Question 51

According to fraud tree, cash has three following schemes:
  • Question 52

    The person or persons who have access to __________ are often the targets of unethical vendors seeking an advantage in the process.
  • Question 53

    When employees avoid detection in a refund scheme to keep the sizes of the disbursement low, is referred to:
  • Question 54

    Sergio receives a fraudulent text message that appears to be from his bank. The message claims that there has been suspicious activity on his account and provides a link for him to click on to sign into the bank's website and obtain more information. Sergio is MOST LIKELY being targeted by which of the following types of social engineering schemes?
  • Question 55

    Neil, a Certified Fraud Examiner (CFE), discovers that a borrower used the same property as a security, or guarantee, to obtain multiple loans from different financial institutions before they were recorded on his credit report. Which type of loan fraud BEST describes the scheme Neil uncovered?