Other APRP Stuff Flashcards

1
Q

Fedwire Funds are final and irrevocable upon completion of processing by the __________.

A

Federal Reserve Banks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Real-time Payments® (RTP) allows a financial institution to limit its exposure risk by:
a. Ensuring equipment is safeguarded
b. Utilizing prefunding
c. Utilizing a micro-payment prior to initiating live payment
d. Protection via Daylight-Overdraft

A

b. Utilizing prefunding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which regulation requires that a paying bank must return a check such that it is received by the Bank of First Deposit by 2:00 p.m. local time on the second business day following the date of presentment?

A

Reg CC expeditious return

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Under the Uniform Commercial Code, a Bank of First Deposit is liable for a warranty breach claim for forged/missing indorsement for up to:

A

3 years from the cash letter date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The exchange of check and check images between financial institutions is governed by:
a. Regulation CC
b. Uniform Commercial Code Articles 3 & 4
c. 31 CFR 220
d. Agreement

A

d. Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Credit Card transactions are governed by:

A

Regulation Z

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An institution’s board of directors may establish _________ to oversee audit functions and to report on audit matters periodically to the full board of directors.

A

an audit committee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___________ is a process designed to provide assurance regarding the achievement of objectives relating to operations, reporting and compliance.
a. Internal controls
b. Risk assessment
c. Layered security
d. Multi-factor authentication

A

a. Internal controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An audit of retail payment systems should include internal controls, management policies, and:
a. reconciliation
b. clearing and settlement
c. procedures
d. risk assessment

A

c. procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A transaction that posts to an account in real time may affect the balance available in the account immediately, however the posting may be temporary until the institution has completed all of the verification, balancing and reconciliation activities for:
a. Pending transactions
b. Provisional credit
c. Pre-approval
d. Memo posting

A

d. Memo posting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What entity orchestrates movement of payments and value-added messages to and from participants in a real time environment?

A

The Clearing House

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The process of ensuring the funds represented by the check are debited from and credited to accounts is called:

A

Check Collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For a Remotely Created Check, which party warrants the maker’s signature is authorized?

A

The Bank of First Deposit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who, What, Where, When and Why are all questions that should be addressed in the ________________.
a. Audit Policy
b. KYC
c. CIP
d. Written Procedures

A

d. Written Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Business continuity planning is an important part of managing which type of risk?

A

Operational Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Card Transactions authenticated with a signature rather than a PIN are called:
a. Single Message transactions
b. POS Transactions
c. Offline Transactions
d. Dual Message transactions

A

d. Dual Message transactions

17
Q

Open Loop Payment System

A

a general-purpose charge card that can be used anywhere that brand of card is accepted.

18
Q

Closed Loop Payment System

A

can only be used to make purchases from a single company or retailer, like a department store.

19
Q

Internally developed technology _______________ establish measurable controls and requirements to achieve policy objectives.
a. procedures
b. system maintenance schedules
c. standards
d. authentication requirements

A

c. standards

20
Q

A risk assessment includes an:
a. Analysis of the nature of the threat
b. Implementation of appropriate controls to reduce the potential for risk
c. Inventory of systems and information necessary to operations
d. Analysis of threats based on the impact to the institution and its customers

A

d. Analysis of threats based on the impact to the institution and its customers

21
Q

What alternative payment consists of money transfer without money movement and utilizes a network of connections to conduct the transaction?

A

Hawala

22
Q

A network that provides payment services directly to merchants and cardholders by the owner of the network without involving a third party as an intermediary is:

A

Closed Loop Payment System

23
Q

The PCI Security Standards Council defines cardholder data as full Primary Account Number or full PAN with any of the following:
a. Cardholder Name, Expiration Date and CVC
b. Cardholder Name, Expiration date
c. Cardholder Name and Service Code
d. Cardholder Name, Expiration Date and Service Code

A

a. Cardholder Name, Expiration Date and CVC

24
Q

According to COSO, Enterprise Risk Management is:
a. The responsibility of a designated department within the organization
b. A function within the organization
c. The culture, capabilities, and practices that organizations integrate within their strategy to manage risk and preserve and realize value
d. Managing a listing of various risks that impact an organization

A

c. The culture, capabilities, and practices that organizations integrate within their strategy to manage risk and preserve and realize value

25
Q

According to COSO, ______________ is the amount of risk, on a broad level, an entity is willing to accept in pursuit of value.
a. Risk culture
b. Risk tolerance
c. Risk insurance
d. Risk appetite

A

d. Risk appetite

26
Q

Which of the following steps is included in a Business Impact Analysis?
a. Identifying potential impact of business disruptions
b. Prioritizing potential business disruptions
c. Implementing mitigation strategies
d. Revising business continuity plan

A

a. Identifying potential impact of business disruptions

27
Q

According to the FFIEC, financial institutions engaged in retail payment systems should establish an appropriate process that:
a. requires dual control for processing and settlement
b. implements multi-factor authentication for internet banking
c. requires a periodic risk assessment review
d. identifies, measures, monitors, and limits risks

A

d. identifies, measures, monitors, and limits risks

28
Q

An individual or company that has authorized an Originator to initiate an ACH entry to their account with the RDFI.
a. Sender
b. Pulser
c. Receiver
d. Transmitter

A

c. Receiver

29
Q

Process of verifying the identity of an individual user, machine, software component or any other entity.
a. Encryption
b. Identification
c. Authentication
d. Authorization

A

c. Authentication

30
Q

Testing method used to apply a specific event scenario to the business continuity plan (BCP).
a. Business Continuity Test/disaster Recovery Exercise
b. Tabletop Exercise/structured Walk-through Test
c. Functional Drill/parallel Test
d. Walk-Through Drill/Simulation Test

A

d. Walk-Through Drill/Simulation Test