Db Ch 17

21 Questions

Settings
Please wait...
Oracle Quizzes & Trivia

Questions and Answers
  • 1. 
    Which is the bext example of the technique called "flooding"?
    • A. 

      Filling a small foreign nation with drug money

    • B. 

      Spreading a false rumor of a takeover of a company to inflate the price of the company's stock

    • C. 

      Ordering merchandise from a foreign company at an inflated price and hiding the difference in a secret account

    • D. 

      Saturating a residential area with a home repair con game and then leaving without finishing the repairs

  • 2. 
    A "smurf" for a drug cartel would most likely do which?
    • A. 

      Take cash to a bank and make several transactions, trading small bills for larger ones

    • B. 

      Make large transactions via fax or personal computer, thus avoiding personal interactions with banking personnel

    • C. 

      Carry a large denomination of drug money hidden on their person and fly from the U.S. to South America

    • D. 

      Go to several different banks and purchases cashiers checks in denominations of less than the required CTR reporting amount

  • 3. 
    Which government agencies investigate money laundering schemes?
    • A. 

      FBI

    • B. 

      DEA

    • C. 

      IRS

    • D. 

      FinCEN

  • 4. 
    The most practiced con game of all time is known as ____________
    • A. 

      The bank exmainer scheme

    • B. 

      The pyramid con

    • C. 

      The contest scam

    • D. 

      The pigeon drop

  • 5. 
    Diddling involves which unlawful computer practice?
    • A. 

      Acquiring characteristics to assume an unauthorized password

    • B. 

      Pushing a computer's capabilities to its limits, regardless of consequences

    • C. 

      Entering incorrect data to falsify records

    • D. 

      Inserting an electronic letter bomb attack

  • 6. 
    Under the 1986 Money Laundering Control Act, the attorneys and stockbrokers of drug kingpins can be prosecuted for money laundering crimes
    • A. 

      True

    • B. 

      False

  • 7. 
    Computer crime is extremely difficult to detect, but its investigation is much like that of traditional crimes
    • A. 

      True

    • B. 

      False

  • 8. 
    Investigations of computer crime are typically reactive in nature
    • A. 

      True

    • B. 

      False

  • 9. 
    According to the Bureau of Journal Statistics (BJS), white-collar crime is not an official crime category
    • A. 

      True

    • B. 

      False

  • 10. 
    _________ is a form of white-collar crime whereby trusted executives working within a company mishandle funds or otherwise betray the trust of customers or other consumers
    • A. 

      Corporate crime

    • B. 

      Executive crime

    • C. 

      Pump and dump

    • D. 

      Money laundering

  • 11. 
    An entire "wash cycle", to transform small denominations of currency to businesses, money market deposits, or real estate, may take as little as _____ hours
    • A. 

      24

    • B. 

      48

    • C. 

      72

    • D. 

      96

  • 12. 
    The most common method for laundering money is called _______ where the traffickers take their cash to a bank and conduct several transactions that usually involve trading currency of small denominations for larger ones
    • A. 

      Bank methods

    • B. 

      Smurfing

    • C. 

      Double invoicing

    • D. 

      Currency exchanges

  • 13. 
    A company orders merchandise from a foreign subsidiary at an inflated price, the difference between the inflated price and the actual price is deposited by the subsidiary in a special offshore account. This is known as ___________
    • A. 

      Bank methods

    • B. 

      Smurfing

    • C. 

      Double invoicing

    • D. 

      Currency exchanges

    • E. 

      Hidden billing

  • 14. 
    Approximately ____ percent of newly initiated money laundering investigations contains a money order component
    • A. 

      10

    • B. 

      20

    • C. 

      15

    • D. 

      30

    • E. 

      25

  • 15. 
    ___________ is the destruction, theft, or unauthorized use, modification, copying of information, programs, services, equipment or communications networks
    • A. 

      Cybercrime

    • B. 

      Hacking

    • C. 

      Phishing

    • D. 

      Infilitrating

  • 16. 
    In 100 percent of cases of children meeting strangers on the internet who have molested, raped, or harmed them met up willingly with their attacker
    • A. 

      True

    • B. 

      False

  • 17. 
    Computer crime investigations require a considerable investment of time, sometimes from one month to a year
    • A. 

      True

    • B. 

      False

  • 18. 
    Computer crime investigation uses 90 percent technical skill and 10 percent traditional police work
    • A. 

      True

    • B. 

      False

  • 19. 
    ______ is the process of presenting sequentially changing information to an automated system to identify those items receiving a positive response
    • A. 

      Scanning

    • B. 

      Masquerading

    • C. 

      Hacking

    • D. 

      Data diddling

  • 20. 
    ______ is the most common activity of computer system intruders. It is the process of one person assuming the identity of an authorized computer user by acquiring items, knowledge or characteristics
    • A. 

      Scanning

    • B. 

      Masquerading

    • C. 

      Hacking

    • D. 

      Data diddling

  • 21. 
    When conducting a computer crime investigation, which is NOT recommended?
    • A. 

      Determine the proper jurisdiction very early in the investigation

    • B. 

      Review the telephone records of all telephone lines to the crime scene

    • C. 

      Copy and give the pertinent computer records being investigated and give the original to the owner

    • D. 

      Run a criminal background check on both suspects and victims