Sep ’17 – Nov ’17 Quiz Issue: Vol. 16 No. 4 Please login or join today for member only downloads and resources. Take the Quiz 1. ___________ attacks may allow a cyber-attacker to use a malware trojan to bypass encryption and intervene undetected in a legitimate authenticated online financial transaction.* A) Man-in-the-browser B) Man-in-the-middle C) Man-in-the-mobile D) Man-in-the-cloud 2. Which of the following is a red flag for artwork transactions?* A) Agents acting for undisclosed buyers or sellers B) An artwork presented with limited or no documentation or provenance C) Clients who knowingly wish to sell at an artificially low or inflated price D) An artwork, which is an antiquity or whose source country is or has been in recent conflict 3. According to the article “You Have Been Hit with an Enforcement Action—Now what?,” there are five recommended points to recognize if you have been hit with an enforcement action. Which of the following is not one of the recommended points?* A) Do not invest B) Think long-term C) Higher the right expertise D) Partner with external and internal stakeholders 4. External threats—whether unintentional human error or intentional fraud—must be considered when managing enterprise risk.* A) True B) False 5. Which of the following is a basic risk that drives fraud?* A) Trust B) Lack of control mechanisms that provide opportunity C) Lack of deterrence or understanding about consequences D) All of the above Δ