Module 7 Knowledge Check

.docx

School

Texas A&M University, Corpus Christi *

*We aren’t endorsed by this school

Course

5340

Subject

Business

Date

Apr 3, 2024

Type

docx

Pages

11

Report

Uploaded by UltraLightningYak4715

QUESTION 1 1. A Nigerian money offer e-mail is a form of which of the following scams? 2. a . Multilevel marketing scam b . Purchase of real estate scam c . Clearinghouse scam d . Foreign advance-fee scam 10 points QUESTION 2 1. Karl Mathers set up a new company and obtained loans to buy inventory with the intention of filing for bankruptcy after two years and selling the inventory later to a close friend at deep discounts. What is the term for this type of bankruptcy fraud? 2. a . Commercial loan fraud b . Inventory dumping fraud c . Bust-out d . None of the above 10 points QUESTION 3 1. Passwords, biometrics, and digital signatures are examples of which of the following? 2. a . Authorization controls b . Checks on performance c . Physical controls d . Segregation of
duties 10 points QUESTION 4 1. Product testing is a fraud: 2. a . where perpetrators promise high pay for working on different projects. b . that requests consumers to review the products presented in the brochures and send their commentaries to the supplier for review. c . that promise victims a job that involves strolling through stores, enjoying the displays, shopping for merchandise, and then filing reports on the experiences they have had. d . where consumers respond to an advertisement that promises income simply for stuffing envelopes. 10 points QUESTION 5 1. Snake oil plans are plans that: 2. a . motivate the purchase of unusually overpriced goods or services. b . promise enormous earnings or claim to sell miracle products. c . make their money by getting new people to buy property in exotic locations. d . make people believe that they will make money simply because they are one of the earliest investors. 10 points QUESTION 6 1. TransUnion, Equifax, and Experian are examples of what type of agencies? 2. a . Money transfer agencies b . Credit billing agencies c . Identity theft investigation agencies d Credit reporting agencies
. 10 points QUESTION 7 1. What is spoofing? 2. a . Changing the information in e-mail headers or IP addresses b . Using a subtly different Internet host name to mimic another business c . Extracting personal or corporate computer information from employees d . Viewing the information that passes along a network line 10 points QUESTION 8 1. What is the term for when a hacker calls a targeted user posing as technical support and asks the victim to divulge the account information so that immediate steps can be taken to prevent data loss from the account? 2. a . Data theft b . Customer impersonation c . Spoofing d . Social engineering 10 points QUESTION 9 1. What is the term for when fraudsters contact potential identity theft victims and act as a representative of a business to verify previously gathered information? 2. a . Mail stuffing b . Skimming c . Trashing
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
d . Pretexting 10 points QUESTION 10 1. Which of the following is often the riskiest step in the money laundering process? 2. a . Layering b . Integratio n c . Transferri ng d . Placemen t
QUESTION 1 1. Product testing is a fraud: 2. a . where perpetrators promise high pay for working on different projects. b . that promise victims a job that involves strolling through stores, enjoying the displays, shopping for merchandise, and then filing reports on the experiences they have had. c . where consumers respond to an advertisement that promises income simply for stuffing envelopes. d . that requests consumers to review the products presented in the brochures and send their commentaries to the supplier for review. 5 points QUESTION 2 1. Which of the following is the term for a fraudulent process whereby even representatives of legitimate MLMs are required to buy large, expensive amounts of inventory. 2. a . Front loading b . Forward pricing c . Opportunity meeting d . Snake oil 5 points QUESTION 3 1. TransUnion, Equifax, and Experian are examples of what type of agencies? 2. a . Credit billing agencies b . Money transfer agencies c . Credit reporting agencies d . Identity theft investigation agencies
5 points QUESTION 4 1. Which of the following involves the use of the Internet to steal important information? 2. a . Dumpster diving b . Phishing c . Shoulder surfing d . Skimming a credit card 5 points QUESTION 5 1. According to the Federal Trade Commission, what is the most common type of consumer fraud? 2. a . Magazine fraud b . Identity theft c . Ponzi scheme d . Telephone fraud 5 points QUESTION 6 1. What is the term for a technique in which hackers go to known business traveler locations like airports and set up access points (which look like regular wireless networks) through their laptops to the Internet? 2. a . Phishing b . Social engineering c . Spoofing d Wartrapping
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
. 5 points QUESTION 7 1. Which of the following installs monitoring software in addition to the regular software that a user downloads or buys? 2. a . Internet worm b . Spyware c . Bot d . Middleware 5 points QUESTION 8 1. The threat of falsified identity is less of a concern in the case of: 2. a . traditional EDI settings. b . unsecured online transactions. c . e-business. d . virtual private networks. 5 points QUESTION 9 1. Why is it that Internet users' information can be hijacked when they conduct web visits? 2. a . Social engineering has made it easy to do so. b . Many managers lack the technical expertise to prevent and detect data theft. c . Data can be transferred easily and quickly to any location in the world. d Subtle differences in Internet host names often go unnoticed by
. Internet users. 5 points QUESTION 10 1. Which of the following is NOT a means of using technology to spot technology fraud? 2. a . Routinely search databases for symptoms b . Utilize intrusion detection programs c . Train employees to recognize probable fraud d . Secure company systems 5 points QUESTION 11 1. Which is NOT something that a fraud perpetrator conducting a bust-out is likely to do? 2. a . Contact law enforcement to strengthen their cover b . A fraud perpetrator conducting a bust-out is likely to do all of the above c . Work to establish credibility d . Take on a business name similar to a well-reputed company e . Quietly buy an existing company that already has established credit or business 5 points QUESTION 12 1. Most divorce fraud cases are: 2. a . civil cases. b . criminal cases. c protected by Chapter 7.
. d . rarely investigated through surveillance. 5 points QUESTION 13 1. Which of the following is usually the most complex step in the money laundering process? 2. a . Layering b . Placemen t c . Transferri ng d . Integratio n 5 points QUESTION 14 1. Which of the following is NOT an example of a method to conceal assets in a bankruptcy or divorce fraud? 2. a . Dispersing cash received from receivables to a third party b . Damaging or hiding the books and records of the debtor c . All of the above are ways to conceal assets d . Not disclosing interests held in other partnerships, corporations, or other assets e . Not reporting sales on the debtor's books but dispersing them to another entity 5 points QUESTION 15 1. Which of the following is often the riskiest step in the money laundering process? 2. a . Integratio n
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
b . Layering c . Transferri ng d . Placemen t 5 points QUESTION 16 1. Which of the following statements correctly describes the part of an adjuster in divorce cases? 2. a . Investigates allegations of fraud or misconduct by the debtor or its principals as an advocate of the other party b . Investigates instances of hiding assets in a Chapter 11 filing c . Investigates claims against a debtor to determine whether or not they are valid d . Assists the trustee by performing such duties as securing business facilities and assets, locating assets of the debtor's estate and arranging asset sales 5 points QUESTION 17 1. Bankruptcy and divorce can be which of the following categories? 2. a . Either of the above b . Civil matters c . Neither of the above d . Criminal matters 5 points QUESTION 18 1. Which of the following is false regarding bankruptcy and divorce frauds? 2. a . Bankruptcy or divorce is used to justify the fraud.
b . Bankruptcy or divorce is used to cash out of the fraud. c . Bankruptcy or divorce is used to conceal fraud. d . Bankruptcy or divorce is used to perpetuate the fraud. 5 points QUESTION 19 1. Which of the following best explains why pressure to commit fraud exists in bankruptcy and divorce cases? 2. a . There is anger aimed at the other parties involved. b . Fraudsters don't have accurate records. c . The perpetrators do not feel that a fraud investigator will find them out. d . Assets are taken away from one party and given to others. 5 points QUESTION 20 1. Which of the following is NOT a purpose of bankruptcy? 2. a . Give debtors relief from the creditors b . Protect debtors from unfair collection efforts by other creditors c . Give debtors relief from foreclosure activities d . Give debtors the ability to safeguard their most important assets e . All of the above are purposes of bankruptcy