Try 10 focused CISI CFC questions on Fraud and Market Abuse, with answers and explanations, then continue with Securities Prep.
| Field | Detail |
|---|---|
| Exam route | CISI CFC |
| Issuer | CISI |
| Topic area | Fraud and Market Abuse |
| Blueprint weight | 4% |
| Page purpose | Focused sample questions before returning to mixed practice |
Use this page to isolate Fraud and Market Abuse for CISI CFC. Work through the 10 questions first, then review the explanations and return to mixed practice in Securities Prep.
| Pass | What to do | What to record |
|---|---|---|
| First attempt | Answer without checking the explanation first. | The fact, rule, calculation, or judgment point that controlled your answer. |
| Review | Read the explanation even when you were correct. | Why the best answer is stronger than the closest distractor. |
| Repair | Repeat only missed or uncertain items after a short break. | The pattern behind misses, not the answer letter. |
| Transfer | Return to mixed practice once the topic feels stable. | Whether the same skill holds up when the topic is no longer obvious. |
Blueprint context: 4% of the practice outline. A focused topic score can overstate readiness if you recognize the pattern too quickly, so use it as repair work before timed mixed sets.
These questions are original Securities Prep practice items aligned to this topic area. They are designed for self-assessment and are not official exam questions.
Topic: Fraud and Market Abuse
A surveillance analyst sees linked client accounts buying a thinly traded share shortly before a takeover rumour appears online. The price rises sharply, the accounts sell into the spike, and an internal log shows an employee viewed a confidential draft announcement without business need. Which response best applies a sound anti-financial-crime control principle?
Best answer: D
What this tests: Fraud and Market Abuse
Explanation: The combination of linked-account trading, a rumour-driven price move, and possible access to confidential information is a clear market-abuse red flag. The best response is prompt internal escalation, record preservation, and consideration of whether regulatory reporting is needed; firms should not wait for proof before acting.
This scenario contains several classic indicators of possible market abuse: coordinated trading, suspicious timing ahead of a rumour, rapid profit-taking, and a potential information leak from inside the firm. Applying a sound escalation and governance principle means the firm should treat these facts as sufficient suspicion to escalate immediately to the relevant compliance or market-abuse function, preserve trading and communications records, and assess whether external reporting, such as a STOR, is required. A firm does not need conclusive proof before escalating; it needs a defensible process for handling credible red flags. Routine customer due diligence or direct client contact may be considered later if appropriate, but they are not the first control response here. The key point is to escalate on suspicion, not to wait for certainty.
Suspicion created by the trading pattern, rumour timing, and possible information leak should trigger immediate escalation and record preservation.
Topic: Fraud and Market Abuse
During an internal review at a UK trust company, compliance finds that a trustee transferred £25,000 from a beneficiary’s account to his own company to ease its cash flow. He was entrusted to safeguard the beneficiary’s interests and had authority to make payments on the account. Under the Fraud Act 2006, which offence is most clearly illustrated?
Best answer: B
What this tests: Fraud and Market Abuse
Explanation: This is fraud by abuse of position because the trustee was in a role requiring him to protect the beneficiary’s financial interests and he used that position dishonestly for personal gain. The core feature is misuse of entrusted authority, not a lie on a form or a failure to disclose required information.
Fraud by abuse of position applies when someone occupies a position in which they are expected to safeguard another person’s financial interests and then dishonestly abuses that position to make a gain or cause a loss. In this scenario, the decisive facts are that the individual was a trustee, had legitimate authority over payments, and diverted money to his own company. That makes the misuse of trust and authority the heart of the misconduct.
Fraud by false representation would depend on a dishonest statement or implied representation being the key mechanism. Fraud by failing to disclose information would require a legal duty to disclose and a dishonest omission. Here, the clearest fit is abuse of position because the trusted role itself was exploited.
He dishonestly misused a trusted position in which he was expected to protect another person’s financial interests.
Topic: Fraud and Market Abuse
A broker’s operations analyst can add a new client settlement bank account and, using an emergency override, release a withdrawal without a second approver. Clients calling the service desk are authenticated using only account number and date of birth. Which feature most materially increases the firm’s fraud exposure?
Best answer: B
What this tests: Fraud and Market Abuse
Explanation: The strongest fraud risk comes from combining privileged access, override capability, and weak authentication. That setup can let one person change where money goes and release it without effective challenge, or allow an impersonator to pass simple checks.
The core concept is control bypass. Fraud exposure rises sharply when one person can both amend payment destination details and override the normal second-approval control. Weak client authentication adds another route for abuse, because an external fraudster could impersonate the client and trigger the change, while the insider access and override rights make it easier to complete the withdrawal. Together, those facts weaken segregation of duties and maker-checker controls, which are key anti-fraud defences.
A new settlement account or a telephone instruction may be higher-risk features, but they do not by themselves create the same exposure if robust verification and independent authorisation remain in place. The key issue is the ability to bypass challenge and release funds.
This combination undermines segregation of duties and makes both insider fraud and client impersonation easier.
Topic: Fraud and Market Abuse
A UK wealth manager allows one operations employee to amend client payee details, approve payments below £20,000, and complete the daily cash reconciliation. Several small transfers have been sent to a newly added payee, and no independent check was performed when the payee details were changed. Which control improvement would best reduce the fraud risk?
Best answer: B
What this tests: Fraud and Market Abuse
Explanation: The main fraud risk is that one person controls the data, the approval, and the reconciliation, allowing a false payee to be created, paid, and then concealed. Segregation of duties plus independent review of standing data changes is the strongest preventive control.
This scenario shows a classic internal fraud vulnerability: the same employee can change payment data, authorise transfers, and then reconcile the account. Strong controls reduce fraud risk because they make it harder for one person to both commit and hide a fraud. Separating duties creates a maker-checker process, and independent review of payee or standing-data changes helps detect unauthorised amendments before money leaves the firm.
A good control design here would ensure that:
Training and audit can support the control environment, but they do not remove the immediate opportunity for a single employee to manipulate the full payment process. The key takeaway is that preventive controls over data, approvals, and reconciliation are stronger than retrospective checks alone.
This directly addresses the control weakness by separating key duties and adding an independent check over sensitive data changes.
Topic: Fraud and Market Abuse
A firm’s payment process requires one employee to create a new supplier, a manager to approve the payment instruction, and a separate finance team to compare daily bank movements with the ledger. Which fraud-prevention control is this most clearly demonstrating?
Best answer: C
What this tests: Fraud and Market Abuse
Explanation: This is most clearly segregation of duties. By splitting supplier setup, payment approval, and independent checking across different people, the firm reduces the chance that one individual can both carry out and hide a fraud.
Segregation of duties means dividing incompatible tasks between different people or teams, such as setup, approval, execution, and review. In the stem, supplier creation, payment approval, and bank-to-ledger checking are deliberately separated. That reduces fraud risk because an employee trying to create a false supplier or unauthorised payment cannot also control every later step needed to release funds and conceal the activity.
Reconciliation does appear in the process, but it is only one checking stage within a wider control design. The main safeguard being described is the separation of responsibilities across the process. The key point is that fraud becomes harder when no single person can initiate, approve, and hide the same transaction.
It separates initiation, approval, and checking so one person cannot easily perpetrate and conceal a fraudulent payment.
Topic: Fraud and Market Abuse
An internal audit team reviews the payments process at an investment firm.
Exhibit:
Internal audit note
- Client bank details can be amended by any payments analyst.
- Withdrawals up to £20,000 can be released by the same analyst if the team leader is unavailable.
- End-of-day payment reconciliation is completed by the analyst who processed the withdrawal.
- Standing-data changes are logged, but no one independently reviews the log.
Based on the exhibit, which interpretation is best supported?
Best answer: A
What this tests: Fraud and Market Abuse
Explanation: The exhibit shows incompatible duties concentrated in one individual: changing bank details, potentially releasing a payment, and reconciling it afterwards. That combination can let an employee create a false payment path and then conceal it, which is why strong data controls, approvals, reconciliation, and segregation of duties reduce fraud risk.
This is a classic internal fraud-control weakness. Standing data such as client bank details is highly sensitive because changing it can redirect legitimate payments to a fraudster-controlled account. If the same person can also release the withdrawal and then perform the reconciliation, there is no independent check at the key stages where fraud could be created and hidden.
Strong anti-fraud controls usually separate these activities:
A log helps only as a detective record, and here it is weaker still because no one independently reviews it. The threshold detail matters, but the broader control failure is the lack of segregation and independent review across the whole process.
The exhibit shows weak standing-data control, weak approval segregation, and non-independent reconciliation concentrated in one person.
Topic: Fraud and Market Abuse
At a wealth manager, one operations supervisor can reset client portal passwords, amend client bank details and approve “urgent” withdrawal overrides. The role currently uses only a password, and override use is checked only by post-event sampling. Which action best applies a risk-based anti-fraud principle?
Best answer: C
What this tests: Fraud and Market Abuse
Explanation: The main fraud risk comes from concentrated insider power combined with weak authentication. A risk-based response is to strengthen access controls, reduce the ability of one person to complete the whole activity, and ensure override use is independently visible and reviewable.
This scenario involves high-risk privileged access: one employee can reset credentials, change payment details and approve an override, all protected only by a password. That combination materially increases fraud exposure because it enables both unauthorised action and concealment. The best application of a risk-based anti-financial-crime principle is to strengthen authentication, introduce segregation of duties and subject overrides to independent logging and review.
These controls address the core risk at source:
Measures aimed only at customers or only at after-the-event monitoring do not adequately control this insider-risk pattern.
Privileged access plus override capability requires stronger preventive controls, not just after-the-event checking.
Topic: Fraud and Market Abuse
A firm’s internal escalation note states:
Role: Client-services administrator
Authority: may amend payment details for elderly clients
Findings:
- changed a client's income-payment account to one in his own name
- no client instruction or power of attorney on file
- processed two payments using his normal system access
- role required him to safeguard client account details
Under the UK Fraud Act 2006, which offence is best supported by this note?
Best answer: D
What this tests: Fraud and Market Abuse
Explanation: The strongest fit is fraud by abuse of position. The decisive fact is that the employee held a trusted role and used that position to divert client payments for his own benefit.
Fraud by abuse of position applies where someone occupies a position in which they are expected to safeguard another person’s financial interests, and dishonestly abuses that position intending to make a gain or cause a loss. Here, the administrator was specifically entrusted to amend payment details for elderly clients and protect their account information, yet changed the destination account to one in his own name and used his normal access to process payments. That trusted-role element is what makes abuse of position the best-supported interpretation.
False representation would require the case to depend mainly on a dishonest statement or misleading impression, and failing to disclose would require a relevant legal duty to reveal information. The exhibit instead centres on misuse of entrusted authority. The closest distractor is theft, but the facts more precisely match the Fraud Act offence built around breach of a position of trust.
The note shows a trusted employee misusing authorised access in a role where he was expected to protect the client’s interests.
Topic: Fraud and Market Abuse
Which statement best explains why firms use watchlists and restricted lists alongside surveillance and escalation processes in market-abuse controls?
Best answer: C
What this tests: Fraud and Market Abuse
Explanation: Watchlists and restricted lists are market-abuse tools, not AML, sanctions, or prudential-risk lists. Their purpose is to highlight securities linked to possible inside information so firms can apply surveillance, restrict dealing where needed, and escalate concerns promptly.
The core concept is prevention and detection of insider dealing and other market-abuse risks. A watchlist helps a firm identify securities connected to confidential or potentially price-sensitive matters. A restricted list goes further by limiting or prohibiting certain trading or related activity in those securities. Surveillance then monitors behaviour for unusual patterns, and escalation ensures concerns are reviewed by the right control function quickly.
Together, these controls reduce the risk that inside information is misused or improperly disclosed. The closest distractors confuse market-abuse controls with AML, sanctions, or prudential frameworks, which serve different purposes.
These controls help firms identify heightened insider-dealing risk and respond through monitoring, restrictions, and escalation.
Topic: Fraud and Market Abuse
What best describes the broad purpose of the UK Fraud Act 2006?
Best answer: D
What this tests: Fraud and Market Abuse
Explanation: The Fraud Act 2006 was designed to modernise and simplify fraud law. Its broad purpose is to focus on dishonest behaviour aimed at making a gain or causing, or exposing another to the risk of, a loss, rather than relying on a patchwork of older deception offences.
The core idea behind the UK Fraud Act 2006 is simplification of fraud law. Instead of relying mainly on older deception-based offences, it organises fraud around dishonest conduct and the intention to make a gain for oneself or another, or to cause loss or risk of loss to another. In practice, this supports a broader and more workable framework for fraud offences, including fraud by false representation, by failing to disclose information, and by abuse of position.
A key point is that the law is not limited to situations where loss has already happened. The dishonest intent and the gain-or-loss objective are central. It also does not replace other financial-crime regimes such as bribery or insider dealing, which remain separate offences under different laws.
The closest trap is the idea that actual loss must already be proved, which is too narrow.
The Act modernised fraud law by focusing on dishonest behaviour and intended gain-or-loss outcomes rather than older, narrower deception offences.
Use the CISI CFC Practice Test page for the full Securities Prep route, mixed-topic practice, timed mock exams, explanations, and web/mobile app access.
Read the CISI CFC guide on SecuritiesMastery.com, then return to Securities Prep for timed practice.