Mail Fraud Statute Check Wash

Question 1

Laws that protect victims of ID theft deal with

Question 1 options:

A- documenting the theft

B- dealing with creditors

C- limiting the victims financial losses

D- all of the above

Question 2

what are the elements of the Mail Fraud Statute?

Question 2 options:

A- a scheme to defraud

B- misuse of a social security number

C- the use of the mails

D- both A and C are correct

Question 3

what is check washing?

Question 3 options:

A- Infiltrating organizations that store and process large amounts or particularly valuable personal information.

B- Moving money from one account to another to prevent tracing by the authorities.

C- Opening a bank account and writing bad checks against an empty account.

D- Soaking checks in chemicals to remove the handwritten portions.

Question 4

Viewing a phone or credit card number as it is entered by the victim is known as:

Question 4 options:

A- criminal peeking

B- visible phishing

C- slip streaming

D- shoulder surfing

Question 5

Which of the following is not a one of the reasons why identity theft offenders are seldom held accountable for their crimes?

Question 5 options:

A- the investigation identity theft is labor-intensive and expensive.

B- individual cases of identity theft are usually considered to be too small for federal prosecution.

C- perpetrators usually victimize multiple victims in multiple jurisdictions.

D- State agencies are typically not capable of prosecuting cases of identity theft.

Question 6

which activity by students exposes them to identity theft?

Question 6 options:

A- Students store personal information in their computer.

B- Students use cell phones a lot.

C- Students use their Social Security number for identification.

D- All of the above

Question 7 (1 point)

which is NOT a symptom of a washed check?

Question 7 options:

A- The check smells like brake fluid or bleach.

B- The paper color may have a greyish tint.

C- The finish of the check may feel softer than the original.

D- The ink color is changed.

Question 8

It is not pretexting if a person collects “public record” information about someone else (such as tax payment history or home ownership).

Question 8 options:

A- True

B- False

Question 9 (1 point)

Credit monitoring services hurt your credit rating because every time the service checks your credit your score goes down.

Question 9 options:

A- True

B- False

Question 10 (1 point)

What is pretexting?

Question 10 options:

A- fraud that occurs on a credit account that has been opened under a false name.

B- obtaining someone’s personal information under false pretenses.

C- concealing illegal funds to make them appear legitimate.

D- acredit transaction that is billed back to the merchant after the sale.

Question 11 (1 point)

The “419” in the name 419 Fraud refers to what?

Question 11 options:

It refers to the Nigerian criminal code statute for this kind of crime.

It refers to the US criminal code statute for this kind of crime.

It refers to the International area code used by Nigerian callers for this kind of crime.

None of the above

Question 12 (1 point)

Victims of identity theft often immediately know that they have become victims because they are typically notified by the police or the credit companies in a timely manner.

Question 12 options:

True

False

Question 13 (1 point)

what is the oldest federal fraud statute?

Question 13 options:

the Wire Fraud statute

the Access Device Fraud statute

the Mail Fraud statute

the Fair Credit Billing Act

Question 14 (1 point)

the Fair Credit Billing Act does not cover which type of billing dispute?

Question 14 options:

errors in math

unauthorized charges

charges that list the correct dates

charges that list the wrong amount

Question 15 (1 point)

Which is the primary federal agency tasked with investigating identity theft and fraud?

Question 15 options:

FBI

Secret Service

FTC

US Postal Service

Question 16 (1 point)

What attack uses a cell phone’s text messaging capability to obtain confidential information?

Question 16 options:

skimming

diving

phishing

smishing

Question 17 (1 point)

student loan fraud is augmented because students do not destroy unused credit card applications like they should.

Question 17 options:

True

False

Question 18 (1 point)

the Bank Fraud Statute is similar to both the Mail and Wire Fraud Statutes.

Question 18 options:

True

False

Question 19 (1 point)

According to the Nigerian Fraud Training Manual in Chapter 5 of your textbook, credit card criminals face a higher probability of being struck by lightning than being convicted of credit card fraud.

Question 19 options:

True

False

Question 20 (1 point)

the Wire Fraud Statute does not cover which type of communication?

Question 20 options:

interstate wire communications

interstate radio communications

interstate telephone communications

intrastate wire communications

Question 21 (1 point)

A victim of identity theft is liable for how much money for fraudulent purchases made with their credit card?

Question 21 options:

$25

$50

$75

the entire cost of all the fraudulent purchases

Question 22 (1 point)

Sun CEO Scott McNealy once said, “You have zero privacy anyway…..Get over it.”

Question 22 options:

True

False

Question 23 (1 point)

FACTA imposes shredding and disposal requirements on which entities?

Question 23 options:

lenders

landlords

debt collectors

all of the above

Question 24 (1 point)

What issue should a Police Department NOT strongly consider when handling identity theft cases?

Question 24 options:

Do officers received training in identity authentication?

Does the Police Department have established reporting procedures?

Does the Police Department have a crime reporting system that facilitates making a police report for identity theft?

None of the above

Question 25 (1 point)

Which is not a stage in the ID theft life cycle?

Question 25 options:

the victim gains restitution from the thief

the thief acquires a victim’s personal information

the thief attempts to misuse the personal information

the thief completes the crime

Question 26 (1 point)

How does one engage in skimming?

Question 26 options:

by rummaging through trash to obtain personal information.

by using spoofed emails and bogus websites to trick victims into divulging personal information.

by generating valid credit card numbers that have not been actually issued by the credit companies.

by using a small tool with a magnetic-stripe reader that stores information on a payment card.

Question 27 (1 point)

Stealing personal identifying information from a garbage can is known as:

Question 27 options:

shoulder surfing

dumpster diving

slip streaming

an Oscar the Grouch attack

Question 28 (1 point)

Carrying your Social Security Card in your wallet or purse is a great idea

Question 28 options:

True

False

Question 29 (1 point)

What attack is used to by hackers to use tempting emails as bait to lure unsuspecting victims to divulge account numbers, passwords, and other financial information?

Question 29 options:

phishing

pharming

pretexting

skimming

Question 30 (1 point)

the crime of Aggravated Identity Theft carries a mandatory five year prison term.

Question 30 options:

True

False

Question 31 (1 point)

which is a valid reason to get a new Social Security number (SSN)?

Question 31 options:

a criminal is using your SSN

to avoid the consequences of filing for bankruptcy

if your SSN is lost, but there is no evidence that someone is using your number

you intend to avoid the law

Question 32 (1 point)

According to the ID Theft Act, “personal information” includes everything except:

Question 32 options:

unique biometric data

a person’s copyrighted works

government passport number

unique routing codes

Question 33 (1 point)

Which is not a reason that identity theft is underreported?

Question 33 options:

Police departments do not record ID theft as separate crimes.

Victims feel too intimidated to report the crime.

ID theft spans multiple jurisdictions.

Victims only report the crime to their bank.

Question 34 (1 point)

Old junk mail should be shredded even if there is no personal identifying information on it.

Question 34 options:

True

False

Question 35 (1 point)

Since ID theft is a white collar crime, it is never accompanied with violent behavior.

Question 35 options:

True

False

Question 36 (1 point)

Many ID thieves follow mail carriers and steal mail after it has been deposited into a residential mailbox.

Question 36 options:

True

False

Question 37 (1 point)

To establish the crime of credit card fraud, the prosecutor must establish that the defendant knowingly used a credit card without proper authority.

Question 37 options:

True

False

Question 38 (1 point)

student loan fraud is only a problem in the United States.

Question 38 options:

True

False

Question 39 (1 point)

Saved

What should a person NOT do when they lose their wallet?

Question 39 options:

Close their credit card and bank accounts immediately

Call the Social Security Administration request a new Social Security number

watch for signs that their information is being misused

cancel their drivers license and get a replacement

Question 40 (1 point)

After several data breaches occur, your organization performs data classification based on data sensitivity. Currently you are considering the files that contain employee information, such as social security numbers. What is the term for this type of data?

Question 40 options:

Personal Health Information (PHI)

Personally Identifiable Information (PII)

Corporate Top Secret

Intellectual Property

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount