Topic 11 Consumer Fraud and Ecommerce Fraud Flashcards
Phishing is the method of:
a. Using e-mail or other Internet applications to deceive people into disclosing valuable personal information.
b. Convincing a person to divulge personal information over the telephone.
c. Hacking into another’s computer files to access personal information.
d. Hiring a con artist to steal personal information from a person.
a)
Multilevel marketing companies:
a. Are illegal.
b. Increase their distribution process by recruiting additional company sales representatives.
c. Can legally pay commission to representatives for simply signing up new recruits.
d. Require little time and effort to be successful.
b)
In order to protect yourself from identity theft, you should:
a. Only give out your SSN when purchasing a product online or over the telephone.
b. Always shred receipts, credit card offers, doctor’s bills, insurance information, or any other documents that contain sensitive personal information.
c. Leave your wallet at home or in the car.
d. Maintain the same password for every personal account.
e. Do all of the above.
b)
The Gramm-Leach-Bliley Act gives you the right to:
a. Periodically change your SSN to avoid identity theft.
b. Receive a yearly stipend to cover the losses incurred as a victim of identity fraud.
c. Claim your high credit report although an identity fraudster has damaged it severely.
d. Sue the perpetrator for more money than he or she defrauded from you.
e. Opt. out of having your personal information sold to organizations.
e)
If you become a victim of identity theft, you should first:
a. Wait to see where the perpetrator is spending your money; then, using this information, plan an investigation with the local FBI organization.
b. Contact friends and neighbors to inquire if they have any useful information about the perpetrator.
c. Contact the Federal Trade Commission for assistance and advice.
d. Do none of the above.
c)
Which of the following is a common characteristic of fraudulent money offer letters?
a. The letter will ask for help, convincing the victim that assistance is desperately needed.
b. Through the letter, the perpetrator will try to build a relationship of trust with the victim.
c. The letter promises the victim a large amount of money for little or no effort on the victim’s part.
d. The letter will make the victim feel that he or she is the only person receiving the “once in a lifetime” offer.
e. All the above.
e)
The major reason that elderly people are so susceptible to telemarketing fraud is that they:
a. Are often financially in need.
b. Have an excess amount of cash to invest.
c. Are often lonely and enjoy talking to friendly callers.
d. Are none of the above.
c)
Consumers should provide credit card numbers or bank account information over the telephone only when:
a. They initiated the call and are purchasing a legitimate product.
b. They are asked to give the information.
c. The entity receiving this information is a legitimate company.
d. They feel confident that the receiving entity will protect such information.
e. Doing so qualifies them to receive certain financial benefits.
a)
What is the best defense against consumer fraud?
a. Signing up with the national do not call registry.
b. Purchasing credit card insurance.
c. Educating yourself about credit card risks.
d. Calling the Federal Trade Commission (FTC).
c)
What does “https” stand for?
a. Hypertext transfer protocol (secure).
b. Hypertext transfer point (site).
c. Hypertext transfer protocol (system).
d. Hypertext transfer protocol (sign).
a)
Which of the following is not listed in the chapter as a common characteristic of Nigerian scam letters?
a. The promise of money to lure victims.
b. Urgency to invest quickly.
c. Picture of perpetrator to assure victims.
d. Strong ties to high-ranking foreign officials to lure victims.
c)
Which of the following institutions would not be very helpful to call in the event of identity theft?
a. IRS.
b. Social Security Administration.
c. Local chamber of commerce.
d. A credit reporting agency.
c)
- What is one way to determine if a website is secure or not?
a. Look for the official logo of the company you want to deal with.
b. Look for an “s” after the “http” in the URL of the Web site.
c. Click on a link to see if it works.
d. Call the FTC and ask about the ISP address of the Web site.
b)
Those most susceptible to consumer fraud are often:
a. Uneducated or elderly.
b. Wealthy and prominent.
c. Troubled with credit card debt.
d. None of the above
a)
Which of the following is not a fraud risk unique to e-business transactions?
a. Innovative technologies where security lags process development.
b. Selling new products.
c. Complex information systems.
d. Removal of personal contact.
b)
E-business transactions make it easier to commit which of the following types of frauds?
a. Kickbacks.
b. Customer impersonation.
c. Setting up dummy companies.
d. Stealing petty cash.
b)
Which of the following is not an element of a company’s control environment?
a. Audit committee participation.
b. Management’s philosophy.
c. Hiring policies.
d. Independent checks.
d)
Which of the following is not an internal control activity or procedure?
a. Physical safeguards.
b. Segregation of duties.
c. Internal auditors.
d. Documents and records.
c)
Which of the following fraud risks involves changing IP addresses? a. Spoofing.
b. Sniffing.
c. False Web sites.
d. Customer impersonation.
a)
Which of the following fraud risks involves viewing information as it passes along network channels?
a. Sniffing.
b. Spoofing.
c. False Web sites.
d. Web hijacking.
a)
Using a subtly different Internet host name to mimic another business is known as:
a. Spoofing.
b. Sniffing.
c. Web-visit hijacking.
d. Falsified identity.
c)
Passwords and biometrics are both:
a. Authorization controls.
b. Independent check controls.
c. Physical controls.
d. Document controls.
a)
Which of the following human features is generally not used in biometrics?
a. Fingerprints.
b. Voice tones.
c. Retina patterns.
d. Weight.
d)
Which of the following types of controls is least often used to protect IT processing equipment?
a. Physical controls.
b. Authorization controls.
c. Independent checks or reference.
d. Documents and records.
d)
What is the most important factor in control effectiveness?
a. Clear policies regarding controls.
b. An understanding of e-business networks.
c. The use of random monitoring.
d. The “tone at the top.”
d)
Secure web connections are based on:
a. DNS.
b. FTP.
c. HTTPS.
d. FTPS.
c)
Which of the following statements correctly describes consumer fraud?
a. Any fraud that is committed by a consumer
b. Any fraud that targets individuals as victims
c. Any fraud that is committed against an organization
d. Any fraud that is instigated from a separate country
b)
According to the Federal Trade Commission, what is the most common type of consumer fraud?
a. Identity theft
b. Ponzi scheme
c. Magazine fraud
d. Telephone fraud
a)