Chapter 15

1. Which of the following statements correctly describes consumer fraud?
a. Any fraud that is committed by a consumer.
b. Any fraud that targets individuals as victims.
c. Any fraud that is committed against an organization.
d. Any fraud that is instigate

B

2. According to the Federal Trade Commission, what is the largest type of consumer fraud?
a. Identity theft
b. Ponzi scheme
c. Magazine fraud
d. Telephone fraud

A

3. Which of the following is NOT a common identity theft method?
a. filing for bankruptcy under the victim's name.
b. opening new bank accounts in the victim's name.
c. changing a victim's mailing address.
d. destroying personal property, such as a home o

D

4. Which of the following identity theft actions listed is considered to be part of the first dimensional actions?
a. efforts to gain victim's personal information.
b. larger thefts, often involving personal interaction, without much chance of getting cau

D

5. Which of these is a second dimensional action in the trial stage of the identity theft?
a. Larger thefts, often involving personal interaction, without much chance of getting caught.
b. Smallest thefts that lay down a solid foundation for the perpetrat

A

6. Which dimensional actions are the most risky for the identity thief?
a. Third dimensional actions
b. Second dimensional actions
c. First dimensional actions
d. Fourth dimensional actions

A

7. Which stage is considered to be the most critical stage of the identity theft cycle?
a. Action stage
b. Trial stage
c. Discovery stage
d. Cover-up stage

B

8. A fraudster changes the physical address or e-mail of the victim so that credit card statements are sent by the financial institution to the perpetrator rather than the victim. Which stage of the identity theft cycle is being discussed here?
a. Verific

D

9. Which of the following statements defines shoulder surfing?
a. Criminals physically confront consumers forcing them to reveal their valuable information.
b. Criminals follow consumers to discover their buying habits.
c. Criminals sneak into victims' ho

D

10. Which of the following involves the use of Internet to steal important information?
a. Shoulder surfing
b. Phishing
c. Skimming a credit card
d. Dumpster diving

B

11. Which of the following is NOT an action to minimize your risk of identity theft?
a. opting out of pre-approved credit cards.
b. shredding mail that contains detailed information.
c. using strong passwords and changing them often.
d. using Social Secur

D

12. Which of the following is the limit set on consumers' credit card fraud liability by Federal law?
a. $50
b. $100
c. $150
d. $200

A

13. What is the term for when fraudsters contact potential identity theft victims and act as a representative of a business to verify previously gathered information?
a. trashing
b. pretexting
c. mail stuffing
d. skimming

B

14. How do fraudsters use "cookie" type software?
a. to automatically remove web histories after one closes the web browser.
b. to initiate pop-ups to unknown sites to gather valuable consumer information.
c. to show the status of a Web site to be secure.

D

15. Which of the following is NOT a symptom of potential investment scams?
a. pressures to get in early on the investment.
b. a business with a history of bankruptcy or scandals.
c. use of a special tax loophole or a tax avoidance scheme.
d. promise of re

D

16. Which of the following is a true statement regarding The Gramm-Leach-Bliley Act?
a. The act gives financial institutions the right to share personal information for a profit.
b. The act expressly requires financial institutions to protect against iden

A

17. Which act gives individuals the right to opt-out of having their information sold?
a. Identity Theft and Assumption Deterrence Act
b. Family Education Rights and Privacy Act
c. The Gramm-Leach-Bliley Act
d. Fair Credit Reporting Act

C

18. Which act limits consumers' liability for fraudulent credit card charges?
a. Identity Theft and Assumption Deterrence Act
b. Fair Credit Billing Act
c. Family Education Rights and Privacy Act
d. Fair Credit Reporting Act

B

19. Which act makes it illegal for any agency that receives federal funding to disclose privacy information about individuals?
a. Identity Theft and Assumption Deterrence Act
b. Family Education Rights and Privacy Act of
c. The Gramm-Leach-Bliley Act
d. F

B

20. Which is the primary agency responsible for helping victims of identity theft?
a. Social Security Office
b. Federal Bureau of Investigation
c. Permits Department
d. Federal Trade Commission

D

21. TransUnion, Equifax, and Experian are examples of what type of agencies?
a. identity theft investigation agencies
b. credit reporting agencies
c. money transfer agencies
d. credit billing agencies

B

22. A Nigerian money offer email is a form of which of the following scams?
a. foreign advance-fee scam.
b. purchase of real estate scam.
c. clearing house scam.
d. multilevel marketing scam.

A

A clearinghouse scam:
a. involves a victim receiving a letter that claims he or she has inherited a significant amount of money.
b. involves a victim receiving a mail from a known party who claims to have access to large sums of money or assets.
c. involv

C

Which of the following is false regarding a Nigerian money offer scam?
a. States the need for urgent assistance.
b. Makes the victim feel like he or she is the only recipient of the special opportunity.
c. Involves someone trying to sell a piece of prime

C

All of the following are types of foreign advance schemes, EXCEPT:
a. Disbursement of money from wills.
b. Multi-level marketing scams.
c. Sale of crude oil below market price.
d. Purchase of real estate scam.

B

Which of the following is a variation of fraudulent MLMs, in which an organization sells illusionary products and profits, instead of real products?
a. ponzi scheme
b. foreign advance scheme
c. identity theft scheme
d. shoulder surfing scheme

A

Which of the following is the term for a fraudulent process whereby even representatives of legitimate MLMs are required to buy large, expensive amounts of inventory.
a. forward pricing
b. snake oil
c. front loading
d. opportunity meeting

C

Snake oil plans are plans:
a. that make their money by getting new people to buy property in exotic locations.
b. that promise enormous earnings or claim to sell miracle products.
c. that motivate the purchase of unusually overpriced goods or services.
d.

B

Which federal statute protects the privacy and confidentiality of patient information?
a. Family Educational Rights and Privacy Act
b. Identity Theft and Assumption Deterrence Act
c. Gramm-Leach-Bliley Act
d. Health Information Portability and Accountabil

D

Product testing is a fraud:
a. that request the consumers to review the products presented in the brochures and send their commentaries to the supplier for review.
b. where consumers respond to an advertisement that promises income simply for stuffing env

A

Accumulating documentation belongs to which stage of the identity theft cycle?
a. The action stage
b. The discovery stage
c. The trial stage
d. The concealment stage

A

32. Which of the following is a hi-tech method by which thieves capture personal or account information from a credit card, driver's license, or even a passport?
a. Surfing
b. Skimming
c. Clawbacks
d. Phishing

B

33. What is dumpster diving?
a. An activity where fraudsters use an information storage device to gain access to valuable information.
b. An activity where perpetrator will try to build a relationship of confidence with the victim.
c. An activity where cr

D

34. Identify the complaint database developed by the U.S. Federal Trade Commission.
a. Consumer Watch
b. Fraud Watchdog
c. Consumer Sentinel
d. Identity Theft Assistance

C

35. What makes telemarketing fraud more effective than Internet or mail-based approaches?
a. Reduced transaction costs.
b. Opportunity to speak with a person directly.
c. Increased size of the fraud.
d. Absence of government regulations.

B

36. What is the most detrimental consequence of identity theft?
a. The loss of physical assets.
b. The loss of credit, reputation, and erroneous information.
c. Time lost in reporting the fraud.
d. The actual loss of money.

B

37. What is one of the biggest marketing campaigns of illegal MLMs?
a. Promise of full-time work from home for huge weekly earnings.
b. Absence of headhunter fees.
c. A mysterious "benefactor" interested in contributing a large sum of money.
d. Promise th

D

38. Which of the following observations is NOT true of foreign-advance fee scams?
a. Perpetrators are well-known businesses and there is usually some urgency to participate.
b. Perpetrators claim to trust the victim with their money or assets.
c. Perpetra

A

39. Which of the following is a scam in which consumers respond to an advertisement that promises income simply for filling envelopes?
a. Craft assembly
b. Bogus mystery shopping
c. Mail stuffing
d. Skimming

C

40. Once a fraudster has gained confidence that the identity theft is working, he or she often takes out a loan using the victim's identity. The most common type of fraudulent loan is for which of the following items?
a. foreign travel.
b. purchasing real

D

41. What is the most important way to fight identity theft?
a. By shredding mail that contains detailed information.
b. By taking extra care of the personal valuable information.
c. By using strong passwords and changing them often.
d. By preventing it fr

D

42. Which of the following is a scam where perpetrators promise high pay for working on different projects like wooden calendars, paper towel holders, hair clips, or holiday decorations?
a. Product testing
b. Mail stuffing
c. Craft assembly
d. Skimming

C

What percent of the population was estimated to have been victims of fraud in 2005?
a. 8.5 %
b. 13.5 %
c. 22.5 %
d. 41.5 %

B

Which of the following was the top consumer fraud in number of victims identified in the U S Federal Trade Commission report?
a. foreign lottery scams
b. advance fee loan scams
c. fraudulent weight-loss products
d. credit card insurance

C

According to the text, which of the following is the best defense against becoming a victim of consumer fraud?
a. Avoid internet offers.
b. Register on the do-not call list.
c. Check companies named in all print ads through the Better Business Bureau.
d.

D