CAIIB ABM Module D UNIT 32 MCQ – Fraud and Vigilance in Banks.
Question 1: What is the fundamental nature of an intentional deception carried out to obtain an unfair or unlawful monetary advantage?
Show Explanation
Correct Answer: C. Fraudulent activity. An intentional deception aimed at securing unfair or unlawful monetary gain is fundamentally characterised as fraud.
Question 2: An intentional act of deception to gain unfair monetary benefit can manifest in which ways regarding the receipt of money?
Show Explanation
Correct Answer: C. Through either direct or indirect means. Intentional deception for unfair monetary gain can involve obtaining the money directly or indirectly.
Question 3: In modern societies where money transactions are very frequent, how common is the concept of intentional deception for financial gain?
Show Explanation
Correct Answer: C. Extremely prevalent. In highly financialised societies, intentional deception for financial gain is a very common issue.
Question 4: Depending on the specific situation and its seriousness, intentional deception for unfair gain can be treated legally as what type of wrong?
Show Explanation
Correct Answer: C. Either a civil matter or a criminal offence. Intentional deception for unfair gain can be categorised legally as either a civil wrongdoing or a criminal offence based on context and severity.
Question 5: In the context of agreements or contracts, an act of intentional deception or concealment performed to persuade another party to enter into that agreement is often legally defined within frameworks related to:
Show Explanation
Correct Answer: C. Contract law. Intentional acts of deception or concealment to induce entry into a contract are typically defined as fraud within the scope of contract law.
Question 6: Which of the following actions, when committed with intent to deceive a party to a contract or induce them to enter it, is considered a form of intentional deception in contract law?
Show Explanation
Correct Answer: B. Hiding a fact deliberately while having knowledge of it. Deliberately concealing a known fact is recognised as an act of deception in contract law.
Question 7: In contract law, when does simply remaining silent about facts that might influence a person’s decision to enter a contract constitute intentional deception?
Show Explanation
Correct Answer: C. Only when there is a legal or situational obligation to disclose, or when silence itself implies consent or information. Silence constitutes deception only in specific circumstances where disclosure is required or silence is misleading.
Question 8: Within a corporate context, an intentional act, failure to act, hiding of information, or misuse of position committed to deceive, gain unfair advantage, or harm stakeholders like shareholders or creditors is included in the legal definition of:
Show Explanation
Correct Answer: C. Corporate fraud. Actions involving intentional deception, omission, concealment, or abuse of position to gain undue advantage or harm corporate interests fall under the definition of corporate fraud.
Question 9: In a legal sense related to corporate matters, what specifically constitutes “Wrongful gain”?
Show Explanation
Correct Answer: D. Acquiring property not legally due to oneself through unlawful means. Wrongful gain refers to obtaining property via unlawful methods when one has no legal entitlement to it.
Question 10: In a legal sense related to corporate matters, what specifically constitutes “Wrongful loss”?
Show Explanation
Correct Answer: B. Losing property legally due to oneself through unlawful means. Wrongful loss refers to being deprived of property legally due to oneself via unlawful methods.
Question 11: A legal framework defines an action as having been performed “fraudulently” if it was carried out with which specific intent?
Show Explanation
Correct Answer: D. Intent to defraud, and for no other reason. An action is considered fraudulently performed if the sole intention behind it was to defraud.
Question 12: For an action to be legally classified as “fraudulently” done, what element is considered to be of utmost significance?
Show Explanation
Correct Answer: C. The intention behind the action to defraud. The primary factor determining if an action is fraudulently done is the presence of an intent to defraud.
Question 13: When classifying instances where financial institutions suffer losses due to dishonest activities, which of the following is often included as a type of such activity?
Show Explanation
Correct Answer: B. Misappropriation and betrayal of trust. Acts involving misappropriation of funds and criminal breach of trust are typically classified as fraudulent activities causing loss to financial institutions.
Question 14: Which of these actions is considered a type of dishonest activity that can lead to financial loss for institutions, as per standard classifications?
Show Explanation
Correct Answer: B. Manipulating financial records or using false accounts. Dishonest acts involving the manipulation of financial records or operating through fictitious accounts are a recognised cause of financial loss for institutions.
Question 15: Certain financial irregularities like cash shortages or issues in foreign exchange transactions are treated and reported as intentional deception causing loss only under what condition?
Show Explanation
Correct Answer: B. If there is a suspicion or proof of deceptive intent. Cases of cash shortages or foreign exchange irregularities are reported as intentional deception causing loss only when deceptive intent is suspected or proven.
Question 16: Even if deceptive intent is not clear at the time of discovery, a cash shortage exceeding a particular monetary threshold will be officially recorded as a case of intentional deception causing loss. What is a common threshold for such reporting?
Show Explanation
Correct Answer: B. Amounts greater than ₹10,000. Cash shortages exceeding a certain amount, often ₹10,000, are typically reported as intentional deception causing loss even without immediate proof of intent.
Question 17: In situations where deceptive intent is not immediately apparent, a cash shortage exceeding a specific amount (e.g., ₹5,000) is still classified as intentional deception causing loss if detected by internal control measures like management or audit, provided what condition about reporting is met by the cash handler?
Show Explanation
Correct Answer: B. The cash handler failed to report it on the same day of occurrence. A cash shortage exceeding a certain amount, if detected by management or audit and not reported by the cash handler on the day it occurred, is treated as intentional deception causing loss.
Question 18: What is one of the long-standing methods used to carry out intentional deception involving documents?
Show Explanation
Correct Answer: C. Forgery. Forgery, involving the creation or alteration of documents, is a historically common method for perpetrating intentional deception.
Question 19: What does the act of forgery generally involve?
Show Explanation
Correct Answer: C. Creating a false written document or altering a genuine one with the aim to deceive. Forgery fundamentally involves making false documents or changing genuine ones with a deceptive purpose.
Question 20: In legal terms, what is the key element that completes the offence of creating a false document?
Show Explanation
Correct Answer: B. The intent to commit deception when creating the document. The offence of creating a false document is complete as soon as the document is made with the intention to deceive.
Question 21: When creating a false document for deceptive purposes, is it necessary for the individual whose name is used to be a real, existing person?
Show Explanation
Correct Answer: B. No, a fictitious or deceased person’s name can be used. A false document can be created using the name of someone who is not real or is deceased.
Question 22: If multiple individuals work together to produce a forged document, with each person contributing a specific part, are all individuals considered culpable in the act of forgery?
Show Explanation
Correct Answer: B. Yes, they are all considered culpable despite dividing the tasks. When multiple individuals combine efforts, each contributing a part to a forgery, they are all held responsible.
Question 23: Can changing the date on a document constitute forgery?
Show Explanation
Correct Answer: C. Yes, if the date is a significant element of the deception. Altering a document’s date can be considered forgery if the date is a material factor in the intended deception.
Question 24: If a document is altered solely to hide a previous act of carelessness, is this alteration considered forgery?
Show Explanation
Correct Answer: B. No, altering a document only to hide negligence does not constitute forgery in this context. Falsification done purely to conceal a prior negligent act is not considered forgery.
Question 25: When individuals enter their card details on fraudulent shopping websites and this information is subsequently misused, this type of activity is commonly associated with:
Show Explanation
Correct Answer: B. Triangulation or site cloning. Customers providing card details on fraudulent sites that misuse this information is an example of triangulation or site cloning fraud.
Question 26: What factor significantly increased the volume of digital transactions?
Show Explanation
Correct Answer: B. Government and policy focus on digital banking as a convenient and affordable option. The push by government and policymakers towards digital banking, seen as convenient and affordable, led to a large increase in digital transactions.
Question 27: With the advancement of technology, what change has been observed regarding intentional deception for financial gain?
Show Explanation
Correct Answer: B. Fraudsters have adapted and cyber-based deceptions are more common. As technology has advanced, fraudsters have also evolved their methods, leading to an increase in cyber-based deceptions.
Question 28: Cyber security threats primarily represent what type of risk?
Show Explanation
Correct Answer: B. The risk of experiencing a cyberattack. Cyber security threats indicate the likelihood or risk of encountering a malicious cyberattack.
Question 29: What is an intentional and malicious effort by an entity to compromise the systems of another entity called?
Show Explanation
Correct Answer: B. A cyber-attack. A cyber-attack is defined as a deliberate and harmful action by an individual or organisation to breach another’s systems.
Question 30: What potential motives might an attacker have when carrying out a cyber-attack?
Show Explanation
Correct Answer: B. Information theft, financial gain, espionage, or sabotage. Attackers conducting cyber-attacks may be motivated by stealing information, obtaining money, conducting espionage, or causing damage (sabotage).
Question 31: Overwhelming a target system’s resources to make it unavailable to its intended users is the objective of what type of malicious activity?
Show Explanation
Correct Answer: C. Distributed denial of service (DDoS) attack. The goal of a Distributed denial of service (DDoS) attack is to flood a system’s resources, preventing legitimate users from accessing it.
Question 32: Which type of malicious activity involves psychologically manipulating users to perform certain actions or reveal sensitive information?
Show Explanation
Correct Answer: B. Social engineering. Social engineering attacks utilise psychological tactics to trick users into taking desired actions or giving up confidential details.
Question 33: Phishing, spear phishing, and homograph attacks are examples of what broader category of malicious activity?
Show Explanation
Correct Answer: C. Social engineering attacks. Phishing, spear phishing, and homograph attacks are all specific methods employed within social engineering.
Question 34: In a network interaction where one party believes they are communicating directly with a server, what type of attack involves a malicious entity inserting itself between the two parties to intercept or alter communication?
Show Explanation
Correct Answer: C. Man-in-the-middle (MitM) attack. A Man-in-the-middle (MitM) attack occurs when an attacker intercepts and potentially alters communication between two parties who believe they are communicating directly.
Question 35: What can an attacker potentially achieve once they have successfully intercepted communications in a Man-in-the-middle attack?
Show Explanation
Correct Answer: B. Compromise user credentials, steal sensitive data, or return different responses. By intercepting communication in a MitM attack, an attacker can potentially steal login details, sensitive information, or manipulate the messages exchanged.
Question 36: Session hijacking, replay attacks, IP spoofing, and eavesdropping attacks are variations of what type of malicious activity?
Show Explanation
Correct Answer: C. Man-in-the-middle (MitM) attacks. These specific attack types are listed as examples of Man-in-the-middle attacks.
Question 37: Malicious software designed to infiltrate and potentially damage or disable computer systems is broadly categorised as:
Show Explanation
Correct Answer: C. Malware and spyware. Malicious software intended to harm or compromise computer systems is generally referred to as malware and spyware.
Question 38: What is a common method used by malicious software to get onto a user’s device without their explicit knowledge or consent?
Show Explanation
Correct Answer: B. Exploiting vulnerabilities in browsers or operating systems. Malware can often install itself by taking advantage of weaknesses present in web browsers or operating systems.
Question 39: Which type of malicious software tricks a user into believing it is a legitimate file, but can then initiate an attack or create a hidden access point for attackers?
Show Explanation
Correct Answer: B. Trojan virus. A Trojan virus is a type of malicious software disguised as something harmless to gain access and potentially cause harm or create backdoors.
Question 40: What kind of malicious software holds a victim’s data inaccessible and threatens to delete or publish it unless a payment is made?
Show Explanation
Correct Answer: C. Ransomware. Ransomware is malicious software that encrypts a victim’s data and demands a ransom for its release.
Question 41: Online advertising that contains malicious code capable of infecting a user’s computer upon viewing or clicking is known as:
Show Explanation
Correct Answer: C. Malvertising. Malvertising refers to malicious code embedded within online advertisements that can infect users’ devices.
Question 42: Which type of attack involves gaining access to an individual’s password information through methods like monitoring network connections, psychological manipulation, educated guesses, or accessing password databases?
Show Explanation
Correct Answer: C. Password attacks. Obtaining password information through methods like sniffing, social engineering, guessing, or database access is categorised as a password attack.
Question 43: What type of cyber threat involves an individual or group gaining unauthorised, long-term access to a network and stealthily extracting sensitive data while avoiding detection?
Show Explanation
Correct Answer: B. Advanced persistent threat (APT). An Advanced Persistent Threat (APT) involves gaining and maintaining unauthorised access to a network for an extended period to steal data stealthily.
Question 44: Which type of cybercriminal breaks into computer networks with the intent to take control of resources and steal or destroy data?
Show Explanation
Correct Answer: C. Black hat hackers. Black hat hackers are cybercriminals who unlawfully breach networks with malicious intent towards data and resources.
Question 45: Which type of cybercriminal penetrates computer networks to find weaknesses and help fix them, preventing malicious actors from exploiting them?
Show Explanation
Correct Answer: C. White hat hackers. White hat hackers are security professionals who ethically breach systems to identify and fix vulnerabilities.
Question 46: Malicious software that primarily targets systems maintaining databases of customer credit card numbers, often by being inserted into a retailer’s server, is a form of:
Show Explanation
Correct Answer: B. Malware. Malicious software designed to target systems like those holding credit card data, often by infecting servers, is a specific application of malware.
Question 47: A type of malicious software that encrypts a user’s valuable files and demands payment to restore access is known as:
Show Explanation
Correct Answer: B. Crypto ransomware. Crypto ransomware is a specific type of ransomware that works by encrypting files and demanding a ransom.
Question 48: What method involves obtaining a person’s private information and financial details to make purchases, borrow money, or open accounts without their consent?
Show Explanation
Correct Answer: B. Identity theft. Using another person’s personal and financial information without permission for fraudulent activities is termed identity theft.
Question 49: What mechanism allows entities to report details about payment-related intentional deceptions to a central authority?
Show Explanation
Correct Answer: C. A Central Payment Fraud Information Registry and related reporting guidelines. A Central Payment Fraud Information Registry and its associated guidelines provide a formal system for reporting payment-related intentional deceptions.
Question 50: The objective of gradually reducing the time limit for reporting intentional payment deceptions to a near real-time basis is to facilitate what?
Show Explanation
Correct Answer: C. Rapid sharing of information to help build safeguards. Reducing reporting timelines to near real-time facilitates quick information sharing, enabling entities to develop necessary defences against intentional payment deceptions.
Question 51: A centralised digital repository for storing information about reported instances of intentional deception causing loss to financial institutions is known as a:
Show Explanation
Correct Answer: C. Central Fraud Registry. A Central Fraud Registry serves as a central database for information regarding reported cases of intentional deception in financial institutions.
Question 52: Access to a Central Fraud Registry is typically provided to authorised financial institutions through what means?
Show Explanation
Correct Answer: B. User-specific identification and security credentials. Access to a Central Fraud Registry is usually granted through specific user IDs and passwords for authorised institutions.
Question 53: What traditional method of disseminating information about potential financial deceptions has generally been replaced by digital databases like the Central Fraud Registry?
Show Explanation
Correct Answer: B. Paper-based caution advice. The practice of issuing paper-based Caution Advice has largely been discontinued and replaced by digital systems like the Central Fraud Registry.
Question 54: While paper-based caution advice has mostly stopped, when might such advice still be issued regarding intentional deceptions?
Show Explanation
Correct Answer: C. When the deception, including attempted ones, has implications for the wider financial system. Caution Advice may still be issued for intentional deceptions, including attempts, that have systemic implications.
Question 55: Financial institutions are encouraged to utilise information available in centralised fraud databases and caution advice for what primary purpose?
Show Explanation
Correct Answer: B. For timely identification, control, reporting, and mitigation of deception risk. Institutions should use the information from fraud databases and caution advice to help in the timely management and reduction of deception risk.
Question 56: What specific return do financial institutions typically need to submit electronically for individual cases of intentional deception causing loss?
Show Explanation
Correct Answer: B. Fraud Monitoring Return (FMR). A Fraud Monitoring Return (FMR) is commonly required to be submitted electronically for individual cases of intentional deception.
Question 57: What is the general time limit within which financial institutions are required to submit the electronic return for individual cases of intentional deception from the date it is discovered or reported by a customer?
Show Explanation
Correct Answer: C. Within three weeks (21 calendar days). The electronic return for individual deception cases must typically be submitted within three weeks (21 calendar days) of detection or customer reporting.
Question 58: In addition to the electronic return for individual deception cases, what type of report is required for incidents involving substantial amounts, and within what timeframe from when it becomes known to the institution’s head office?
Show Explanation
Correct Answer: C. A Flash Report within a week. For intentional deceptions involving large sums, a Flash Report is generally required within a week of the head office becoming aware.
Question 59: For intentional deceptions involving amounts exceeding a high value (e.g., 50 million), what specific details should be included in the initial immediate report to the relevant authority?
Show Explanation
Correct Answer: B. Amount, nature, brief method, branch name, parties involved, and names of officials involved. An immediate report for large-value deceptions should include key details like the amount, nature, method, location, and involved parties/officials.
Question 60: Besides reporting new cases of intentional deception, what ongoing information are financial institutions required to furnish regarding existing cases?
Show Explanation
Correct Answer: C. Developments in the deception case through an update application. Institutions are typically required to provide updates on the progress and developments of ongoing deception cases through a dedicated application.
Question 61: To ensure effective monitoring and information sharing about intentional deceptions, what must financial institutions ensure about the data they submit?
Show Explanation
Correct Answer: C. It is complete, accurate, and up-to-date. Submitted data regarding intentional deceptions must be complete, accurate, and current for effective monitoring and information dissemination.
Question 62: Are financial institutions generally required to report cases of attempted intentional deception above a certain monetary value to the central regulatory body?
Show Explanation
Correct Answer: B. No, cases of attempted deception above a certain value typically do not need to be reported to the central body. Attempted deceptions above a specified amount are generally not required to be reported to the central regulatory body.
Question 63: While attempted intentional deceptions above a certain amount may not require reporting to the central regulatory body, where must a report on such individual cases still be presented?
Show Explanation
Correct Answer: C. Before the Audit Committee of the Board. A report on individual cases of attempted intentional deception exceeding a certain amount must still be placed before the Audit Committee of the Board.
Question 64: What information should be included in the report presented to the Audit Committee of the Board regarding attempted intentional deceptions?
Show Explanation
Correct Answer: B. The method of the attempted deception and how it was prevented or failed. The report on attempted deceptions should detail the method used and how the attempt was unsuccessful or foiled.
Question 65: Upon discovering an instance of intentional deception causing loss, what immediate steps should be taken regarding relevant documents?
Show Explanation
Correct Answer: B. Protect the documents involved. Immediately securing and protecting the documents related to a discovered instance of intentional deception is a necessary step.
Question 66: When an instance of intentional deception causing loss is detected, with whom should the branches consult for advice on officially reporting the matter to law enforcement?
Show Explanation
Correct Answer: C. The controlling authority. Branches should contact the controlling authority for guidance on registering an official report with law enforcement upon detecting intentional deception.
Question 67: When a complaint regarding intentional deception causing loss is to be lodged with a major investigating agency like the Central Bureau of Investigation (CBI), who should typically be consulted?
Show Explanation
Correct Answer: B. The institution’s Chief Vigilance Officer (CVO). Consultation with the Chief Vigilance Officer (CVO) is generally required when lodging a complaint about intentional deception with a major investigating agency like the CBI.
Question 68: When formally communicating an intentional deception case to a major investigating agency like the CBI, what should the letter briefly outline, while being cautious about implicating specific individuals without concrete proof?
Show Explanation
Correct Answer: B. The particulars of the case, leaving the investigation of culpability to the agency. The formal communication should briefly provide case details but leave the determination of guilt to the investigating agency.
Question 69: Upon receiving a copy of the official report filed by the investigating agency (e.g., FIR from CBI) for an intentional deception case involving employees, what action should be taken regarding the employees named if they are nearing retirement?
Show Explanation
Correct Answer: B. The fact that they are due to retire within a year should be brought to the agency’s notice. If employees named in the official report are due to retire within a year, this fact should be communicated to the investigating agency.
Question 70: What is crucial for ensuring the timely and logical conclusion of intentional deception cases handled by police or investigation agencies?
Show Explanation
Correct Answer: B. Proper liaison and follow-up with the agencies. Maintaining proper communication and follow-up with police and investigation agencies is essential for timely case resolution.
Question 71: What is a key action financial institutions must take to prevent delays in reporting intentional deception cases to the central regulatory body?
Show Explanation
Correct Answer: B. Fix staff accountability for reporting delays. Holding staff responsible for delays in reporting intentional deception cases is necessary to streamline the process.
Question 72: Delays in reporting intentional deceptions and sharing information about the methods used can lead to what negative consequence?
Show Explanation
Correct Answer: B. Similar deceptions being carried out elsewhere. Delayed reporting and information sharing about deception methods can result in the same types of incidents occurring in other institutions.
Question 73: For intentional deceptions involving amounts exceeding a specific high threshold (e.g., greater than 500 million), to which specific authority within a major investigation agency like CBI should the complaint typically be directed?
Show Explanation
Correct Answer: C. The Joint Director (Policy) at headquarters. For very large value intentional deceptions, the complaint is typically lodged with the Joint Director (Policy) at the headquarters of a major investigation agency like the CBI.
Question 74: The dictionary definition of vigilance refers to being watchful and cautious for what purpose?
Show Explanation
Correct Answer: B. To detect danger. Vigilance is defined as being watchful and cautious to identify potential dangers.
Question 75: Why is the practice of vigilance particularly critical in the financial sector, especially for institutions dealing with public funds like banks?
Show Explanation
Correct Answer: B. To ensure public money is not misused and is available on demand. Vigilance is crucial in finance to safeguard public funds, ensuring they are not misused and are accessible when needed.
Question 76: Financial institutions acting as intermediaries for public money have a duty to observe high standards of safeguards to ensure what about the funds accepted from depositors?
Show Explanation
Correct Answer: B. They are not mis-utilised and are put to gainful use or are available on demand. Institutions handling public money must apply high safeguards to ensure funds are used appropriately and can be returned on demand.
Question 77: What is the watchfulness enforced by the vigilance function intended to ensure regarding public money held by banks?
Show Explanation
Correct Answer: B. It is not allowed to be misused by dishonest individuals. The vigilance function enforces watchfulness to prevent the misuse of public funds by dishonest persons.
Question 78: What is the primary objective of Preventive Vigilance in an organisation?
Show Explanation
Correct Answer: C. To establish procedures and systems that restrain acts of wrongdoing and misconduct. Preventive vigilance focuses on setting up systems and procedures to prevent wrongdoings and misconduct from occurring.
Question 79: Which type of vigilance involves the effective use of tools like complaints, inspection reports, and audit reports to identify corrupt practices, malpractices, and negligence?
Show Explanation
Correct Answer: C. Detective Vigilance. Detective vigilance uses various reports and surveillance to identify instances of corruption, malpractice, and negligence.
Question 80: What is the main goal of Punitive Vigilance?
Show Explanation
Correct Answer: C. To conduct investigations and take deterrent action against culprits. Punitive vigilance aims at investigating incidents and implementing deterrent actions against those responsible.
Question 81: What is the main objective of preventive vigilance in reducing the occurrence of a lapse?
Show Explanation
Correct Answer: C. Setting up systems and procedures to stop the lapse from happening. Preventive vigilance seeks to reduce lapses by putting in place systems and procedures that prevent them.
Question 82: What is the main objective of detective vigilance in relation to a lapse?
Show Explanation
Correct Answer: B. Identifying and confirming that a lapse has occurred. Detective vigilance is focused on discovering and verifying instances where a lapse has taken place.
Question 83: What is the main objective of punitive vigilance regarding a lapse?
Show Explanation
Correct Answer: C. Discouraging the future occurrence of a lapse. Punitive vigilance aims to deter future lapses by taking action against those responsible.
Question 84: Within a central bank’s vigilance framework, which type of vigilance is often considered to play a central role?
Show Explanation
Correct Answer: D. Preventive vigilance. Preventive vigilance is often highlighted as having a central role in the vigilance framework of a central bank.
Question 85: Vigilance guidelines issued by central authorities aim to achieve what broader goals?
Show Explanation
Correct Answer: C. Promote honesty and integrity and improve vigilance administration. Vigilance guidelines are intended to enhance transparency, integrity, and the overall management of vigilance activities.
Question 86: What does Preventive Vigilance specifically involve as a method to reduce corruption?
Show Explanation
Correct Answer: B. Adopting measures to improve systems and procedures. Preventive vigilance involves taking steps to enhance systems and procedures to minimise opportunities for corruption.
Question 87: One of the objectives of preventive vigilance in financial institutions is to ensure watchfulness and diligence by all employees to prevent incidents that could adversely affect the institution’s:
Show Explanation
Correct Answer: B. Financial standing or reputation. Preventive vigilance aims to ensure employee watchfulness to prevent incidents that could harm the institution’s finances or reputation.
Question 88: A key objective of preventive vigilance is to ensure strict adherence by all employees to integrity and the institution’s policies, systems, and procedures for what purpose?
Show Explanation
Correct Answer: B. So that the institution’s interests are safeguarded. Ensuring employee adherence to integrity and policies is an objective of preventive vigilance to protect the institution’s interests.
Question 89: Which type of vigilance focuses on establishing processes and frameworks specifically designed to limit instances of wrongdoing and misconduct within an organisation’s various functions?
Show Explanation
Correct Answer: D. Preventive vigilance. Preventive vigilance is concerned with setting up systems and processes to restrict acts of wrongdoing and misconduct.
Question 90: Which of the following is a measure typically emphasised to achieve the objectives of preventive vigilance?
Show Explanation
Correct Answer: C. Planning and enforcing regular inspections and audits. Conducting regular inspections and audits is a measure used to support preventive vigilance objectives.
Question 91: Identifying areas within an organisation that are particularly susceptible to corruption and ensuring staff with proven integrity are placed in those areas is a measure associated with which type of vigilance?
Show Explanation
Correct Answer: D. Preventive vigilance. Identifying corruption-prone areas and posting trusted staff there is a preventive vigilance measure.
Question 92: Regular transfer of officers and job rotation for staff at regular intervals are measures often implemented to strengthen which aspect of organisational oversight?
Show Explanation
Correct Answer: C. Preventive vigilance. Regular staff transfers and job rotation are methods used to enhance preventive vigilance.
Question 93: Close scrutiny of staff accounts and maintaining surveillance on officers whose integrity is doubtful are measures employed as part of:
Show Explanation
Correct Answer: C. Preventive vigilance. Monitoring staff accounts and keeping surveillance on employees of doubtful integrity are preventive vigilance measures.
Question 94: What type of malicious activity often used to steal sensitive user data involves an attacker impersonating a trusted entity to trick victims through electronic communication?
Show Explanation
Correct Answer: B. Phishing attack. A phishing attack is a social engineering technique where an attacker pretends to be a trusted entity to deceive users into revealing sensitive information via electronic means.
Question 95: In a phishing attack, what is the common consequence if a recipient is tricked into clicking a malicious link in an email or message?
Show Explanation
Correct Answer: B. It can lead to malware installation or revelation of sensitive information. Clicking a malicious link in a phishing attempt can result in harmful software being installed or confidential details being exposed.
Question 96: Which specific type of phishing attack targets a particular individual or organisation, often requiring specific knowledge about the target?
Show Explanation
Correct Answer: C. Spear phishing. Spear phishing is a targeted form of phishing that focuses on a specific individual or organisation, often using tailored information.
Question 97: For organisations, what is considered a highly effective technical measure to counter phishing attacks by adding an extra verification step during login?
Show Explanation
Correct Answer: C. Implementing two-factor authentication (2FA). Two-factor authentication (2FA) is considered a very effective method to counter phishing by adding an additional layer of security during the login process.
Question 98: Besides implementing technical measures, what policy should organisations enforce regarding employee passwords to mitigate phishing risks?
Show Explanation
Correct Answer: C. Enforcing strict password management policies, including frequent changes and no reuse. Organisations should enforce policies requiring strong passwords, frequent changes, and no reuse across applications to reduce phishing vulnerability.
Question 99: Educational initiatives for employees can help reduce the threat of phishing attacks by reinforcing what type of secure practices?
Show Explanation
Correct Answer: C. Not clicking on external email links and being cautious about unsolicited messages. Educating employees about not clicking suspicious links and being wary of unsolicited messages helps reduce phishing risks.
Question 100: What is vigilance activity considered to be an integral part of within an organisation?
Show Explanation
Correct Answer: C. Managerial function. Vigilance activity is described as an essential component of the overall managerial function.