Filters
Question type

Study Flashcards

_____ is a hi-tech method by which thieves capture personal or account information from a credit card,driver's license,or even a passport.


A) Product testing
B) Skimming
C) Spimming
D) Phishing

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Which act makes it illegal for any agency that receives federal funding to disclose privacy information about individuals?


A) Identity Theft and Assumption Deterrence Act
B) Family Education Rights and Privacy Act of
C) The Gramm-Leach-Bliley Act
D) Fair Credit Reporting Act

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

All of the following are symptoms of potential investment scams EXCEPT:


A) pressures to get in early on the investment.
B) a business with a history of bankruptcy or scandals.
C) use of a special tax loophole or a tax avoidance scheme.
D) promise of returns comparable to those of treasury bonds.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

The Gramm-Leach-Bliley Act:


A) gives financial institutions the right to share personal information for a profit.
B) expressly prevents financial institutions from sharing personal information.
C) allows financial institutions to share personal information,as long as it is not for a profit.
D) prevents identity theft and protects confidentiality of customer information.

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which dimensional actions are the most risky for the identity thief?


A) Third dimensional actions
B) Second dimensional actions
C) First dimensional actions
D) Fourth dimensional actions

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

What is the most detrimental consequence of identity theft?


A) The loss of physical assets.
B) The loss of credit,reputation,and erroneous information.
C) Time lost in reporting the fraud.
D) The actual loss of money.

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Which act gives individuals the right to opt-out of having their information sold?


A) Identity Theft and Assumption Deterrence Act
B) Family Education Rights and Privacy Act
C) The Gramm-Leach-Bliley Act
D) Fair Credit Reporting Act

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which federal statute protects the privacy and confidentiality of patient information?


A) Family Educational Rights and Privacy Act
B) Identity Theft and Assumption Deterrence Act
C) Gramm-Leach-Bliley Act
D) Health Information Portability and Accountability Act

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

What is one of the biggest marketing campaigns of illegal MLMs?


A) Promise of full-time work from home for huge weekly earnings.
B) Absence of headhunter fees.
C) A mysterious "benefactor" interested in contributing a large sum of money.
D) Promise that investors will always make money from future downline growth.

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Often,fraudsters contact potential identity theft victims and act as a representative of a business to verify previously gathered information.This is known as ________.


A) trashing
B) pretexting
C) mail stuffing
D) skimming

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A fraudulent process whereby even representatives of legitimate MLMs are required to buy large,expensive amounts of inventory is known as _________.


A) forward pricing
B) snake oil
C) front loading
D) opportunity meeting

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which stage is considered to be the most critical stage of the identity theft cycle?


A) Action stage
B) Trial stage
C) Discovery stage
D) Cover-up stage

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Identify the complaint database developed by the U.S.Federal Trade Commission.


A) Consumer Watch
B) Fraud Watchdog
C) Consumer Sentinel
D) Identity Theft Assistance

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Snake oil plans are plans:


A) that make their money by getting new people to buy property in exotic locations.
B) that promise enormous earnings or claim to sell miracle products.
C) that motivate the purchase of unusually overpriced goods or services.
D) that make people believe that they will make money simply because they are one of the earliest investors.

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Federal law limits consumers' credit card fraud liability to ______.


A) $50
B) $100
C) $150
D) $200

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

A Nigerian money offer email scam is a form of _____.


A) foreign advance-fee scam.
B) purchase of real estate scam.
C) clearing house scam.
D) multilevel marketing scam.

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Common identity theft methods include all of the following,EXCEPT:


A) filing for bankruptcy under the victim's name.
B) opening new bank accounts in the victim's name.
C) changing a victim's mailing address.
D) destroying personal property,such as a home or car.

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following observations is NOT true of foreign-advance fee scams?


A) Perpetrators are well-known businesses and there is usually some urgency to participate.
B) All messages come from an unknown party who claims to have access to large sums of money or assets.
C) Perpetrators are always willing to transfer money or other assets to the victims,but only after money or information is extracted.
D) Perpetrators claim to have access to large sums of money or assets.

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

What makes telemarketing fraud more effective than Internet or mail-based approaches?


A) Reduced transaction costs.
B) Opportunity to speak with a person directly.
C) Increased size of the fraud.
D) Absence of government regulations.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Which of the following involves the use of Internet to steal important information?


A) Shoulder surfing
B) Phishing
C) Skimming a credit card
D) Dumpster diving

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 42

Related Exams

Show Answer