The Fourth Amendment requires that probable cause exist before a defendant is arrested or searched. Which of the following levels of evidence is necessary to show probable cause?

The Fourth Amendment requires that probable cause exist before a defendant is arrested or searched. Which of the following levels of evidence is necessary to show probable cause? 




A. Less than certainty, but more than speculation or suspicion
B. Speculation or suspicion
C. Beyond a reasonable doubt
D. Preponderance of the evidence



Answer: A

In a civil trial, settlements may be negotiated:

In a civil trial, settlements may be negotiated: 



A. At any time during the litigation
B. After arraignment
C. At no time once negotiation begins
D. Only after the judge orders negotiation between parties





Answer: A

Having a civil trail before a criminal trial has which of the following benefits?

Having a civil trail before a criminal trial has which of the following benefits? 



A. Defendant may make admissions during civil trial that can be used in criminal trial
B. Greater access to documents of the defendant
C. Defendant is not guaranteed the right to an attorney
D. Both A and B


Answer: D

Fraud investigators can assist in a case in which of the following ways?

Fraud investigators can assist in a case in which of the following ways? 




A. By preparing questions to ask opposing witnesses during depositions
B. By evaluating whether documents produced by the opposing side satisfy a production request
C. By assisting in the preparation of a production request because of their knowledge of a case
D. By A and B
E. By A, B, and C


Answer: E

During cross-examination, expert witnesses should:

During cross-examination, expert witnesses should: 




A. Address areas outside of their areas of expertise.
B. Appreciate opposing council when they act very friendly.
C. Respond evasively and ambiguously to tough questions.
D. Maintain the same positions taken during direct testimony.



Answer: D

During a trial or deposition, expert witnesses should:

During a trial or deposition, expert witnesses should: 



A. Respond aggressively
B. Bring notes and work papers to cite
C. Answer questions convincingly, without hedging their answers.
D. Memorize will-crafted responses to saw what they think sounds effective.


Answer: B

Which of the following rights is not provided by the Fifth Amendment?

Which of the following rights is not provided by the Fifth Amendment? 



A. Individuals are protected from double jeopardy (being tried twice for the same crime).
B. States cannot seize private property without just compensation
C. Individuals have the right to refuse to incriminate themselves
D. Miranda rights must be read upon arrest



Answer: D

Passwords and biometrics are both:

Passwords and biometrics are both: 



A. Authorization controls
B. Independent check controls
C. Physical controls
D. Document controls



Answer: A

What is one way to determine if a Web site is secure or not?

What is one way to determine if a Web site is secure or not? 



A. Look for the official logo of the company you want to deal with
B. Look for an "s" after the "http" in the URL of the Web site
C. Click on a link to see if it works
D. Call the FTC and ask about the ISP address of the Web site



Answer: B

What does "https" stand for?

What does "https" stand for? 





A. Hypertext transfer point (secure)
B. Hypertext transfer point (system)
C. Hypertext transfer protocol (system)
D. Hypertext transfer protocol (sign)
E. Hypertext transfer protocol (secure)



Answer: E

What is the best defense against consumer fraud?

What is the best defense against consumer fraud? 




A. Signing up with the national do not call registry
B. Purchasing credit card insurance
C. Educating yourself about credit card risks
D. Calling the Federal Trade Commission




Answer: C

Consumers should provide credit card numbers or bank account information over the telephone only when:

Consumers should provide credit card numbers or bank account information over the telephone only when: 



A. They initiated the call and are purchasing a legitimate product.
B. They are asked to give the information
C. The entity receiving this information is a legitimate company.
D. They feel confident that the receiving entity will protect such information.
E. Doing so qualifies them to receive certain financial benefits.




Answer: A

Which of the following is a common characteristic of fraudulent money offer letters?

Which of the following is a common characteristic of fraudulent money offer letters? 




A. The letter will ask for help, convincing the victim that assistance is desperately needed.
B. Through the letter, the perpetrator will try to build a relationship of trust with the victim.
C. The letter promises the victim a large amount of money for little or no effort on the victim's part.
D. The letter will make the victim feel that he or she is the only person receiving the "once in a lifetime" offer
E. All the above




Answer: E

If you become a victim of identity theft, you should first:

If you become a victim of identity theft, you should first: 



A. Wait to see where the perpetrator is spending your money; then, using this information, plan an investigation with the local FBI organization.
B. Contact friends and neighbors to inquire if they have any useful information about the perpetrator.
C. Contact the Federal Trade Commission for assistance and advice.
D. Do none of the above.




Answer: C

The Gramm-Leach-Bliley Act gives you the right to:

The Gramm-Leach-Bliley Act gives you the right to: 



A. Periodically change your Social Security number to avoid identity theft.
B. Receive a yearly stipend to cover the losses incurred as a victim of identity fraud.
C. Claim your high credit report although an identity fraudster has damaged it severely.
D. Sue the perpetrator for more money than he or she defrauded from you.
E. Opt out of having your personal information sold to organizations.





Answer: E

In order to protect yourself from identity theft, you should:

In order to protect yourself from identity theft, you should: 





A. Only give out your Social Security number when purchasing a product online or over the telephone.
B. Always shred receipts, credit card offers, doctor's bills, insurance information, or any other documents that contain sensitive personal information.
C. Leave your wallet at home or in the car.
D. Maintain the same password for every personal account.
E. Do all of the above.



Answer: B

Multilevel marketing companies:

Multilevel marketing companies: 




A. Are illegal.
B. Increase their distribution process by recruiting additional company sales representatives.
C. Can legally pay commission to representatives for simply signing up new recruits.
D. Require little time and effort to be successful.


Answer: B

Phishing is the method of:

Phishing is the method of: 



A. Using e-mail or other Internet applications to deceive people into disclosing valuable personal information.
B. Convincing a person to divulge personal information over the telephone.
C. Hacking into another's computer files to access personal information.
D. Hiring a con artist to steal personal information from a person.



Answer: A