FRAUD AND CORRUPTION SCHEMES DECEMBER 2023 PAST PAPER
MONDAY: 4 December 2023. Afternoon Paper. Time Allowed: 3 hours. Answer ALL questions by indicating the letter (A, B, C or D) that represents the correct answer. This paper is made up of one hundred (100) Multiple Choice Questions. Each question is allocated one (1) mark. 1. Which of the following is NOT an objective of a risk assessment process related to computers and computer systems? A. Investigate the risks that make an organisation vulnerable to fraud B. Quantify the impact if the risk materialised C. Establish an economic balance between the impact if the risk materialised and the cost of resources required D. None of the above (1 mark) 2. Which of the following statement is ACCURATE in regard to fraudulent financial reporting? A. Failure to write off bad debts would cause overstatement of receivables B. Failure to write off bad debts would cause understatement of the current ratio C. Failure to accrual expenses would cause understatement of liabilities (1 mark) D. None of the above 3. Which of the following method of bribery payment BEST describes how large amounts of bribes are disbursed and are hard to detect? A. Entertainment B. Expensive vacations C. Property sold below the market value D. None of the above (1 mark) 4. Healthcare providers defraud insurance companies and government health programmes through intentional separation of one procedure into two procedures. Which of the following BEST describes the healthcare providers’ fraud scheme? A. Up-coding scheme B. Fictitious services C. Fictitious procedures D. None of the above (1 mark) 5. There are several financial statement fraud schemes that are perpetrated by management to inflate the organisation’s liquidity ratio. Which of the following BEST describes the fraud scheme? A. Overstatement of current liabilities B. Overstatement of revenue/ receivables C. Overstatement of non-current assets D. Understatement of non-current assets (1 mark) 6. Which of the following would result in an improper valuation of inventory? A. Writing off obsolete inventory B. Recording perpetual inventory balance which is higher than the physical balance C. Recording physical inventory balance which is lower than the perpetual inventory D. None of the above (1 mark) 7. Which of the following statements is NOT accurate in regard to steps of risk assessment related to computers and computer systems? A. Identifying the risks and threats of each asset and calculating the probability of each risk materialising, is the third step of a risk assessment B. Determining the value of each asset of a risk assessment related to computers and computer systems is the second step C. Recommending the counter-measures and other remedial activities is the fifth step of a risk assessment related to computers and computer systems D. None of the above (1 mark) 8. Which of the following is NOT a red flag of financial statement fraud? A. Normal revenue growth B. Unrealistic targets C. Negative cash flow balances while reporting profits D. None of the above (1 mark) 9. Conrad received a voice mail saying that somebody is trying to use his account fraudulently through Internet banking. Which of the following BEST describes this social engineering scheme? A. Phishing B. Smishing C. Pharming D. None of the above (1 mark) 10. Separation of duties is fundamental to data security. Which of the following is NOT a recommended practice in relation to separation of duties? A. Application system users should only be granted access to those functions and data required for their job duties B. System users should not have direct access to program source code C. System users cannot have direct access to program source code D. None of the above (1 mark) 11. Procurement fraud is perpetrated in the cause of a procurement process. Which of the following is NOT a procurement fraud scheme committed during the submission of bids? A. Bid rotation B. Splitting of bids C. Complementary bids D. Bid suppression (1 mark) 12. XYZ government agency planned and budgeted for one hundred vehicles. The procurement department developed the specifications for the vehicles and their accessories, but they were developed as separate specifications and therefore increasing the total cost of the motor vehicles. Which of the following BEST describes this type of procurement fraud scheme? A. Bid specification scheme B. Bid manipulation scheme C. Bid splitting scheme D. None of the above (1 mark) 13. Which of the following statements is NOT a red flag of bid splitting? A. Similar or identical procurements from the same supplier in amounts just slightly over the competitive bidding limits B. Consecutive related procurements from several contractors that are within the competitive-bidding or upper-level review limits C. Justifiable split purchases that fall under the competitive-bidding or upper-level review limits D. None of the above (1 mark) 14. Which of the following statement is ACCURATE in regard to Business email compromise schemes identified by FBI? A. BEC (Business email compromise) is a type of vishing phishing B. BEC (Business email compromise) is a type of malware C. BEC (Business email compromise) is a type of spear engineering D. None of the above (1 mark) 15. Which of the following statement is ACCURATE in regard to red flags of bid tailoring scheme? A. Explained changes in contract specifications from previous proposals or similar items B. Good number of competitive bids or awards to several bidders C. Specifications developed by or in consultation with a contractor who is permitted to compete in the procurement D. None of the above (1 mark) 16. Which of the following is NOT a red flag of bid rigging by contractors? A. Competent bidders refrain from bidding B. Vendors submit complementary bids C. There is noticeable pattern of winning bids D. None of the above (1 mark) 17. Which of the following is NOT a type of administrative security and controls? A. Data classification B. Incidence response plans C. Computer security audits and tests D. None of the above (1 mark) 18. Which of the following technique BEST describes an attempt to exploit the system security for purposes of
FRAUD AND CORRUPTION SCHEMES DECEMBER 2023 PAST PAPER Read Post »