The Fourth Amendment requires that probable cause exist before a defendant is arrested or searched. Which of the following levels of evidence is necessary...
Which of the following actions can fraud victims pursue after sufficient evidence is obtained?
Which of the following actions can fraud victims pursue after sufficient evidence is obtained?
A. Prosecute in a criminal court
B. Pursue civil...
In a civil trial, settlements may be negotiated:
In a civil trial, settlements may be negotiated:
A. At any time during the litigation
B. After arraignment
C. At no time once negotiation begins
D....
Which of the following is not one of the common stages of a criminal case?
Which of the following is not one of the common stages of a criminal case?
A. Filing a criminal charge
B. Filing a complaint
C. Discovery
D....
Having a civil trail before a criminal trial has which of the following benefits?
Having a civil trail before a criminal trial has which of the following benefits?
A. Defendant may make admissions during civil trial that can...
When deposing an expert witness, the opposing attorneys try to achieve all of the following goals except:
When deposing an expert witness, the opposing attorneys try to achieve all of the following goals except:
A. Understanding the expert's opinion
B....
Fraud investigators can assist in a case in which of the following ways?
Fraud investigators can assist in a case in which of the following ways?
A. By preparing questions to ask opposing witnesses during depositions
B....
During cross-examination, expert witnesses should:
During cross-examination, expert witnesses should:
A. Address areas outside of their areas of expertise.
B. Appreciate opposing council when...
During a trial or deposition, expert witnesses should:
During a trial or deposition, expert witnesses should:
A. Respond aggressively
B. Bring notes and work papers to cite
C. Answer questions convincingly,...
Which of the following rights is not provided by the Fifth Amendment?
Which of the following rights is not provided by the Fifth Amendment?
A. Individuals are protected from double jeopardy (being tried twice for...
What is/are the distinguishing factor(s) between the lower and higher state trial courts?
What is/are the distinguishing factor(s) between the lower and higher state trial courts?
A. Amount of monetary damage
B. Seriousness of the...
Most court cases are decided in state courts, except when:
Most court cases are decided in state courts, except when:
A. Federal laws are in question
B. The case involves several states
C. The amount...
To be convicted in a criminal case, the standard of evidence is:
To be convicted in a criminal case, the standard of evidence is:
A. Beyond a shadow of a doubt
B. Beyond a reasonable doubt
C. Preponderance...
Secure Web connections are based on:
Secure Web connections are based on:
A. dns.
B. ftp.
C. https.
D. ftps.
Answer: ...
What is the most important factor in control effectiveness?
What is the most important factor in control effectiveness?
A. Clear policies regarding controls
B. An understanding of e-business networks
C....
Which of the following types of controls is least often used to protect IT processing equipment?
Which of the following types of controls is least often used to protect IT processing equipment?
A. Physical controls
B. Authorizations controls
C....
Which of the following human features is generally not used in biometrics?
Which of the following human features is generally not used in biometrics?
A. Fingerprints
B. Voice tones
C. Retina patterns
D. Weight
Answer:...
Passwords and biometrics are both:
Passwords and biometrics are both:
A. Authorization controls
B. Independent check controls
C. Physical controls
D. Document controls
Answer:...
Using a subtly different Internet host name to mimic another business is known as:
Using a subtly different Internet host name to mimic another business is known as:
A. Spoofing
B. Sniffing
C. Web-visit hijacking
D. Falsified...
Which of the following fraud risks involves viewing information as it passes along network channels?
Which of the following fraud risks involves viewing information as it passes along network channels?
A. Sniffing
B. Spoofing
C. False Web sites
D....
Which of the following fraud risks involves changing IP addresses?
Which of the following fraud risks involves changing IP addresses?
A. Spoofing
B. Sniffing
C. False Web sites
D. Customer impersonation
Answer:...
Which of the following is not an internal control activity or procedure?
Which of the following is not an internal control activity or procedure?
A. Physical safeguards
B. Segregation of duties
C. Internal auditors
D....
Which of the following is not an element of a company's control environment?
Which of the following is not an element of a company's control environment?
A. Audit committee participation
B. Management's philosophy
C. Hiring...
E-business transactions make it easier to commit which of the following types of frauds?
E-business transactions make it easier to commit which of the following types of frauds?
A. Kickbacks
B. Customer impersonation
C. Setting...
Which of the following is not a fraud risk unique to e-business transactions?
Which of the following is not a fraud risk unique to e-business transactions?
A. Innovative technologies where security lags process development
B....
Those most susceptible to consumer fraud are often:
Those most susceptible to consumer fraud are often:
A. Uneducated or elderly
B. Wealthy and prominent
C. Troubled with credit card debt
D....
What is one way to determine if a Web site is secure or not?
What is one way to determine if a Web site is secure or not?
A. Look for the official logo of the company you want to deal with
B. Look for...
Which of the following institutions would not be very helpful to call in the event of identity theft?
Which of the following institutions would not be very helpful to call in the event of identity theft?
A. IRS
B. Social Security Administration
C....
Which of the following is not listed in the chapter as a common characteristic of Nigerian scam letters?
Which of the following is not listed in the chapter as a common characteristic of Nigerian scam letters?
A. The promise of money to lure victims
B....
Which federal statute requires that credit reports can only be obtained for legitimate business needs?
Which federal statute requires that credit reports can only be obtained for legitimate business needs?
A. Title 15 U.S. Code 1692
B. Final...
What does "https" stand for?
What does "https" stand for?
A. Hypertext transfer point (secure)
B. Hypertext transfer point (system)
C. Hypertext transfer protocol (system)
D....
What is the best defense against consumer fraud?
What is the best defense against consumer fraud?
A. Signing up with the national do not call registry
B. Purchasing credit card insurance
C....
Consumers should provide credit card numbers or bank account information over the telephone only when:
Consumers should provide credit card numbers or bank account information over the telephone only when:
A. They initiated the call and are purchasing...
The major reason that elderly people are so susceptible to telemarketing fraud is that they:
The major reason that elderly people are so susceptible to telemarketing fraud is that they:
A. Are often financially in need.
B. Have an excess...
Which of the following is a common characteristic of fraudulent money offer letters?
Which of the following is a common characteristic of fraudulent money offer letters?
A. The letter will ask for help, convincing the victim...
If you become a victim of identity theft, you should first:
If you become a victim of identity theft, you should first:
A. Wait to see where the perpetrator is spending your money; then, using this information,...
The Gramm-Leach-Bliley Act gives you the right to:
The Gramm-Leach-Bliley Act gives you the right to:
A. Periodically change your Social Security number to avoid identity theft.
B. Receive a...
In order to protect yourself from identity theft, you should:
In order to protect yourself from identity theft, you should:
A. Only give out your Social Security number when purchasing a product online...
Multilevel marketing companies:
Multilevel marketing companies:
A. Are illegal.
B. Increase their distribution process by recruiting additional company sales representatives.
C....
Phishing is the method of:
Phishing is the method of:
A. Using e-mail or other Internet applications to deceive people into disclosing valuable personal information.
B....
Subscribe to:
Posts (Atom)