Topic 11 Consumer Fraud and Ecommerce Fraud Flashcards

1
Q

Phishing is the method of:
a. Using e-mail or other Internet applications to deceive people into disclosing valuable personal information.
b. Convincing a person to divulge personal information over the telephone.
c. Hacking into another’s computer files to access personal information.
d. Hiring a con artist to steal personal information from a person.

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Multilevel marketing companies:
a. Are illegal.
b. Increase their distribution process by recruiting additional company sales representatives.
c. Can legally pay commission to representatives for simply signing up new recruits.
d. Require little time and effort to be successful.

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In order to protect yourself from identity theft, you should:
a. Only give out your SSN when purchasing a product online or over the telephone.
b. Always shred receipts, credit card offers, doctor’s bills, insurance information, or any other documents that contain sensitive personal information.
c. Leave your wallet at home or in the car.
d. Maintain the same password for every personal account.
e. Do all of the above.

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Gramm-Leach-Bliley Act gives you the right to:
a. Periodically change your SSN to avoid identity theft.
b. Receive a yearly stipend to cover the losses incurred as a victim of identity fraud.
c. Claim your high credit report although an identity fraudster has damaged it severely.
d. Sue the perpetrator for more money than he or she defrauded from you.
e. Opt. out of having your personal information sold to organizations.

A

e)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If you become a victim of identity theft, you should first:
a. Wait to see where the perpetrator is spending your money; then, using this information, plan an investigation with the local FBI organization.
b. Contact friends and neighbors to inquire if they have any useful information about the perpetrator.
c. Contact the Federal Trade Commission for assistance and advice.
d. Do none of the above.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a common characteristic of fraudulent money offer letters?
a. The letter will ask for help, convincing the victim that assistance is desperately needed.
b. Through the letter, the perpetrator will try to build a relationship of trust with the victim.
c. The letter promises the victim a large amount of money for little or no effort on the victim’s part.
d. The letter will make the victim feel that he or she is the only person receiving the “once in a lifetime” offer.
e. All the above.

A

e)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The major reason that elderly people are so susceptible to telemarketing fraud is that they:
a. Are often financially in need.
b. Have an excess amount of cash to invest.
c. Are often lonely and enjoy talking to friendly callers.
d. Are none of the above.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Consumers should provide credit card numbers or bank account information over the telephone only when:
a. They initiated the call and are purchasing a legitimate product.
b. They are asked to give the information.
c. The entity receiving this information is a legitimate company.
d. They feel confident that the receiving entity will protect such information.
e. Doing so qualifies them to receive certain financial benefits.

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the best defense against consumer fraud?
a. Signing up with the national do not call registry.
b. Purchasing credit card insurance.
c. Educating yourself about credit card risks.
d. Calling the Federal Trade Commission (FTC).

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does “https” stand for?
a. Hypertext transfer protocol (secure).
b. Hypertext transfer point (site).
c. Hypertext transfer protocol (system).
d. Hypertext transfer protocol (sign).

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is not listed in the chapter as a common characteristic of Nigerian scam letters?
a. The promise of money to lure victims.
b. Urgency to invest quickly.
c. Picture of perpetrator to assure victims.
d. Strong ties to high-ranking foreign officials to lure victims.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following institutions would not be very helpful to call in the event of identity theft?
a. IRS.
b. Social Security Administration.
c. Local chamber of commerce.
d. A credit reporting agency.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is one way to determine if a website is secure or not?
    a. Look for the official logo of the company you want to deal with.
    b. Look for an “s” after the “http” in the URL of the Web site.
    c. Click on a link to see if it works.
    d. Call the FTC and ask about the ISP address of the Web site.
A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Those most susceptible to consumer fraud are often:
a. Uneducated or elderly.
b. Wealthy and prominent.
c. Troubled with credit card debt.
d. None of the above

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is not a fraud risk unique to e-business transactions?
a. Innovative technologies where security lags process development.
b. Selling new products.
c. Complex information systems.
d. Removal of personal contact.

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

E-business transactions make it easier to commit which of the following types of frauds?
a. Kickbacks.
b. Customer impersonation.
c. Setting up dummy companies.
d. Stealing petty cash.

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is not an element of a company’s control environment?
a. Audit committee participation.
b. Management’s philosophy.
c. Hiring policies.
d. Independent checks.

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is not an internal control activity or procedure?
a. Physical safeguards.
b. Segregation of duties.
c. Internal auditors.
d. Documents and records.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following fraud risks involves changing IP addresses? a. Spoofing.
b. Sniffing.
c. False Web sites.
d. Customer impersonation.

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following fraud risks involves viewing information as it passes along network channels?
a. Sniffing.
b. Spoofing.
c. False Web sites.
d. Web hijacking.

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Using a subtly different Internet host name to mimic another business is known as:
a. Spoofing.
b. Sniffing.
c. Web-visit hijacking.
d. Falsified identity.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Passwords and biometrics are both:
a. Authorization controls.
b. Independent check controls.
c. Physical controls.
d. Document controls.

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following human features is generally not used in biometrics?
a. Fingerprints.
b. Voice tones.
c. Retina patterns.
d. Weight.

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following types of controls is least often used to protect IT processing equipment?
a. Physical controls.
b. Authorization controls.
c. Independent checks or reference.
d. Documents and records.

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the most important factor in control effectiveness?
a. Clear policies regarding controls.
b. An understanding of e-business networks.
c. The use of random monitoring.
d. The “tone at the top.”

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Secure web connections are based on:
a. DNS.
b. FTP.
c. HTTPS.
d. FTPS.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following statements correctly describes consumer fraud?
a. Any fraud that is committed by a consumer
b. Any fraud that targets individuals as victims
c. Any fraud that is committed against an organization
d. Any fraud that is instigated from a separate country

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

According to the Federal Trade Commission, what is the most common type of consumer fraud?
a. Identity theft
b. Ponzi scheme
c. Magazine fraud
d. Telephone fraud

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following identity theft actions listed is part of the trial stage, first dimensional actions?
a. Efforts to gain victim’s personal information
b. Larger thefts, often involving personal interaction, without much chance of getting caught
c. Largest thefts committed after perpetrators have confidence that their schemes are working
d. Small thefts to test the stolen information

A

d)

30
Q

Which of these is a second dimensional action in the trial stage of the identity theft?
a. Larger thefts, often involving personal interaction, without much chance of getting caught
b. Smallest thefts that lay down a solid foundation for the perpetrator to commit identity theft
c. Largest thefts committed after perpetrators have confidence that their schemes are working
d. Small thefts to test the stolen information

A

a)

31
Q

Which stage is considered to be the most critical stage of the identity theft cycle?
a. Action stage
b. Trial stage
c. Discovery stage
d. Cover-up stage

A

b) This is where the fraudster’s work starts to pay off

32
Q

Which of the following statements defines shoulder surfing?
a. Criminals physically confront consumers forcing them to reveal their valuable information.
b. Criminals follow consumers to discover their buying habits.
c. Criminals sneak into victims’ homes and steal their information.
d. Criminals watch consumers from a nearby location as they give credit card information over the phone

A

d)

33
Q

Which of the following is NOT an action to minimize your risk of identity theft?
a. Opting out of pre-approved credit cards
b. Shredding mail that contains detailed information
c. Using strong passwords and changing them often
d. Using Social Security number on visiting cards

A

d)

34
Q

How do fraudsters use “cookie” type software?
a. To automatically remove web histories after one closes the web browser
b. To initiate pop-ups to unknown sites to gather valuable consumer information
c. To show the status of a Web site to be secure
d. To gather personal and confidential information from consumers’ hard drives

A

d)

35
Q

Which of the following is a true statement regarding the Gramm-Leach-Bliley Act?
a. The act gives financial institutions the right to share personal information for a profit.
b. The act expressly requires financial institutions to protect against identity theft.
c. The act allows financial institutions to share personal information, as long as it is not for a profit.
d. The act protects confidentiality of customer information.

A

a)

36
Q

A Nigerian money offer e-mail is a form of which of the following scams?
a. Foreign advance-fee scam
b. Purchase of real estate scam
c. Clearinghouse scam
d. Multilevel marketing scam

A

a)

37
Q

A clearinghouse scam involves a victim receiving:
a. a letter that claims he or she has inherited a significant amount of money.
b. mail from a known party who claims to have access to large sums of money or assets.
c. a letter that falsely claims the writer represents a foreign bank.
d. an email containing their Social Security number and/or credit information.

A

c)

38
Q

Which of the following is not a characteristic of a Nigerian money offer scam?
a. States the need for urgent assistance
b. Makes the victim feel like he or she is the only recipient of the special opportunity
c. Involves someone trying to sell a piece of prime African real estate
d. The e-mail is the promise of money and asks for help

A

c)

39
Q

All of the following are types of foreign advance schemes, EXCEPT:
a. disbursement of money from wills.
b. multi-level marketing scams.
c. sale of crude oil below market price.
d. purchase of real estate scam

A

b)

40
Q

Which of the following is a variation of fraudulent MLMs, in which an organization sells illusionary products and
profits, instead of real products?
a. Ponzi scheme
b. Foreign advance scheme
c. Identity theft scheme
d. Shoulder surfing scheme

A

a) Ponzi scheme is one kind of fraudulent multi-level marketing scheme.

41
Q

Which of the following is the term for a fraudulent process whereby even representatives of legitimate MLMs are
required to buy large, expensive amounts of inventory.
a. Forward pricing
b. Snake oil
c. Front loading
d. Opportunity meeting

A

c)

42
Q

Snake oil plans are plans that:
a. make their money by getting new people to buy property in exotic locations.
b. promise enormous earnings or claim to sell miracle products.
c. motivate the purchase of unusually overpriced goods or services.
d. make people believe that they will make money simply because they are one of the earliest investors

A

b)

43
Q

Product testing is a fraud:
a. that requests consumers to review the products presented in the brochures and send their commentaries to the
supplier for review.
b. where consumers respond to an advertisement that promises income simply for stuffing envelopes.
c. that promise victims a job that involves strolling through stores, enjoying the displays, shopping for merchandise,
and then filing reports on the experiences they have had.
d. where perpetrators promise high pay for working on different projects

A

a)

44
Q

Accumulating documentation belongs to which stage of the identity theft cycle?
a. Action stage
b. Discovery stage
c. Trial stage
d. Concealment stage

A

a) Accumulating documentation is part of the action stage of the identity theft cycle. It refers to the process used by perpetrators to obtain needed tools to defraud
victims

45
Q

Which of the following is a hi-tech method by which thieves capture personal or account information from a credit
card, driver’s license, or even a passport?
a. Surfing
b. Skimming
c. Clawbacks
d. Phishing

A

b)

46
Q

Identify the complaint database developed by the U.S. Federal Trade Commission.
a. Consumer Watch
b. Fraud Watchdog
c. Consumer Sentinel
d. Identity Theft Assistance

A

c)

47
Q

Which of the following is described as the viewing of information that passes along a network line?
a. Sniffing
b. Spoofing
c. Hijacking
d. Impersonation

A

a) Sniffing is commonly used to gather information from unencrypted communications.

48
Q

The threat of falsified identity is less of a concern in the case of:
a. virtual private networks.
b. traditional EDI settings.
c. e-business.
d. unsecured online transactions.

A

b) Traditional EDI uses relatively limited access points, dedicated lines, and established value-added network providers as intermediaries.

49
Q

What is biometrics?
a. A vital part of the security of any electronic system
b. The use of unique features of the human body to create secure access controls
c. The most important aspect of internal control in an organization
d. An authorization that reassures users that transactions are valid

A

b)

50
Q

What is spoofing?
a. Using a subtly different Internet host name to mimic another business
b. Changing the information in e-mail headers or IP addresses
c. Extracting personal or corporate computer information from employees
d. Viewing the information that passes along a network line

A

b) This is a way for perpetrators to hide their identities.

51
Q

What is the term for when a hacker calls a targeted user posing as technical support and asks the victim to divulge the
account information so that immediate steps can be taken to prevent data loss from the account?
a. Social engineering
b. Spoofing
c. Data theft
d. Customer impersonation

A

a) Their goal is to obtain passwords and other identifying information

52
Q

In an electronic environment, no other control can better prevent fraud than the wise use of _________.
a. digital certificates
b. biometrics
c. anti-virus software
d. passwords

A

d)

53
Q

Which of the following is NOT a general type of control activity?
a. Adequate separation of duties
b. Independent checks on performance
c. Proper authorization of transactions and activities
d. Use of internal auditors

A

d)

54
Q

Which of the following are self-contained programs that represent one of the biggest threats in e-commerce fraud?
a. P2P programs
b. Internet worms
c. Trojan horses
d. Spyware

A

b) This is today’s largest threat to e-commerce.

55
Q

Passwords, biometrics, and digital signatures are examples of which of the following?
a. Physical controls
b. Segregation of duties
c. Authorization controls
d. Checks on performance

A

c)

56
Q

Why is it that Internet users’ information can be hijacked when they conduct web visits?
a. Social engineering has made it easy to do so.
b. Many managers lack the technical expertise to prevent and detect data theft.
c. Data can be transferred easily and quickly to any location in the world.
d. Subtle differences in Internet host names often go unnoticed by Internet users

A

d)

57
Q

What is the term that describes the act of trying to gain access to networks and secure information during a risk
assessment?
a. Troubleshooting
b. Intrusion detection
c. Encryption
d. Security audit

A

b)

58
Q

What is the term for a method of injecting Javascript and other browser commands into the Web site data?
a. Database query injection
b. HTML
c. Cross-site scripting
d. Java

A

c)

59
Q

Which of the following examples illustrates sniffing?
a. A fraudster impersonating a customer and buying equipment on the customer’s account
b. A fraudster viewing design data of a special project that is being transferred over a network
c. A fraudster using another employee’s passwords to access sensitive information
d. An Internet site mimicking another site by using .org instead of .com

A

b)

60
Q

What is the term for a technique in which hackers go to known business traveler locations like airports and set up
access points (which look like regular wireless networks) through their laptops to the Internet?
a. Social engineering
b. Spoofing
c. Phishing
d. Wartrapping

A

d)

61
Q

Which of the following human features is generally used in biometrics?
a. Height
b. Fingerprints
c. Complexion
d. Weight

A

b)

62
Q

The most difficult aspect of detecting e-business fraud is:
a. information about the transactions is captured in databases that are impossible to analyze.
b. correctly specifying the types of frauds that can occur and the symptoms they will generate.
c. the lack of hard-copy documentation, the very essence of e-business.
d. using technology to catch technology fraud

A

b) This is a difficulty because hackers are continually developing new frauds.

63
Q

Which of the terms below best describes the act of employees using sophisticated denial-of-service attempts on local
machines?
a. Phishing
b. Sniffing
c. Vandalism
d. Wartrapping

A

c)

64
Q

Which of the following e-commerce threats spreads via direct transfer or e-mail?
a. Internet worms
b. Trojan horse
c. Wartrapping
d. Phishing

A

a)

65
Q

Which of the following is the first step in looking for e-business fraud?
a. Identify the frauds that can occur in the type of business being investigated
b. Determine the symptoms of e-business fraud within the business being investigated
c. Gain an understanding of the business being investigated
d. Investigate any anomalies observed within the business being investigated

A

c)

66
Q

Which of the following is the last step taken by fraud examiners during an examination of a business when looking for
e-business fraud?
a. Investigate all symptoms of e-fraud found
b. Use information systems to highlight possible fraud activity
c. Analyze the results of database searches
d. Determine if the activity noted is an anomaly or usual business activity

A

a) Investigation of symptoms is the last step of fraud examiners.

67
Q

An IDS is used to:
a. Write computer scripts
b. Gain access to large networks
c. Monitor logs and detect potential break-ins
d. Troubleshoot networks

A

c)

68
Q

Which of the following activities would be the least practical for a fraud examiner?
a. Gaining an understanding of the tools and methods perpetrators use in e-business fraud
b. Gaining a working knowledge of computer networking systems
c. Learning the strengths and weaknesses of Windows
d. Getting to know each company employee’s interactions with the systems

A

d) To accomplish this in a business of any size would be too time-consuming.

69
Q

Which of the following is NOT a means of using technology to spot technology fraud?
a. Routinely search databases for symptoms
b. Utilize intrusion detection programs
c. Secure company systems
d. Train employees to recognize probable fraud

A

d) This my help detect fraud, but it is not a means of using technology.

70
Q

Which of the following is NOT an act of vandalism?
a. Deleting a customer data file
b. Pouring hot coffee on a company keyboard
c. Stealing company data lists
d. Throwing a computer monitor

A

c) This is illegal, and fraud or harm may be the intent, but it is not an example of vandalism.

71
Q

Which of these is a program that claims to do something useful, but also contains hidden behavior?
a. A Trojan horse
b. A normal computer virus
c. Adware
d. An Internet worm

A

a)