Student Center
|
Instructor Center
|
Information Center
|
Home
Glossary
Career Opportunities
PowerPoint Presentations
Spotlight on Terrorism
Choose a Chapter
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 5
Chapter 6
Chapter 7
Chapter 8
Chapter 9
Chapter 10
Chapter 11
Chapter 12
Chapter 13
Chapter 14
Chapter 15
Chapter 16
Chapter 17
Chapter 18
Chapter 19
Chapter 20
Chapter 21
Chapter Overview
Chapter Outline
Chapter Objectives
Multiple Choice Quiz
Interactive Exercise
Internet Exercises
Flashcards
Feedback
Help Center
Criminal Investigation, 8/e
Charles R. Swanson, University of Georgia
Neil C. Chamelin, Assistant State Attorney, Second Judicial Circuit
Leonard Territo, University of South Florida- Tampa
Larceny and Fraud
Multiple Choice Quiz
1
Which of the following questions should an investigator consider in a theft case?
A)
At what time did the theft occur?
B)
Was the victim injured by the perpetrator?
C)
Was the item insured?
D)
Both A and C.
2
Which of the following is an example of credit card fraud using a shave-and-paste scheme?
A)
An illegally obtained credit card is used to pay for a purchase.
B)
An illegally created credit card is used to pay for a purchase.
C)
An illegally altered credit card is used to pay for a purchase.
D)
A credit card is obtained and used based on false application information.
3
Which of the following is an example of the crime of counterfeit credit card fraud?
A)
An illegally obtained credit card is used to pay for a purchase.
B)
An illegally created credit card is used to pay for a purchase.
C)
An illegally altered credit card is used to pay for a purchase.
D)
A credit card is obtained and used based on false application information.
4
Which of the following illustrates the crime of stolen credit card fraud?
A)
An illegally obtained credit card is used to pay for a purchase.
B)
An illegally created credit card is used to pay for a purchase.
C)
An illegally altered credit card is used to pay for a purchase.
D)
A credit card is obtained and used based on false application information.
5
Which of the following steps should a potential victim take to prevent credit card fraud?
A)
Do not write your credit card number on the back of a check.
B)
Place your phone number and address on credit slips.
C)
Place your account number on checks.
D)
Give your credit card number to telemarketers.
6
Which of the following illustrates a large-scale counterfeiting check fraud scheme?
A)
Groups open bank accounts using confidential information obtained from bona fide bank customers.
B)
A group creates duplicate payroll checks.
C)
A group penetrates a bank to collect master original bank checks.
D)
Groups secure loans using confidential information obtained from bona fide bank customers.
7
Which of the following illustrates an identity assumption scheme?
A)
Groups open bank accounts utilizing confidential information obtained from bona fide bank customers.
B)
A group creates duplicate payroll checks.
C)
Groups secure loans utilizing confidential information obtained from bona fide bank customers.
D)
Both A and C.
8
What is “check washing”?
A)
Intentional chemical alteration of checks
B)
Money laundering
C)
Pilfering
D)
Cloning
9
What is cloning?
A)
Intentional chemical alteration of checks
B)
The use of illegally obtained money in legitimate-appearing enterprises
C)
The taking of merchandise for private use
D)
The unauthorized and illegal programming of cellular phones with the access codes of legitimate cellular customers
10
Which of the following statements is most accurate concerning the typical shoplifter?
A)
Most are professionals.
B)
Most are amateurs.
C)
Fewer people are shoplifting.
D)
Most professionals are apprehended more frequently than amateurs.
11
What best describes the type of shoplifter that takes merchandise for resale?
A)
Amateur.
B)
Professional.
C)
Pilferer.
D)
Commercial
12
What best describes the type of shoplifter that takes merchandise for private use?
A)
Amateur
B)
Professional
C)
Pilferer
D)
Commercial
13
What is
not
a characteristic of professional shoplifting groups?
A)
They utilize delivery services such as the U.S. Mail and FedEx.
B)
They steal for private use.
C)
They use “booster bags.”
D)
Theses groups rent local motels as a base of operation.
14
Which of the following is not an example of an antishoplifting technique?
A)
“Scarecrooks”
B)
“Anne Droid”
C)
Trojan Horse
D)
Ponzi scheme
15
The _____________________ steals by guile in a person-to-person relationship.
A)
Confidence artist
B)
Pigeon drop
C)
Trojan Horse
D)
Ponzi scheme
16
Which of the following best illustrates the inheritance scam?
A)
A suspect posing as a delivery man writes a phony mailing label, goes next door and asks the neighbor to accept a delivery for the absent neighbor and pay cash for COD charges.
B)
A crook uses marked cards.
C)
A “bank examiner” convinces an unsuspecting victim to withdraw funds to help in an investigation. The victim is convinced to turn over the funds to a con man.
D)
An unsuspecting victim is told via phone that she has inherited money. But first the victim provides the caller all the information necessary for the crook to claim the inheritance for himself.
17
Which of the following best illustrates the bank examiner scheme?
A)
A suspect posing as a delivery man writes a phony mailing label, goes next door and asks the neighbor to accept a delivery for the absent neighbor and pay cash for COD charges.
B)
A crook uses marked cards.
C)
A “bank examiner” convinces an unsuspecting victim to withdraw funds to help in an investigation. The victim is convinced to turn over the funds to a con man.
D)
An unsuspecting victim is told via phone that she has inherited money. But first the victim provides the caller all the information necessary for the crook to claim the inheritance for himself.
18
Which of the following is
not
an example of mail fraud?
A)
A suspect posing as a delivery man writes a phony mailing label, goes next door and asks the neighbor to accept a delivery for the absent neighbor and pay cash for COD charges.
B)
A letter received in the mail requests money and promises a substantial return to participants.
C)
Free prize schemes
D)
Free vacation scam
19
The use of _____________________ may be particularly valuable in cases of white- collar crime.
A)
Fingerprint examiners
B)
Forensic photography
C)
Forensic accountants
D)
None of the above
20
Which of the following techniques is effective in a criminal investigation of money laundering?
A)
Sampling
B)
Ratio analysis
C)
Flowcharting
D)
All of the above
21
Which of the following best defines a “dumpster diver”?
A)
An individual who retrieves discarded information seeking identity information.
B)
Mailbox thief
C)
Internal access thief
D)
An individual that circulates illegally obtained money through a legitimate business.
22
Which of the following recommendations may prevent identity fraud?
A)
Patrol residential areas on trash collection days.
B)
Enforce trespass laws at dump sites.
C)
Advise citizens to shred documents.
D)
All of the above
23
Which of the following is the illegal, unscientific removal of archaeological resources?
A)
Pilfering
B)
Archaeological looting
C)
Boosters
D)
Archaeologist
24
Which of the following individuals is most likely to provide initial information on an archaeological looting crime on public land?
A)
Residents of a nearby farm
B)
Public employees routinely patrolling the site
C)
Boosters
D)
Archaeologists
25
Which type of evidence may be of particular significance in an archaeological looting crime scene investigation?
A)
Whether a market is nearby
B)
Fingerprint
C)
Soil
D)
Firearms
2002 McGraw-Hill Higher Education
Any use is subject to the
Terms of Use
and
Privacy Policy
.
McGraw-Hill Higher Education
is one of the many fine businesses of
The McGraw-Hill Companies
.