Escolar Documentos
Profissional Documentos
Cultura Documentos
White-Collar Crime
1. Crime committed by one who does not think for himself as criminal and whose major
source of income is something other than crime.
a. White-collar
c. Avocational
e. Organizational
b. Economic
d. Corporate
2. White-collar crime committed through opportunity created in the course of an
employment that is legal.
a. Corporate
c. Environmental
e. Economic
b. Occupational
d. Organizational
3. Illegal activity that principally involves misrepresentation and illegal circumvention.
a. Corporate crime
c. Avocational crime
e.
Organizational crime
b. Economic crime
d. Environmental crime
4. Occupational crime committed by physicians, attorneys, psychologists and the like.
a. Individual
c. State authority
e.
Economic
b. Organizational
d. Professional
5. A sales techniques involving exaggerated claims about an item for sale.
a. Misleading products
c . White-collar crime
e. Puffing
b. Ponzi technique
d. Consumer swindling
6. White-collar crime is an illegal activity committed by persons of high status, usually
by ______ means.
a. force upon things
c. nonviolent
e. unlawful
b. violence
d. force upon person
7. White-collar crime include elements of deceit or _____ in their methods of operation
but do not involve the application of physical force.
a. nonviolence
c. unusual
e. unlawful
b. violence
d. concealment
8. It is the giving back of what has been lost or taken away.
a. pay back
c. pardon
b. restitution
d. payof
e. fine
9. Organized special unit to detect and apprehend the white-collar criminal in San Diego,
USA.
a. Consumer Protection Unit
c. Bureau of Postal Service
e. None of
these
b. Federal Bureau of Investigation d. All of these
10. Investigate unfair, monopolistic, or deceptive fraud practices.
a. FBI
c. Internal Revenue
these
b. Federal Trade Commission d. Dept. of Agriculture
e. None of
11. Investigate frauds involving U.S. coins, currency and securities of the United States.
a. Secret Service
c. Trade Commission
e. None of these
b. FBI
d. All of these
e. None of
13. A person who uses foods, clothing or any article which a producer make.
a. Consumer
c. Client
e. Dealer
b. Buyer
d. Subscriber
14. An act of cheating or defrauding.
a. Forgery
c. Alteration
e. Criminal
b. Negotiation
d. Swindle
15. A person who cheats or defrauds.
a. Forger
c. sucker
e. Violator
b. swindler
d. criminal
16. In the early years most goods transaction were accomplished through barter of
direct _____ exchange.
a. gold
c. coins
e. metal
b. silver
d. cash
17. It refers to a given cash value requiring an automatic check on the validity of the
card number.
a. sky limit
c. floor limit
e. Transaction
b. bargaining
d. barter
18. It refers to a given cash value requiring one of the three general types of check
investigations.
a. theft
c. robbery
e. burglary
b. larcerry
d. forgery
19. An act of signing name in a check in order to deceive.
a. Larcerry
c. Burglary
b . Forgery
d. Swindling
e. Theft
d. Ponzi scheme
e.
e. Ordinary
27. A deceptive means of obtaining money or property from a victim who is lead to trust
the perpetrator.
a. Machination
c. Fraud
e. Confidence game
b. Trickery
d. Deception
28. These schemes are known as bait-and-switch advertising.
a. Legal advertising
c. Creative advertising
advertising
b. Illegal advertising
d. Deceptive advertising
e. Erroneous
35. The over-the-counter market, in which some stocks are traded at very low prices.
a. Stock fraud
c. Stock market
e. Monopolies
b. Machination
d. Stock manipulation
36. One who buys and sells stocks or securities for others.
a. Security officer
c. Clients
b. Consumer
d. Stock brokers
e. Salesman
37. Capital raised by a corporation through the sale of shares that entitle the holder to
dividends.
a. Money
c. Interest
e. Stock
b. Market
d. Property
38. It is the specialty practice area of accounting that describes engagements which
result from real or anticipated criminal litigation.
a. Forensic Investigation
c. Forensic Audit
e. Forensic
Bookkeeping
b. Forensic Litigation
d Forensic Accounting
39. A report prepared with the objective of presenting evidence in a professional and
concise manner.
a. Criminal Investigation Report
c. Forensic Bookkeeping Report
e. Police
Special Report
b. Forensic Accountants Report
d. Police Report
40. A control which, though not exclusive, enables a person or corporation to fix price.
a. Monopoly
c. Machination
e. Theft
b. Laundering
d. Combinations
41. It is an example of white-collar crime:
a. Heineous crime
c. Organized crime
crime
b. Occupational crime
d. Syndicated crime
e. Index
42. The unlawful acquisition of computer data or programs for purposes of financial
gain.
a. Computer hacking
c. Computer fraud
e. All of
these
b. Computer sabotage
d. Computer espionage
43. Activities by which unauthorized computer access yields information for exploitation
from data bases belonging to government or private parties.
a. computer fraud
c. computer sabotage
e. Computer
espionage
b. computer hacking
d. computer bugging
44. The scrambling of data or software through unlawful access to data banks of the
computer.
a. computer bugging
c. computer hacking
e.
Computer fraud
b. computer sabotage
d. computer espionage
45. A device capable of accepting data in the form of facts and figures and applying
prescribed processes to produce meaningful information.
a. forge check
c. computer
e.
typewriter
b. check
d. regiscope
46. Act of gaining unlawful access to data banks of a computer for malicious purposes.
a. computer sabotage
c. computer fraud
e. computer
espionage
b. computer hacking
d. computer bugging
47. One variety of insurance fraud which is most often accomplished by the filing of
false claims for life, fire, marine or casualty insurance.
a. Policy holder fraud
c. Management defraud the public
e.
None of these
b. Insurer defraud the public
d. Third parties defraud insurers
48. Computer crime wherein a small amount of pennies is subtracted from customers
accounts and added to a dummy in companys computerized record, but soon
transferred to the intended private account.
a. The logic bomb
c. Data leakage
e. The
salami slice
b. Supper zapping
d. The Trojan horse
49. Type of computer crime wherein a program is secretly attached to intended
computer system with the intent for theft of money or defense secret.
a. Impersonation
c. The logic bomb
e. Data Leakage
b. Super-zapping
d. The salami slice
50. A computer crime whereby an unauthorized person uses the identity of an
authorized computer user to access the computer system.
a. Super-zapping
c. Impersonation
e. Data leakage
b. The logic bomb
d. The salami slice