Professional Documents
Culture Documents
FORP 112 Toetse
FORP 112 Toetse
TYD/TIME: 8:30
TOTAAL/TOTAL: 30
1.1 Oor watter twee ander velde behalwe rekeningkunde moet die forensiese
Aanvaar ook
Over which two other fields except accounting, do the forensic accountant require
Also accept
Antwoord
Ondersoeke vir SARB of FSB oor beleggings strukture soos Ponzi skemas of ander
Explain two types of regulatory investigations a forensic accountant can get involved in.
[2]
Answer
Investigation for the SARB or FSB on investment structures such as Ponzi schemes
1.3 Bepaal die forensiese rekenmeester se verslag of bedrog of diefstal gepleeg is?
Indien nie, watter ander twee persone is betrokke by die proses om te bepaal of
Antwoord
Nee die forensiese rekenmeester bepaal nie of bedrog of diefstal gepleeg is nie. Dit
Does the forensic accountant‟s report determine whether fraud of theft has been
committed? If not, who is involved in the process to determine whether fraud or theft
Answer
No the report does not determine whether fraud or theft have been committed. The
teenstaan
verkiesings bepaal deur geld is net van die gevolge van korrupsie [1]
List two examples of public corruption that Transparency International opposes. [2]
elections decided by money are just some of the consequences of public sector
corruption. [1]
2.2 Noem two instansies van waar Transparency International inligting verkry vir die
Wêreldbank [1]
n Land moet ten minste 3 bronne hê om ingesluit te wees by die publieke korrupsie
indeks [1]
how many sources does a country require before it can be included in the Public
Answer [max 2 points for institutions and 1 point for number of sources]
A country needs at least 3 sources to be included in the public corruption index. [1]
2.3 Verduidelik hoe omkopery werk tesame met ‟n voorbeeld van ‟n omkoopbetaling.
Antwoord
Kontant (bruin koevert) , persoonlike dienste (huis verbeteringe-bou van ʼn braai of),
Explain how bribery works along with an example of bribery payment . [2]
Answer
renovating a bathroom), free goods (watches, car, electronic equipment (tablet /smart
expenses) [1]
2.4 Watter land het lae vlakke van korrupsie? [enige van die volgende lande]
Denmark (91), New Zealand (90) Finland (89), Sweden (88), en Switzerland (86)
Which country has low levels of corruption? [any of the following countries] [1]
Denmark (91), New Zealand (90) Finland (89), Sweden (88), en Switzerland (86)
2.5 Op watter amptenare fokus die FCPA wetgewing en noem een vereiste van die FCPA.
Antwoord
On which officials do the FCPA focus and list one requirement of the FCPA. [2]
Answer
Requirements
3.1 Hoeveel persone in hoeveel lande het aan PWC se ekonomiese misdaad opname
deelgeneem.
How many respondents in how many countries participated in the PWC Economic
Answer
Antwoord (Enige van die volgende kategorieë – ½ punt vir die noem van die
• Insider is nie net jou werknemers maar ook vetrouenswaardige derde partye met
toegang tot sensitiewe data wat nie direk onder jou beheer is nie
• Terroriste is „n relatiewe nuwe bedreiging wat insluit ontwrigting and kuber oorlog –
besighede
• Kuber kraker aktiviste bedreiging sluit in diens onderbrekings and reputasie skade
Answer (1/2 point for listing category and ½ point for explaining it)
• Insiders not only your employees but also trusted third parties with access to
• Terrorists still relatively new threat that include disruption and cyber warfare –
include high profile organisations and governments (can include any organisation)
Antwoord
Monitêre kuberbedrog
Ongeag van die hoë profiel lei dit gewoonlik nie tot die ondergang van 'n maatskappy
nie" [1/2]
"Die mees kritiese element van kuber misdaad is internasionale kuber spioenasie –
vernietiging van 'n lyn van besigheid of 'n maatskappy of 'n groter
Nie net is dit moeilik om te identifiseer nie maar dit mag nie eers op 'n
Explain the difference between cybercrime and an extinction level event. [2]
Answer
Monetisable cybercrime
"Monetisable cybercrime, such as identity and payment card theft, are the
events that tend to grab the headlines [1/2], with millions of dollars of losses
Despite their high profile, they rarely pose an existential threat to companies." [1/2]
negotiating strategies and the like Coca cola‟s recipe of Sasol‟s process to
Cyber professionals call such breaches “extinction-level events”, and for good
reason:
the damage could extend to the billions of dollars and include destruction of a
Not only are these kinds of attacks difficult to detect,they may not even be on
Onderhoude gevoer met 200 gevangenes in die tronke van die Midwest om uit te vind
wat daartoe lei dat mense oorweldig word deur die versoeking om bedrog te pleeg en
Answer
embezzlers [1/2]
Interviews with 200 inmates in Midwest prisons and was interested in the
4.2 Verduidelik watter addisionele element word vervat in die bedrog diamant en
Antwoord
Bedrog kan nie suksesvol gepleeg word sonder 'n bedrieër wat oor die vermoë
Vermoë kan die elemente van die bedrog driehoek verander in 'n realiteit [1/2]
Posisie
is [1/2]
Intelligente, ervare en kreatiewe mense het 'n goeie verstandhouding van die
Bedrieërs het ook 'n sterk ego en selfvertroue dat hulle nie ontdek sal word nie [1/2]
Het die vermoe om konstant vir beleggers, ouditeure en ander te jok en kan
Die pleeg van 'n bedrieglike daad en om dit geheim te hou skep baie spanning
[1/2]
Explain what is the additional element of the fraud diamond and explain two elements
Answer
Capability can use the elements of the fraud triangle and turn it into a reality[1/2]
Fraudster also have a strong ego and confidence that he will not be detected
[1/2]
Egoistic person is driven to succeed at all costs, self absorbed, self confident
Must be able to lie consistently to investors, auditors and others and keep track
of lies [1/2]
[1/2]
5 Jy word by die koshuis gevra om ‟n kort voorlegging te maak oor ID diefstal, deur die
5.1 Noem twee maniere hoe misdadigers jou persoonlike inligting kan misbruik.
Geld trek uit jou bankrekening deur jou pin te gebruik en gekloonde kaart te gebruik
ens
In sekere gevalle kan misdadigers na jou bank toe gaan en transaksies op jou
List two ways how criminals can abuse your personal information. [2]
Acquire retail or bank accounts such as Woolworths or Mr Price card etc or bank
Draw money from your bank account using your pin and cloned card
5.2 Verduidelik hoe kloning (skimming) werk en waar dit kan gebeur
Antwoord
en voer aan dat hulle vir die bank werk. Die teikenpersoon word aangeraai om
sy/haar kaart te "re-aktiveer" deur sy/haar kaart deur 'n "kaart re-aktiveringstoestel"
te trek. [1/2]
Die oortreders gebruik die inligting op gesteelde kaarte om 'n vervalsde kaart te skep
en die klante-PIN met die nuwe kaart te koppel om bedrieglike transaksies uit te
voer. [1/2]
Kloning by n OTM
gebruik om op 'n bedrieglike wyse 'n afskrif van 'n bank se klantbesonderhede,
wat op die magnetiese strook gestoor word (bruin/swart strook aan die
maak [1/2]
Wanneer jy jou kaart toon vir betaling, loop jy die risiko dat jy die slagoffer van
OTM's [1/2] en, tot 'n mindere mate, by groot- en kleinhandelaars wanneer jy
Explain one possible danger that relates to ID theft to your fellow students when they
Answer
Skimming
Shoulder surfing
a transaction and claim to work for the bank. The target is advised to „re-
activate‟ their cards by swiping the card through a „card reactivating device‟.
[1/2]
The „card reactivating device‟ is actually a hand held skimming device. This
card and match the customer PIN to the new card to make fraudulent
transactions. [1/2]
At the ATM
copy bank customer details stored on the magnetic strip (brown/black strip
Card readers and pin hole cameras are installed on the ATM to obtain card
information [1/2]
The customer and card information stolen with skimming devices is often
Whenever you present your card for payment you run the risk of being
TYD/TIME: 8:00
TOTAAL/TOTAL: 35
1 Jou vriend vertel dat julle die April vakansie Plettenbergbaai toe gaan want hy het ‘n
tesame met ‘n klein admin fooi (R500) om die vakansie te bevestig. Verduidelik aan
1.1 Wat is uitvissing en die moontlike gevaar van die kompetisie? [3]
Antwoord
• Uitvissing is 'n metode van bedrieglike verkryging van persoonlike inligting soos
wyse, geld. Oortreders bel jou of stuur 'n e-pos wat blyk asof dit van 'n betroubare
bronne afkomstig is, soos banke, ander finansiële instellings of erkende maatskappye.
[1]
of ander sensitiewe inligting verkry, verifieer of opdateer deur op 'n skakel te klik wat
gebruikers na 'n nagemaakte webtuiste lei ('n webtuiste deur die misdadigers ontwerp
om gebruikers te flous deur hulle te laat dink dit is die ware webtuiste) soos wen van
Aanlyn kompetisie – Weet nie altyd met jy te doen het nie [1]
Moet persoonlike besonderhede verskaf aan ‘n party wat hy nie ken nie [1]
Hoekom moet ’n klein admin fooi betaal word? Hy het die kompetisie dan gewen [1]
1.2 Noem twee stappe wat jy moet neem indien jy ‘n slagoffer is van ID diefstal. [2]
Antwoord
Lig in jou bank, versekeringsmaatskappy en ander entiteite waar jy tans 'n kliënt is [1]
Lig in die onderskeie partye wat die gesteelde dokument(e) uitreik, soos die
Indien jy vermoed dat jou pos dalk gesteel, weggewend of aan gepeuter is, kontak
Your friend tells you that your are going to Plettenberg bay during the April break
because he won a competition. All he has to do is to email his personal details along
with a small admin fee (R500). Explain the following to your friend:
1.1 What is phishing and what is the possible danger of this competition? [3]
Answer
passwords, identity numbers, credit card details and sometimes, indirectly, money.
Perpetrators might call you or send e-mails that appear to be from trusted sources
Typically, Phishing emails request that users obtain, verify or update contact details or
other sensitive financial information by clicking on a link in the email that directs users
to a spoofed website (a website designed by criminals to fool users into thinking that it
is legitimate) such as winning the UK lottery emails, SARS refund, verify banking
Online competition – don’t know who you are dealing with [1]
Why does he need to pay an admin fee of R500? He won the competition [1]
1.2 List two steps you need to take when you were a victim of ID theft. [2]
Answer
Notify your bank, insurance company and other entities where you currently are a
client. [1]
Notify the party that issues the stolen document(s) such as the Department of Home
Affairs for passports and ID books and the Traffic and Licensing Department for
If you suspect that your mail may have been stolen, diverted or tampered with
Contact the South African Fraud Prevention Services (SAFPS) for assistance if you
are a victim of ID theft (SAFPS Help-Line number is 0860 101 248). [1]
2.1 Gedurende tender bedrog is daar gewoonlik samespanning tussen die bedrieër en ‘n
bedrieër voordeel oor tenders van die maatskappy beampte en/of regeringsamptenaar
Antwoord
Die maatskappy beampte pas die spesifikasies van die kontrak so aan dat dit die
maatskappy se voorstel bevorder sodat die kontrak aan hulle toegeken kan word [1]
During tender fraud there is normally collusion between the fraudster and a company
employee and/or public official. Explain three ways a fraudster aims to obtain benefit
about tenders from the company employee or public official during tender fraud? [3]
Answer
The company officials might identify a need for goods or services that needs to go
tender
The company official tailor specifications of the contract for the benefit of the corrupt
better proposal
During tender award process the corrupted official will favour the corrupt companies
Antwoord
Kan 'n werklike persoon wees (vriend of familielid) – maar werk nie vir die werkgewer
nie
Answer
Can be a real person (friend or relative) – but not working for the employer
Antwoord
Rekeninge
Balanstaat rekening
Voorsienings rekening
Afwag rekening
Diverse debiteure/krediteure
Mr Con is die accountant of ABC Limited and has concealed fictitious hotel bills and
flight tickets in the accounting system. What accounts will you investigate and what
Answer
Accounts
Provision accounts
Sundry debtors/creditors
Documents
2.4 Verduidelik die rol van twee persone wat betrokke sal wees wanneer voorraad te kort
afgelewer word en hoe sal die voorraad wat te kort afgelewer word te boek gestel
word?
Antwoord
Drywer [1/2] – In beheer van voorraad op trok terwyl dit vervoer word. Kan ‘n
gedeelte verkoop oppad na klient en ontvangsklerk word omgekoop om die tekort oor
te sien. [1/2]
Ontvangs klerk by pakhuis [1/2] – Tel nie die voorraad wat afgelewer word nie om
tekort agter te kom nie of is in samewerking met die drywer om die tekort oor te sien.
Sal soos n gewone voorraad aankoop transaksie lyk maar dit sal n oorbetaling wees
Explain the role of two persons that will be involved when stock is short delivered and
Answer
Driver [1/2] – Responsible for goods on route to customer. Sells goods along the way
Receiving clerk [1/2] – Don’t count goods on receipt that leads to shortage not being
discovered or is in collusion with the driver and deliberately overlooks the shortage
[1/2]
Looks like a normal stock purchase but results in an overpayment to the supplier.
Antwoord
Answer
2.6 Verduidelik twee verskille tussen ’n Trojan horse virus en ’n computer worm.
Antwoord
Trojan horse verg menslike aksie – oopmaak van n program wat onskadelik lyk [1/2].
Computer worm versprei vanself deur kontakte in jou email sonder menslike aksie
[1/2]
Trojan horse kan nie self repliseer nie [1/2] terwyl ‘n computer worm aanhoudend kan
Explain two differences between a Trojan horse virus and a computer worm. [2]
Trojan horse requires human intervention – running a programme that appears useful
[1/2]
Computer worm does not require human intervention and spreads itself by using
Trojan horse can’t replicate itself but a computer worm can replicate itself by using
2.7 Verduidelik hoe werk ’n key logger and watter inlgting wil dit bekom.
Antwoord
Kan USB of wireless keylogger wees [1/2] wat rekord van sleutel slae op die
rekenaar [1/2]
Sleutelslae word herwin om vertroulike inligting [1/2] soos wagwoorde vir internet
Explain how a key logger works and what information it wants to obtain. [2]
Answer
Can be a USB of wireless devices [1/2] that records keystrokes on the computer [1/2]
Keystrokes are mined to identify confidential information [1/2] such as passwords for
3.1 Verduidelik die verskil tussen die bestuursmodelle wat voorgestel word volgens die
Antwoord
ouditeure [1/2]
Explain the difference between the management models proposed by the 1973
Answer
1973 Companies Act is a shareholders model that focus on shareholder’s value [1/2]
2008 Companies Act is stakeholder model that does not only focus on shareholders
value [1/2] but also on the interest of other parties such as the suppliers, workers and
3.2 Verduidelik twee redes hoekom die forensiese rekenmeester die verskillende
Antwoord
wat nodig is gedurende die ondersoek of werk saam met ondersoek span [1]
Explain two reasons why the forensic accountant needs to know the different
Answer
Management, internal audit, the external auditor and forensic personnel provide
information that is needed during the investigation or work in conjunction with the
3.3 Noem twee tipes maatskappye wat ‘n oudit komitee moet hê.
Antwoord
Publieke maatskappy
Maatskappy in staatsbesit
Answer
Public companies
Antwoord
Wesenlikheid dui op die beduidenheid van 'n transaksie of 'n groep transaksies [1]
Eksterne ouditeur gee dus slegs redelike gerusstelling en nie 100% gerusstelling nie
Eksterne ouditeur voer ouditprosedures uit om inligting te verkry om die risiko van
Answer
External auditor only provides reasonable assurance and not 100% assurance –
External auditor should perform the audit to reduce the risk of material misstatement
3.5 Wat is die verskil tussen die eksterne en die interne ouditeure?
Antwoord
bestuursproses [1/2]
Eksterne ouditeur – Lewer ‘n opinie of die finansiële state voorberei is, in alle
What is the difference between the external and internal auditors? [1]
Answer
Internal auditor provides assurance about the internal control environment and risk
External auditor expresses an opinion whether the financial statements are prepared,
Die direkteure word aangestel deur die aandeelhouers om die maatskappy namens
Die direkteure is verantwoordelik om te verseker dat die maatskappy 'n lopende saak
Die direkteure moet verseker dat hulle effektiewe beheer oor die maatskappy het,
bestuur en beheer van die maatskappy het en betrokke is by alle wesenlike besluite
The directors are appointed by the shareholders to manage the company on behalf
of the shareholders
The directors are responsible to ensure that the company remains a going concern
The directors must ensure that it effectively controls the company, governs, direct
and control the management of the company and is involved in all material
3.7 Wat behels risiko beheer en hoe word bedrog risiko daarby ingesluit?
Antwoord
Risiko bestuur is die manier hoe bestuur probeer om die balans tussen die
geleenthede wat dit ontsluit te optimaliseer deur die neem van risiko's [1] \
What does risk management entail and how is fraud risk included in it? [3]
Answer
Risk management is the way management tries to optimise the balance between the
and the cost of protecting the value the company is putting at risk.[1]
Economic crime is a business risk and should be treated like any other business risk
[1]
TYD: 09h30
MODERATOR: A van Zyl
Verduidelik hoe die Suid-Afrikaanse reg ontwikkel het // Explain how the South African law
developed
Die SA regstelsel het sy ontstaan in die Romeinse Reg, wat onder die konings,
die era as republiek en die daaropvolgende keisers ontwikkel het en toe deur
Keiser Justinianus in wetboeke opgeskryf is;
Die resepsie van hierdie regstelsel in Europa het tot verdere uitbreiding gelei,
veral onder invloed van die Kanonieke Reg, die Glossatore en Kommentatore;
Die ontwikkeling daarvan deur die Hollandse skrywers het tot die Romeins-
Hollandse reg gelei wat deur Van Riebeeck na die Kaap gebring is.
In Suid-Afrika het die kolonisering onder Brittanje bepaalde Engelse invloede in
die Romeins-Hollandse Reg meegebring
The SA law owes its origins to the Roman Law, which developed under the
kings, the era of the republic and the Caesars which followed and was then
written into law books by Justine Caesar;
The reception of this legal system into Europe led to further development under
influence of the Canon Law, the Glossators and Commentators.
The development of the law by the Dutch jurists led to the Roman-Dutch law
which was brought to the Cape by Van Riebeeck
When South Africa was colonised by the British the law system was subjected
to influences from English Law
Noem die bronne van die SA reg // List the sources of the SA law
FORP112 1/2
Constitution; Statutory Law; Case Law; Common Law; Indigenous Law; Customary
Law; Modern Writers.
Bespreek die verkille tussen ratio decidendi en obiter dictum is in ‘n hofuitspraak // Discuss
the differences between ratio decidendi and obiter dictum in a court judgment
Ratio decidendi:
Skep ʼn presedent
Behels die redes vir die beslissing en die regsreëls wat die hof toegepas het om
tot die beslissing te kom.
Obiter dicta:
Skep nie ʼn presedent nie
Behels uitlatings in die verbygaan waar die hof na hipotetiese of denkbeeldige
gevalle verwys.
Ratio decidendi:
Creates a precedent
Comprises the Reasons for the decision and the rules that the court applied to get
to the decision.
Obiter dicta:
Does not set a precedent
Comprises remarks in passing where the court refers to hypothetical or fictitious
examples.
TOTAAL / TOTAL 15
FORP112 2/2