Topic 24: Security Flashcards

(25 cards)

1
Q

What is Authorised Push Payment APP fraud? a) Customer pays via cheque b) Card is stolen at ATM c) Customer is tricked into approving a payment to a fraudster d) Payment fails due to network error

A

Answer: C - Customer is tricked into approving a payment to a fraudster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is synthetic identity fraud? a) Use of a stolen debit card b) Combining real and fake data to create a new identity c) Changing address details d) Using expired ID

A

Answer: B - Combining real and fake data to create a new identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is insider fraud? a) Hacking a system from outside b) Accessing a card database externally c) Employees misusing internal access to commit fraud d) Fake ATM installed

A

Answer: C - Employees misusing internal access to commit fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is account takeover? a) Opening a new business account b) Customer switches bank c) Fraudster gains control of a legitimate account d) Cancelling a lost card

A

Answer: C - Fraudster gains control of a legitimate account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is phishing in the context of payment fraud? a) Fake investment strategy b) Physical skimming device c) Email scam to steal credentials or trick payments d) Use of fake loyalty cards

A

Answer: C - Email scam to steal credentials or trick payments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does smishing refer to? a) Social network impersonation b) SMS-based fraud to extract information c) Security breach from malware d) False delivery updates

A

Answer: B - SMS-based fraud to extract information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is vishing? a) Audio-based password verification b) In-person ID check c) Fraud via phone calls to deceive and extract information d) Changing email preferences

A

Answer: C - Fraud via phone calls to deceive and extract information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the C in CIA triad stand for? a) Cost b) Confidentiality c) Centralisation d) Cloud

A

Answer: B - Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does confidentiality mean in cybersecurity? a) Open user access b) Full audit history c) Preventing unauthorised access to data d) Data printing

A

Answer: C - Preventing unauthorised access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does integrity refer to in the CIA triad? a) System branding b) Backup speed c) Ensuring data accuracy and protection from tampering d) Full data access

A

Answer: C - Ensuring data accuracy and protection from tampering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the A in CIA triad? a) Access b) Authentication c) Availability d) Allocation

A

Answer: C - Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does availability mean in system security? a) Blocking payment channels b) System shut down c) Ensuring systems are accessible when needed d) Auditing login attempts

A

Answer: C - Ensuring systems are accessible when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does multi-factor authentication use to verify identity? a) Only username b) Single password c) Combination of known possessed or inherent factors d) Address and date of birth

A

Answer: C - Combination of known possessed or inherent factors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of transaction monitoring? a) Encrypt messages b) Detect suspicious payment patterns c) Confirm KYC forms d) Update customer contact details

A

Answer: B - Detect suspicious payment patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does behavioural analytics help prevent fraud? a) Compare prices b) Track login times c) Monitor customer habits to identify anomalies d) Verify CVV codes

A

Answer: C - Monitor customer habits to identify anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are blacklists used for in fraud prevention? a) Filter spam messages b) Block known fraud actors from initiating payments c) Organise contact lists d) Store invoice numbers

A

Answer: B - Block known fraud actors from initiating payments

17
Q

What are customer alerts used for? a) Send monthly statements b) Inform about weather risks c) Notify users of login or payment activity d) Promote new products

A

Answer: C - Notify users of login or payment activity

18
Q

What is the first line of defence in fraud governance? a) External auditors b) Customer call centre c) Business units handling daily checks d) Law enforcement

A

Answer: C - Business units handling daily checks

19
Q

What is the second line of defence in security governance? a) Payment providers b) IT contractors c) Risk and compliance teams monitoring issues d) Sales representatives

A

Answer: C - Risk and compliance teams monitoring issues

20
Q

Who provides independent assessments as the third line of defence? a) Customer support b) Regulators c) Internal audit d) Product marketing

A

Answer: C - Internal audit

21
Q

What is a key purpose of regular reviews in security governance? a) Increase ad targeting b) Manage customer birthdays c) Strengthen fraud prevention and system resilience d) Identify new markets

A

Answer: C - Strengthen fraud prevention and system resilience

22
Q

Why is staff training important in fraud prevention? a) Ensure login speed b) Deliver uniform branding c) Help employees detect and respond to threats d) Promote credit usage

A

Answer: C - Help employees detect and respond to threats

23
Q

What is system redundancy used for in security? a) Back up to reduce service disruption b) Erase old transactions c) Track refund history d) Speed up logins

A

Answer: A - Back up to reduce service disruption

24
Q

How does DDoS mitigation relate to availability? a) Prevents data theft b) Stops insider fraud c) Protects systems from being overloaded and ensures uptime d) Blocks phishing emails

A

Answer: C - Protects systems from being overloaded and ensures uptime

25
Why is layered security important in fraud prevention? a) Encourages faster transfers b) Simplifies backend systems c) Provides multiple defences across different threat points d) Disables manual controls
Answer: C - Provides multiple defences across different threat points