Você está na página 1de 5

FULLBRIGHT COLLAGE

White-Collar Crime
1. Crime committed by one who does not think for himself as criminal and whose major
source of income is something other than crime.
a. White-collar
c. Avocational
e. Organizational
b. Economic
d. Corporate
2. White-collar crime committed through opportunity created in the course of an
employment that is legal.
a. Corporate
c. Environmental
e. Economic
b. Occupational
d. Organizational
3. Illegal activity that principally involves misrepresentation and illegal circumvention.
a. Corporate crime
c. Avocational crime
e.
Organizational crime
b. Economic crime
d. Environmental crime
4. Occupational crime committed by physicians, attorneys, psychologists and the like.
a. Individual
c. State authority
e.
Economic
b. Organizational
d. Professional
5. A sales techniques involving exaggerated claims about an item for sale.
a. Misleading products
c . White-collar crime
e. Puffing
b. Ponzi technique
d. Consumer swindling
6. White-collar crime is an illegal activity committed by persons of high status, usually
by ______ means.
a. force upon things
c. nonviolent
e. unlawful
b. violence
d. force upon person
7. White-collar crime include elements of deceit or _____ in their methods of operation
but do not involve the application of physical force.
a. nonviolence
c. unusual
e. unlawful
b. violence
d. concealment
8. It is the giving back of what has been lost or taken away.
a. pay back
c. pardon
b. restitution
d. payof

e. fine

9. Organized special unit to detect and apprehend the white-collar criminal in San Diego,
USA.
a. Consumer Protection Unit
c. Bureau of Postal Service
e. None of
these
b. Federal Bureau of Investigation d. All of these
10. Investigate unfair, monopolistic, or deceptive fraud practices.
a. FBI
c. Internal Revenue
these
b. Federal Trade Commission d. Dept. of Agriculture

e. None of

11. Investigate frauds involving U.S. coins, currency and securities of the United States.
a. Secret Service
c. Trade Commission
e. None of these
b. FBI
d. All of these

12. Conduct Investigations to prevent both the farm and consumer.


a. Dept. of Finance
c . Bureau of Commerce
these
b. Dept. of Agriculture
d. All of these

e. None of

13. A person who uses foods, clothing or any article which a producer make.
a. Consumer
c. Client
e. Dealer
b. Buyer
d. Subscriber
14. An act of cheating or defrauding.
a. Forgery
c. Alteration
e. Criminal
b. Negotiation
d. Swindle
15. A person who cheats or defrauds.
a. Forger
c. sucker
e. Violator
b. swindler
d. criminal
16. In the early years most goods transaction were accomplished through barter of
direct _____ exchange.
a. gold
c. coins
e. metal
b. silver
d. cash
17. It refers to a given cash value requiring an automatic check on the validity of the
card number.
a. sky limit
c. floor limit
e. Transaction
b. bargaining
d. barter
18. It refers to a given cash value requiring one of the three general types of check
investigations.
a. theft
c. robbery
e. burglary
b. larcerry
d. forgery
19. An act of signing name in a check in order to deceive.
a. Larcerry
c. Burglary
b . Forgery
d. Swindling

e. Theft

20. An individual or corporate debtor unable to pay his creditors in full.


a. Broker
c. Broke
e. Consumer
b. Bankrupt
d. Client
21. A scam in which an individual falsely attempts to claim bankruptcy by taking
advantage of loopholes in the laws.
a. Old-company scam
c. Bankruptcy
e.
Consumer fraud
b. Similar-name scam
d. Insider-related fraud
22. Bankruptcy fraud typically used when the company is losing money or has lost its
hold on a market.
a. Now-company scam
c. Familiar-name scam
e. Business scam
b. Old-company scam
d. Similar-company scam
23. The objective of bankruptcy fraud is to create the erroneous impression that this
now company is actually the older one.
a. Similar-name scam
c. Old-company scam
e. Newcompany scam
b. Business scam
d. Familiar-name scam
24. An act of trickery or deceit, especially involving misrepresentation.
a. Embezzlement
c. Bankruptcy
e. Fraud

b. Bait & switch scam

d. Ponzi scheme

25. Act of causing a consumer to surrender money through deceit or a


misrepresentation of a material fact.
a. Consumer fraud
c. Bankruptcy fraud
Embezzlement
b. Corporate fraud
d. Securities-related crimes

26. Consumer frauds often appear as _____ games.


a. chance
c. extra-ordinary
b. confidence
d. lucky

e.

e. Ordinary

27. A deceptive means of obtaining money or property from a victim who is lead to trust
the perpetrator.
a. Machination
c. Fraud
e. Confidence game
b. Trickery
d. Deception
28. These schemes are known as bait-and-switch advertising.
a. Legal advertising
c. Creative advertising
advertising
b. Illegal advertising
d. Deceptive advertising

e. Erroneous

29. Objective of this consumer fraud is to persuade a consumer to invest money in


business concern through misrepresentation of its actual worth.
a. Deceptive advertising
c. Home-improvement fraud
e. Land
fraud
b. Business opportunity fraud
d. Bait & switch advertising
30. An operation by stock manipulators when he seduces the public into buying stocks
in obscure financial corporations.
a. Churning
c. Stock
Manipulation
e. Stock market
b. Inside trading d. Boiler room
31. Frequently trading, by a broker, of a clients share of stock to generate large
commissions.
a. Boiler room
c. Churning
e.
Machination
b. Inside trading
d. Stock manipulation
32. Use of material, non-public financial information to obtain an unfair advantage in
trading securities.
a. Churning
c. Boiler room
e.
Machination
b. Insider trading
d. Stock manipulation
33. Practice of broker to load their clients to believe the price of stock will rise, thus
creating an artificial demand for it.
a. Stock manipulation c. Churning
e. Boiler room
b. Insider trading
d. Machination
34. The act of giving gifts to cause bidders stay away from an auction causing reduction
of value of the thing auctioned.
a. Combinations
c. Boiler room
e. Churning
b. Machinations
d. Monopolies

35. The over-the-counter market, in which some stocks are traded at very low prices.
a. Stock fraud
c. Stock market
e. Monopolies
b. Machination
d. Stock manipulation
36. One who buys and sells stocks or securities for others.
a. Security officer
c. Clients
b. Consumer
d. Stock brokers

e. Salesman

37. Capital raised by a corporation through the sale of shares that entitle the holder to
dividends.
a. Money
c. Interest
e. Stock
b. Market
d. Property
38. It is the specialty practice area of accounting that describes engagements which
result from real or anticipated criminal litigation.
a. Forensic Investigation
c. Forensic Audit
e. Forensic
Bookkeeping
b. Forensic Litigation
d Forensic Accounting
39. A report prepared with the objective of presenting evidence in a professional and
concise manner.
a. Criminal Investigation Report
c. Forensic Bookkeeping Report
e. Police
Special Report
b. Forensic Accountants Report
d. Police Report
40. A control which, though not exclusive, enables a person or corporation to fix price.
a. Monopoly
c. Machination
e. Theft
b. Laundering
d. Combinations
41. It is an example of white-collar crime:
a. Heineous crime
c. Organized crime
crime
b. Occupational crime
d. Syndicated crime

e. Index

42. The unlawful acquisition of computer data or programs for purposes of financial
gain.
a. Computer hacking
c. Computer fraud
e. All of
these
b. Computer sabotage
d. Computer espionage
43. Activities by which unauthorized computer access yields information for exploitation
from data bases belonging to government or private parties.
a. computer fraud
c. computer sabotage
e. Computer
espionage
b. computer hacking
d. computer bugging
44. The scrambling of data or software through unlawful access to data banks of the
computer.
a. computer bugging
c. computer hacking
e.
Computer fraud
b. computer sabotage
d. computer espionage
45. A device capable of accepting data in the form of facts and figures and applying
prescribed processes to produce meaningful information.
a. forge check
c. computer
e.
typewriter
b. check
d. regiscope

46. Act of gaining unlawful access to data banks of a computer for malicious purposes.
a. computer sabotage
c. computer fraud
e. computer
espionage
b. computer hacking
d. computer bugging
47. One variety of insurance fraud which is most often accomplished by the filing of
false claims for life, fire, marine or casualty insurance.
a. Policy holder fraud
c. Management defraud the public
e.
None of these
b. Insurer defraud the public
d. Third parties defraud insurers
48. Computer crime wherein a small amount of pennies is subtracted from customers
accounts and added to a dummy in companys computerized record, but soon
transferred to the intended private account.
a. The logic bomb
c. Data leakage
e. The
salami slice
b. Supper zapping
d. The Trojan horse
49. Type of computer crime wherein a program is secretly attached to intended
computer system with the intent for theft of money or defense secret.
a. Impersonation
c. The logic bomb
e. Data Leakage
b. Super-zapping
d. The salami slice
50. A computer crime whereby an unauthorized person uses the identity of an
authorized computer user to access the computer system.
a. Super-zapping
c. Impersonation
e. Data leakage
b. The logic bomb
d. The salami slice

Você também pode gostar