ID theft

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

1. B - technological devices

Current trends of identity theft involve ______________. A. medical and insurance records B. technological devices C. altered credit cards D. elderly victims

D - state jail felony

Fraudulent Use or Possession of Identifying Information (Texas Penal Code 32.51) is a ____________. A. Class C misdemeanor B. 3rd degree felony C. Class B misdemeanor D. state jail felony

A - something of value

Identity Crime is the theft or misuse of personal or financial identifiers in order to gain __________. A. something of value B. a personal identification number C. an access code D. an access identification number

A - proactive

Law enforcement agencies should be __________ in their approach of educating the public about identity theft. A. proactive B. reactive C. neutral D. responsive

C - Consumer Sentinel

The FTC provides law enforcement with an identity theft investigative cyber-tool called _________. A. Internet Sentinel B. Cyber Sentinel C. Consumer Sentinel D. Fraud Sentinel

B - Department of Public Safety

The ______________ is responsible for the storage and expunction of criminal records. A. FBI (Federal Bureau of Investigations) B. Department of Public Safety C. Social Security Administration D. FTC (Federal Trade Commission)

FTC (Federal Trade Commission)

The central collection point for the Identity Theft Data Clearinghouse is maintained by what agency? A. FTC (Federal Trade Commission) B. U.S. Secret Service C. FBI (Federal Bureau of Investigations) D. Social Security Administration

A - Identity Theft and Assumption Deterrence Act

The federal statute dealing with identity theft is a part of which federal act? A. Identity Theft and Assumption Deterrence Act B. Credit Reporting and Abuse Act C. Electronic Funds Transfer Act D. Computer Fraud and Abuse Act

D - police report

Credit bureaus require a ___________ in order to block fraudulent information and to begin repairing victim's credit reports. A. certified written request B. ten-day credit freeze C. full credit check D. police report

C - security freeze

A _______ means a notice placed on a consumer file that prohibits a consumer-reporting agency from releasing a consumer report relating to the extension of credit involving the consumer file without the express authorization of the consumer. A. security alert B. authorization notice C. security freeze D. validation lock

B - security alert

A ________ is a notice placed on a consumer file that alerts a recipient of the report that the consumer's identity may have been used without the consumer's consent to fraudulently obtain goods and services in the consumer's name. A. report tag B. security alert C. consent notice D. sentinel

FRAUDULENT USE OR POSSESSION OF IDENTIFYING INFORMATION

A person commits an offense if the person obtains, possesses, transfers, or uses identifying information of another person without the other person's consent and with intent to harm or defraud another.

C - notify their bank or financial institution

A victim of identity theft should __________. A. contact the U.S. Postal Service B. notify the FBI (Federal Bureau of Investigations) C. notify their bank or financial institution D. destroy their checks and credit cards

B - fifth

According to the FTC, Texas was __________ in the nation in the instances of identity fraud reported for 2002. A. first B. fifth C. tenth D. twentieth

A - U.S. Postal Service

An officer should notify the __________ if an individual is taken into custody for committing a financial crime involving the U.S. mail. A. U.S. Postal Service B. FBI (Federal Bureau of Investigations) C. FTC (Federal Trade Commission) D. U.S. Secret Service

D - destroy carbon copies of credit card receipts

As a guideline to personal protection against identity theft, it is recommended that a person should ______________ . A. include their driver's license number on their personal checks B. avoid generating unnecessary bank records C. shred previous years' bank and ATM records D. destroy carbon copies of their credit card receipts

Identity theft

When someone uses your personal or financial information to open credit accounts, create checks, buy property, open bank accounts, etc.

1. D - PIN (Personal Identification Number)

Which of the following is a financial identifier? A. Billing address B. Social security number C. Passport number D. PIN (Personal Identification Number)

A - taking patient files from a hospital

Which of the following is an example of business record theft? A. Taking patient files from a hospital B. Obtaining credit information by posing as a landlord C. Filling out a false change of address form D. Stealing a bank statement from someone's mailbox

D - Equifax

Which of the following is one of the three major credit-reporting agencies? A. Sentinel B. Phone Busters C. Trans Corp D. Equifax

B - It frequently begins with a seemingly unrelated crime.

Which of the following is true about identity crime? A. It is mostly limited to the Internet. B. It frequently begins with a seemingly unrelated crime. C. It is not related to violent crime or terrorism. D. It has become a major cause of insurance rate increases.

C - A book explaining how to falsify documents

Which of the following would be easy for a criminal to find online or in a store? A. A list of the codes used in private medical records B. Samples of the paper used to print currency C. A book explaining how to falsify documents Software for forging signatures


संबंधित स्टडी सेट्स

NUR 300 Sherpath Review: Skin Integrity and Wound Care - Analyze Cues and Prioritize Hypotheses; Plan and Generate Solutions

View Set

Mixtures and Solutions (Chemistry Unit Review)

View Set

Chapter 5 - Consolidated F/S - Intra-Entity Asset Transactions

View Set

Ch. 3 Theory, Research, Reasoning

View Set

Career Planning and Skill Development Unit 1 Lesson 2: Career Planning

View Set