Chapter 31 Test Identity Crimes Questions
27. 31.1.3 Identity theft personal identifiers include all of the following except: a. Date of birth b. Bank account numbers c. Social security number d. Phone number
b. Bank account numbers
37. 31.5.1.2 How can someone be better prepared if they become a victim of identity crime? a. Be aware of Financial Records b. Never Use Computers c. Only have one bank d. Only write checks
a. Be aware of Financial Records
13. 31.1.1.2. The theft of trash or theft of documents from the trash is known as . a. Dumpster Diving b. Recycling Documents c. phishing for information d. Procuring False Documents
a. Dumpster Diving
16. 31.3.1.2. A person with the intent to harm or defraud another, obtains, possesses, transfers, or uses an item or identifying information of another person without consent, or uses the identifying information of a deceased person is a . a. Fraudulent Use of I.D. Information b. Theft of a Person's ID c. Identity Crime d. Security Alert
a. Fraudulent Use of I.D. Information
24. 31.3.1.1 Under the Identity Theft and Assumption Deterrence Act, identity theft: a. Is a federal crime b. Is not a federal crime c. Is a crime against nature d. Is not a criminal act
a. Is a federal crime
12. 31.1.1.3. Which of the following is not a financial identifier? a. Mother s Maiden Name b. Credit card number c. Bank account number d. Personal ID numbers e. Insurance account numbers
a. Mother s Maiden Name
18. 31.3.1.3. A notice placed on a consumer file that alerts a recipient of a consumer report involving that consumers file that the consumer's identity may have been used without the consumer's consent to fraudulently obtain goods and services in the consumer's name. a. Security Alert b. Security Freeze c. Expunction d. Bank Fraud
a. Security Alert
33. 31.2.1.1 Many criminal that want to obtain personal data from people online use a technique known as_____________. a. Spoofing b. phishing c. Surfing d. All of the above e. None of the above
a. Spoofing
15. 31.3.1.1. Which of the following federal statues deals with Identify theft? a. U.S.C. Title 18 b. Texas Penal Code 32.51 c. Federal Business and Commerce Code d. Texas Code of Criminal Procedure 60.19
a. U.S.C. Title 18
9. 31.1.1.1. Theft or misuse of personal information or financial identifiers in order to gain something of value and or facilitate other criminal activity is ? a. identity crime b. dumper diving c. an expunction d. a security alert
a. identity crime
2. 31.1.1.1. Identity Crime is defined as: a. the theft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity. b. a notice placed on a consumer file that prohibits a consumer reporting agency from releasing a consumer report relating to the extension of credit involving that consumer file without the express authorization of the consumer. c. notice placed on a consumer file that alerts a recipient of a consumer report involving that consumer file that the consumer's identity may have been used without the consumer's consent to fraudulently obtain goods or services in the consumer's name. d. All of the above are correct
a. the theft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity.
10. 31.1.1.1. Identity theft, credit card abuse, access device, check, bank, false ID, and passport fraud are all . a. types of ID crimes b. words associated with financial investments c. personal identifiers d. financial identifiers
a. types of ID crimes
35. 5.1.1. How should law enforcement agencies be in their approach to educating the public about identity crime? a. Reactive b. Proactive c. Counteractive d. Retroactive
b. Proactive
19. 31.3.1.4. A notice placed on a consumer's file that prohibits a consumer reporting agency from releasing a consumer report relating to the extension of credit involving that consumer file without the express auth. Of the consumer a. Security Alert b. Security Freeze c. Expunction d. Bank Fraud
b. Security Freeze
4. 31.1.1.2. Identity crime is used as a facilitator, through financing or anonymity, to commit other criminal activities. Which of the following is not listed in the objectives? a. mail theft b. human trafficking c. narcotics/drug d. weapons trafficking e. wire fraud
b. human trafficking
23. 31.3.1.4 Security Freeze means a notice placed on a consumer file that _________a consumer reporting agency to releasing a consumer report relating to the extension of credit involving that consumer file ______ the express authorization of the consumer. a. Allows, with b. prohibits, without c. allows, without d. prohibits, with
b. prohibits, without
8. 31.4.1.2. If an identity crime is used to commit a bank fraud, governmental fraud or in furtherance of an investment scheme, insurance fraud the investigator should contact the . a. Secret Service b. US Postal Inspector c. F.B.I. d. U.S. Customs
c. F.B.I.
25. 31.1.1 According to the FTC, Texas is ______ in the nation of instances of identity crime reported. a. Second b. Tenth c. Fifth d. Twelfth
c. Fifth
30. 31.2.1.1. ___________ may fraudulently obtain your credit report by posing as a landlord, employer, or someone else who may have a legitimate need for (legal right to) the information. a. Friends b. Associates c. Identity Thieves d. Family member's
c. Identity Thieves
22. 31.3.1.3 Which of the following best describes Security Alert: a. Means a notice placed on a consumer file that alerts them that their identity may have been used with their consent to illegally obtain goods or services. b. Means a notice placed on a consumer file that alerts them that their secret identity may be in jeopardy. c. Means a notice placed on a consumer file that alerts them that their identity may have been used without their consent to fraudulently obtain goods or services in their name. d. Means a notice placed on a consumer file that alerts them that their money is about to run out.
c. Means a notice placed on a consumer file that alerts them that their identity may have been used without their consent to fraudulently obtain goods or services in their name.
26. 31.1.1.1 Identity crime is the ______ of personal or financial identifies in order to gain something of value and/or facilitate other criminal activity. a. theft or creation b. printing or laminating c. theft or misuse d. sale or misuse
c. theft or misuse
20. 31.4.1.2. If I think that I may be a victim of identity theft, I immediately contact: a. FBI b. US Secret Service c. The Federal Trade Commission d. U.S. Postal Inspector
c. The Federal Trade Commission
7. 31.2.1.1. The creation of e-mails and websites that appear to belong to legitimate businesses such as established retail companies, financial institutions, and online auctions sites is called? a. phishing b. pilfering c. spoofing d. trolling e. snookering
c. spoofing
31. 31.20.1.1. Looking over your shoulder or from a nearby location as you enter your "Personal Identification Number (PIN)" at an ATM machine is called? a. Peeking b. Phishing c. Nosy d. Shoulder Surfing
d. Shoulder Surfing
1. 31.3 P.C. 32.51 Fraudulent Use or Possession of Identifying Information offense happens if the person, with the intent to harm or defraud another, Obtains, possesses, transfers, or uses an item of: a. Identifying information of another person without the other person's consent b. Identifying information of a child younger than 18 years of age. c. Information concerning a deceased natural person, including a stillborn infant or fetus, that would be identifying information of that person were that person alive, if the item of information is obtained, possessed, transferred, or used without legal authorization d. All of the Above
d. All of the Above
32. 31.2.1.1. Identity theft can occur if? a. someone steals your email b. someone steals your account information c. someone steals your checks d. All of the above e. None of the above
d. All of the above
34. 2.1.1. (5) Identity thieves may obtain personal information in your_________? a. Dumpster b. Home c. Work laptop d. All of the above e. None of the above
d. All of the above
39. 5.1.3 Which of these should be done if you find yourself as a victim of identity crime? a. Notify the Police b. Check with the Social Security Administration c. Notify Creditors d. All of the above e. None of the above
d. All of the above
14. 31.2.1.2. A wide variety of sources provide publications that give criminals step-by-step instructions on techniques for producing false documents. Which of the following are sources to procuring false ID's? a. A bookstore b. Internet Retailers c. The Internet d. All of the above are correct
d. All of the above are correct
36. 31.5.1.1. All of these are techniques used to inform the public on identity crimes EXCEPT. a. public service announcements b. community policing involvement c. Internet d. All of the above are correct e. None of the above are correct
d. All of the above are correct
5. 31.1.1.2. Identity crimes can begin with other seemingly unrelated crimes. Which of the following are examples of unrelated crimes? a. Robbery b. Computer Intrusion c. Dumpster Diving d. All of the above are examples of unrelated crimes e. None of the above are examples of unrelated crimes
d. All of the above are examples of unrelated crimes
29. 31.1.2. Identity theft is used to facilitate other criminal activity such as: a. Weapons trafficking b. Mortgage fraud c. Money Laundering d. All of the above. e. None of the above
d. All of the above.
38. 5.1.2 Which of these is something the public should do to protect themselves? a. Keep detailed records of banking b. Check credit histories c. Destroy carbon copies of credit card receipts d. All of these should be done to protect yourself e. None of the above
d. All of these should be done to protect yourself
28. 31.1.1.1 The identity theft crime of "skimming" is also known as: a. Conducting a phony telephone or email scam. b. Stealing information by listening in on a cellular phone call. c. Hacking into computers. d. Credit card/access device fraud.
d. Credit card/access device fraud.
6. 31.2.1.1. Some identity theft includes "shoulder surfing." What is shoulder surfing? a. Stealing your wallet, purse, briefcase, etc b. Rummaging through your trash or the trash c. Fraudulently obtaining your credit report by posing as a landlord d. Looking over your shoulder from a nearby location
d. Looking over your shoulder from a nearby location
17. CCP 55.02 Which one of the following is not true about expunctions a. The Court SHALL no later than the 30th day after the date of the acquittal enter an order of expunction for a person. b. The defendant SHALL provide all the information required in a petition for expunction c. The DPS and Department of Criminal Justice shall delete, as appropriate, from their public records all files in conjunction with the expunction order. d. The Court Shall order a Security Alert for the effected consumer
d. The Court Shall order a Security Alert for the effected consumer
21. 31.3 CCP 55.02 A person who is entitled or eligible for expunction of records and files expunction, may file an ex parte petition for expunction in a district court for the county in which: a. the petitioner was arrested b. the offense was alleged to have occurred c. neither a & b d. both a & b
d. both a & b
3. 31.1.1.2. Types of identity crimes include which of the following: a. identity theft and/or credit card/access b. device fraud ("skimming") and/or false identification fraud c. check fraud and/or bank fraud d. passport/visa fraud e. All of the above are examples of Identity Crime
e. All of the above are examples of Identity Crime
11. 31.1.1.3. Which of the following is not a personal identifier? a. Name b. DOB c. SSN# d. Passport number e. Bank account number
e. Bank account number