!! Chapter 15

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Identity theft is the largest type of consumer fraud

True

identity theft can result in an individual's loss of credit

True

keeping your wallet in your front pocket will help prevent it from being stolen

True

A discarded tax return has enough information to steal someone's identity

true

Because it is impossible to market at an assortment of levels, every multilevel marketing scheme is fraudulent

true

Pyramid organizations eventually fail, causing all but a few investors to lose their investments

true

a fraud scam in which the perpetrator, falsely claiming to represent a foreign bank, tries to get victims to invest in nonexistent foreign venture capital companies for high returns is called a clearinghouse scam

true

illegal multilevel marketing companies almost always focus their efforts on the recruiting of new members rather than on the selling of legitimate products

true

the best way to prevent a fraudster from establishing a preapproved credit card in your name is to destroy all credit card applications as soon as you receive them

False

those most susceptible to consumer fraud a) uneducated or elderly b) wealthy and prominent c) troubled with credit card debt d) lonely and depressed

a) uneducated or elderly

consumers should provide credit card numbers or bank account information over the phone only when: a) they initiated the call and are purchasing a legitimate product b) they are asked to give the info c) the entity receiving this info is a legitimate company d) they feel confident that the receiving entity will protect e) such information doing so qualifies them to receive certain benefits

a. they initiated the call and are purchasing a legitimate product

Phishing is the method of: a) using e-mail or other internet applications to deceive people into disclosing valuable personal information b) convincing a person to divulge personal information over the telephone c) Hacking into another's computer files to access personal information d) Hiring a con artist to steal personal information from a person

a. using e-mail or other internet applications to deceive people into disclosing valuable personal information

what is one way to determine if a web site is secure or not a) look for the official logo of the company you want to deal with b) look for an "s" after the http in the url of the web site c) click on a link to see if it works d) call the FTC and ask about the ISP address of the web site

b) look for an "s" after the http in the url of the web site

In order to protect yourself from identity theft, you should: a) only give out your SS # when purchasing a product online or over the telephone b) always shred receipts, credit card offers, doctor bills, insurance info, or an other docs that contain sensitive personal info c) leave your wallet at home or in the car d) maintain the same password for every account e) do all of the above

b. always shred receipts, credit card offers, doctor bills, insurance info, or an other docs that contain sensitive personal info

Multilevel marketing companies: a) are illegal b) increase their distribution process by recruiting additional company sales reps c) can legally pay commission to reps for simply signing up new recruits d) require little time and effort to be successful

b. increase their distribution process by recruiting additional company sales reps

which of the following institutions would NOT be very helpful to call in the event of identity theft a) IRS b) SS Administration c) Local chamber of commerce d) a credit reporting agency

c) Local chamber of commerce

which of the following is not listed in the chapter as a common characteristic of Nigerian scam letters? a) the promise of money to lure victims b) urgency to invest quickly c) picture of perpetrator to assure victims d) strong ties to high ranking foreign officials to lure victims

c) picture of perpetrator to assure victims

The major reason that elderly people are so susceptible to telemarketing fraud is that they: a) are often financially in need b) have an excess amount of cash to invest c) are often lonely and enjoy talking to friendly callers d) none of the above

c. are often lonely and enjoy talking to friendly callers

if you become a victim of identity theft, you should first: a) wait and see where the perpetrator is spending your money and then plan with FBI b) Contact friends and neighbors to inquire if they have any useful info about the perpetrator c) contact the Federal Trade Commission for assistance and advice d) do none of the above

c. contact the Federal Trade Commission for assistance and advice

what is the best defense against consumer fraud? a) signing up with the national do not call registry b) purchasing credit card insurance c) educating yourself about credit card risks d) calling the FTC

c. educating yourself about credit card risks

Which federal statute requires that credit reports can only by obtained for legitimate business needs? a) Title 15 US code S 1692 b) Final Rule - 45 CFT parts 160 & 165 c) Title 15 US Code, Chapter 41 d) Titel 15 US Code S 1681

d) Titel 15 US Code S 1681

what does https stand for? a) hypertext transfer point - secure b) hypertext transfer point - site c) hypertext transfer protocol - system d) hypertext transfer protocol - sign e) hypertext transfer protocol -secure

e) hypertext transfer protocol -secure

which of the following is a common characteristic of fraudulent money offer letters? a) the letter will ask for help, convincing the victim that assistance is desperately needed b)through the letter, the perpetrator will try to build a relationship of trust with the victim c) the letter promises the victim a large amount of money for little or no effort on the victim's part d) the letter will make the victim feel that he or she is the only person receiving the once in a lifetime offer e) all of the above

e. all of the above

The Gram Leach Bliley Act gives you right to: a) periodically change your SS # to avoid identity theft b)receive yearly stipend to cover the losses incurred as a victim of identity fraud c) claim your high credit report although an identity fraudster has damaged it severely d) sue the perpetrator for more money than he or she defrauded you e) opt out of having your personal info sold to organizations

e. opt out of having your personal info sold to organizations

By federal law, no organization or company can sell individuals' personal information without their express written consent

false

Congress outlawed pyramid organizations in the US in 1934

false

Consumer fraud only affects those who often use credit cards online

false

Once an identity theft victim has reported a fraud to the FTC, the FTC will help a victim contact the FBI, Secret Service, and local police to coordinate an investigation

false

Only stupid people who are not careful are victims of consumer fraud

false

Since SS card does not contain your photo, it is impossible to have your identity stolen by merely losing your SS card

false

The Gramm-Leach-Bliley Act states that it is illegal for organizations to share your personal information with any other party or individual

false

The National Processing Company was given authority by the FTC to pre-register consumers for the do not call registry

false

elderly people are more susceptible to chain letter scams than any other type of fraud

false

the larger the amount requested by a fraudulent telemarketer, the easier it is for him or her to deceive victims

false


Set pelajaran terkait

PRINCIPLES OF PERIPHERAL BLOOD FILMS

View Set