cybercrime Ch. 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The Bank Secrecy Act of 1970 requires that financial institutions keep records of cash transactions over what amount?

$10,000

During what decade did electronic funds transfers (EFTs) begin to expand money laundering opportunities?

1960's

Which country has become the most active source of national and industrial espionage?

China

Which law has become the primary vehicle for the prosecution of Internet fraud crimes?

Computer Fraud and Abuse Act (CFAA)

The "Nigerian 419" scheme is primarily what type of computer crime?

Confidence Scheme

Traditional money laundering techniques include all of the following EXCEPT which one?

Electronic transfer of "e-cash"

Which crime is essentially a theft in violation of trust?

Embezzlement

________ is/are the most frequent type of consumer fraud complaint.

Identity Theft

Deceptive practices involving the use of capital to create more money is known as:

Investment Fraud

________ is the act of concealing the source of assets that have been illegally obtained.

Money Laundering

Which country ranks second behind only the United States in losses associated with Internet fraud schemes

Nigeria

________ is/are the most widely reported type of Internet fraud.

Online auction fraud

Domestic spies hired by corporate competitors that are intent on gaining a competitive advantage over American firms are what type of corporate spies?

Outsiders

________ attempt to lure potential victims to fraudulent websites for the purpose of gathering sensitive personal information.

Phishing schemes

Which of the following is NOT a low-tech means identity thieves use to steal personal information?

Skimming Devices

Which of the following is not a form of secondary support FinCen provides to local law enforcement agencies?

The actual prosecution of money-laundering cases

Which of the following is NOT a characteristic of the modern embezzler?

The embezzler is limited by the physical nature of the theft act.

"Neutralization techniques" may be defined as

Ways that embezzlers overcome lingering shame associated with the crime of embezzlement

Which of the following has increased the occurrence of corporate espionage in the last few decades? a. The constant use of e-mail as a means of intra-office communication b. Corporate community's increasing use of information and technology to conduct business c. Global commerce conducted over the Internet d. All of these

d. All of these

Corporate espionage schemes may target which of the following? a. customer lists b. product specifications c. research and development data d. all of these

d. all of these


Set pelajaran terkait

Chapter 01: Mental Health and Mental Illness

View Set

American Indian History (Final Exam)

View Set

PrepU: Ch. 19 Documenting and Reporting

View Set

Survey of Music Business Test #4

View Set

Chapter 2 - Statistics and APA Ethical Guidelines

View Set

Chemistry: Heterocyclic compounds

View Set