White Collar Crime Test 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is one specific method that the EPA uses to help keep the public informed about air pollution issues?

Airnow

Market manipulation by energy companies is restricted under which statute?

Energy independence and Security Act of 2007

In the 1990s, U.S. officials tried to apply criminal sanctions to businesses in other countries that committed corporate crimes, but the Supreme Court prevented it.

False

Prior to the creation of the Occupational Safety and Health Administration, 14,000 people died in the United States everyday while working.

False

Secondary victims include members of the community harmed by victimization.

False

Unlike victims of other white-collar crimes that often fail to report their victimization, most victims of computer-related crimes report offenses.

False

Vandalism is a consequence of mortgage fraud usually faced by businesses forced to shut down.

False

When 100 people died in a nightclub fire, the club had committed the offense of providing an unsafe product.

False

White-collar cybercrime describes crimes that occur outside of an employer's workplace.

False

With globalization and unsafe goods, the United States is doing a better job at tracking which goods and parts come from which countries so that they can be held responsible in the case of an unsafe product.

False

Why were the 1970s labeled the "environment decade?"

Hundreds of new laws were passed to protect the environment

Opportunity explanations for computer crimes focus on the ease with which offenses are committed.

True

Student loan fraud is often committed by students themselves by taking out college loans knowing that they don't plan to attend.

True

Students became targets for student aid fraud as the demand for a college education increases.

True

The Commodity Exchange Act calls upon the Federal Trade Commission to treat market manipulations by petroleum and oil company insiders as false and deceptive business practices that could be subjected to fines of up to one million dollars

True

One of the four views that define the concept of a corporation is which of the following?

corporations exist in a physical or structural presence

If an offender remotely accesses the control systems of an infant formula manufacturer and changes the ingredients with a deadly result, what type of crime has been committed?

cyberterrorism

In 2004 when a large college was caught lying to students about the transfer ability of its credits, what type of offense were they committing?

deceptive sales

Which of the following is a warning sign for mortgage fraud?

increased commissions for brokers

How does banking fraud differ from investment fraud?

individuals engage in fraudulent behaviors to take money from a bank

What is usually stolen during theft as a computer crime?

information

The theft of intellectual property is what type of stolen information?

information protected by copyright

Imagine you are taking a test in a class where one classmate was able to access the test questions ahead of time through a friend. What type of crime in the economic system is this analogy most similar to?

insider trading

Business activities that are covered by antitrust laws include which of the following?

intellectual property use

If someone failed to pay for an item "bought" on eBay, what type of crime would they be committing?

internet crime

What are crimes in the economic system usually classified as?

investment fraud

Which of the following is a red flag warning of a Ponzi scheme?

investors receive high returns consistently

The Computer Fraud and Abuse Act of 1984, broadened in 1996 to make various aspects of computer offending a federal crime, is what strategy for responding to cybercrime?

legislative

Over one-third of companies surveyed in a study on cybercrime attributed some of their cyberattacks to whom?

malicious insiders

Which offense do some question whether it is a true corporate crime?

price discrimination

What type of antitrust offense is holding prices firm, fixing warranties, and eliminating discounts considered?

price fixing

What type of offense was seen in the aftermath of Hurricane Katrina when gas prices were raised significantly?

price gouging

Hospitals are particularly vulnerable to what type of cyberattack?

ransomware

Fraudulent home improvement scams fall under what category of fraud?

real estate agent fraud

Which of the following is not a right given to workers under the Occupational Safety and Health Act?

refuse to work if they feel conditions are unsafe

Under the 'sin-tax' what are companies allowed to do with pollutants?

release pollutants into the air

An agent who fails to pay off a homeowner's original mortgage at closing by keeping the money instead of sending the funds to the lending institution is committing what type of fraud?

reverse mortgage fraud

In regards to the corporate crime dynamics, what does the breadth of victimization refer to?

single offenses can affect millions of people

Which type of fraud occurs when individuals purchase a home they don't plan to live in and then deed the home over to another person who plans to live there?

straw buyer fraud

Which of the following is not a cost associated with workplace injuries and illnesses?

stricter policies relating to the work environment

In 2014, the U.S. Department of Education offered what conclusion about student loan fraud between 2009 and 2012?

student aid fraud rings began to operate

What role is the computer playing if it is hacked?

target of an offense

What does the "cradle to the grave" provision of the Resource Conservation and Recovery Act refer to?

the responsibility of the creator of the waste to track it from creation to disposal

Pollution itself is not an environmental crime.

true

Social networking sites, like Facebook, relate to and offer five different opportunities for white-collar crime.

true

The media pays little attention to corporate crimes.

true

Two types of crackers exist, those on the inside of a targeted company and those on the outside

true

What type of crime do hackers or crackers usually commit?

unauthorized access

A survey by the Ponemon Institute found that the cost of cyber offending was highest in which industries?

utilities, financial, and energy

When parties from different levels of production, manufacturing, and distribution agree to set prices at a certain level, they are committing what type of offense?

vertical price fixing

How do victim characteristics inhibit law enforcement response to computer crimes?

victims often don't know that they are victims

When does a short sale of a foreclosed home become mortgage fraud?

when an agent convinces a bank to sell a home at a loss and uses a corporation to buy the house at a significantly higher price

An offender working with a network of conspirators to commit crimes is an example of what pattern typical in investment fraud?

white-collar gangs

When appraisers intentionally do not conduct a thorough determination of a home's value, they are committing what type of fraud?

windshield appraisal

When officials pump up the prices of stocks by sharing false information online and then subsequently sell their own stocks at a higher price, what crime have they committed?

market manipulation

Which type of crime is believed to be pervasive in the natural energy industry?

market manipulation

Why are colleges and universities a possible target for cyber criminals?

the enormous amount of data collected and stored on campuses

What is one important reason for the creation and persistence of sweatshops?

the existence of a large vulnerable and exploitable population

When drug dealers divide a neighborhood into territories to sell drugs and respond violently when other dealers sell in their neighborhood, what type of antitrust offense is this analogous to?

market allocation

Which of these statements about false advertising is not true?

Advertisements featuring celebrities do not necessarily have to reflect their true beliefs about a product, as long as they are aware of this.

Which of the following cannot be considered a type of software crime?

Child pornography

Which of the following is an antitrust offense?

market allocation

Complex jurisdictional issues encourage cooperation among law enforcement agencies in their efforts to respond to cybercrime.

False

Computer crime and cybercrime refer to computer-related behaviors that are illegal, but not harmful.

False

Deceptive sales occur when businesses make inaccurate statements about their products or services in order to facilitate the sale of those items/services.

False

In a Ponzi scheme, the victim rarely interacts with the creator of the scheme.

False

Piracy is most specifically considered a type of internet crime.

False

What do pyramid and Ponzi schemes have in common?

Payments made to investors come from new participants in the schemes

Which type of harmful products is often found to be the most unsafe?

Toys

Crimes in the economic system are generally classified as investment fraud and banking fraud.

True

Exclusively using one appraiser can be a warning sign of mortgage fraud.

True

For straw buying schemes to be successful, appraisers must provide inflated appraisals.

True

Interference with an individual's access to their technology because of cyber offending can cause physical and social consequences for the victim.

True

Misrepresenting preloan counseling can be a type of reverse mortgage fraud.

True

Under which circumstance is price discrimination illegal?

it decreases competition

Why are antitrust offenses difficult for officials to detect or identify?

agreements can be made without verbal or written evidence

What separates illegal flipping and legitimate fixing and reselling of houses?

an individual home is bought and resold multiple times at inflated prices

What is a common pattern shared by mortgage and investment offenders?

an offender is involved with a network of participants to commit fraud

A group of infected computers online, under the control of one cyber offender at the same time, is known as what type of computer crime?

botnet

Chunking and churning are types of mortgage fraud that involve what type of real estate activity?

buying and selling multiple homes

When an offender convinced people to invest in gold that did not actually exist, what type of investment fraud was committed?

commodities fraud

Competitors who conspire to submit artificially high bids or estimates so that a specific competitor with a low price will be selected for a job are committing what type of collusion?

complementary bidding

Why is there so little attention given to reporting on corporate crimes?

corporate crime is not as sensational as other types of crime

Which of the following is an employee-based strategy that employers use to protect their businesses from computer crime in the workplace?

employee-initiated audits of their computer use

The allegations against the British Petroleum company (BP) after their major oil spill in 2010 were for what type of crime?

environmental crime

Which type of mortgage fraud involves investors convincing financially distressed homeowners to "hire" them to buy the home?

equity skimming

What has the government done to try to address the working conditions and exploitation of workers in sweatshops?

established the fair labor and standards act targeting unfair labor practices such as exploitation and discrimination

An employer who asks a worker to stay late and help clean up without being paid is committing what type of offense?

exploitation

The public is often aware of corporate crimes committed by companies, but do not realize the actions they can take to stop it.

false

Which type of offense is likely to go unnoticed by victims?

food poisoning

What type of crime do prearranged trading and bucketing fall under?

futures trading fund

With nursing home neglect, what type of offense is being committed?

harmful treatment of consumers

If an offender convinces an investor to invest on the promise that funds are backed by the Federal Reserve when in fact there is no backing for these funds, what type of crime has been committed?

high-yield investment schemes

What computer crime can result from responding to phishing emails?

identity theft

If a computer virus is not introduced into a computer by an intruder, what is the intruder's probable goal?

obtain information

When cyber offenders steal information for profit, what is one way they sell stolen information?

offer dumps of credit card and/or banking information

What type of computer crime is most prevalent on college campuses?

piracy

What type of fraud do builders commit?

they offer excessive incentives to buyers that are not reported to the lender to increase their profit

Even if they get caught, many corporations believe the benefits outweigh the costs when it comes to committing corporate crimes

true

Food poisoning is considered a corporate crime.

true


Set pelajaran terkait

CA 45 - Hour Real Estate Finance Course

View Set

5 Renal Question Collection for Exam

View Set

Environmental Public Health Chp 1-10, 12

View Set

TMC test bank wrong questions 6-10/NBRC

View Set