means such as wiretapping or illegal incursions - This activity is
called
The term refers to forceful taking of control of a website by cracking the administrative password - This activity
called
Software that can replicate it and spread to other computers or are programmed to damage a computer by deleting
files, deleting the contents of hard disk, or using up computer memory - What is this
Software that is monetarily maintain (or economically supports another program) by showing ads when you're
linked to the Internet - What is this called
It is software that secretly collects information, and then sends it out to the concerned parties. A type of information
that is gathered includes the Websites visited, browser and
system information, and your computer IP address - What is this called
Nowadays, malware is used by both black hat hackers and governments, to steal personal, monetary, or business
information and sometimes for
damage - one of the main example is
Which one is not a part of malware
These viruses infect the files formed using several applications or programs that include macros like doc, pps, xls and
mdb. They involuntarily infect the archive with macros and also templates and documents that are enclosed in the
file. They hide in files shared from e-mail and networks - These viruses are called
When a certain condition is met, the viruses will act by infecting the files in the directory or the folder specified in
the AUTOEXEC.BAT. The viruses are usually seen in the hard disk’s root
index, but they keep on changing location - These viruses are called
A nasty little program can cause less speed in a network. These will duplicate itself and multiply from computer to
computer. These are commonly spread through email attachments - What is this
A virus will cover your web browser and involuntarily readdress you to another website - This is called
Findout the exact example of Worms
What is P2P concept in cyber world
Lapping
Current Account Savings Accounts
The Serious Fraud Investigation Office (SFIO)
Serious Fraud Investigation Office
Central Bureau of Investigation
Directorate of Enforcement
0
1
0
1