15 - Chapter 15 Consumer Fraud MULTIPLE CHOICE 1. Consumer...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 15 Consumer Fraud MULTIPLE CHOICE 1. Consumer fraud is described as any fraud that: a. Is committed by a consumer b. Takes place against an individual c. Is fraud committed within an organization d. Comes from a separate country ANS: B B: Correct; Consumer frauds are committed against consumers, as opposed to organizations 2. Consumer fraud includes all of the following, except: a. Telephone fraud b. Internet services or auctions c. Identity theft d. Invigilation ANS: D D: Correct; consumer fraud does not include invigilation 3. According to the Federal Trade Commission, the largest type of consumer fraud is: a. Identity theft b. Bogus MLMs c. Magazine fraud d. Telephone fraud ANS: A A: Correct; identify theft if the largest type of consumer fraud 4. Identity theft is used to describe those circumstances when someone uses another person’s: a. Name and/or address b. Bank account information c. Social security information d. All of the above ANS: D D: Correct 5. Common identity theft methods include all of the following, except: a. Filing for bankruptcy in the victim’s name b. Opening new bank accounts in the victim’s name c. Changing a victim’s mailing address d. Destroying personal property, such as a home or car ANS: D A: Incorrect; this is a common identity theft method B: Incorrect; this is a common identity theft method C: Incorrect; this is a common identity theft method D: Correct 6. Discovery (gaining and verifying information) is part of the:
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
a. Identity theft cycle b. Fraud triangle c. Investigative model d. Personal vandalism cycle ANS: A A: Correct 7. Cover up or concealment actions involve any actions: a. That keep an investigator warm during a surveillance b. That are used to keep a potential fraudster unaware of invigilation c. That are used to cover the financial footprints of a perpetrator d. That cover up the investigative steps of a fraud investigator ANS: C C: Correct 8. 1st Dimensional Actions are actions: a. Fraudsters use to test the effectiveness of their fraud schemes b. Taken by fraudsters once an initial trial period has been successful c. Are used by perpetrators once they have considerable confidence in identity theft d. Are the plans made by fraudsters before actions are taken ANS: A A: Correct B: Incorrect; this describes 2 nd dimensional actions C: Incorrect; this describes 3 rd dimensional actions D: Incorrect 9. Fraudsters might complete a change of address form at the local post office: a. To redirect their mail when investigations are discovered b. To have a victim’s mail sent to an alternative address as part of an identity theft scheme ANS: B B: Correct 10. Shoulder surfing is a scheme where: a. Criminals physically confront consumers in order to force them to reveal information
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 7

15 - Chapter 15 Consumer Fraud MULTIPLE CHOICE 1. Consumer...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online