Deck 11: Security, Fraud, and Ethics

ملء الشاشة (f)
exit full mode
سؤال
Concealing unlawfully gained funds by converting them into seemingly legitimate income is called

A)forgery.
B)bouncing a check.
C) money laundering.
D) kiting a check.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Most banks do not allow employees to accept gifts or money to influence their performance of duties.
سؤال
Which of these is NOT a suggested way to prevent check fraud?

A)Leave no extra spaces on a check.
B)Sign a check in the presence of a teller.
C) Have your Social Security number printed on your checks.
D) Reconcile your checking account regularly.
سؤال
The Bureau of Justice Statistics (BJS) estimated that more than 7 million people were victims of identity theft in 2014.
سؤال
A code of ethics is a statement adopted by a company to guide employees to act appropriately.
سؤال
Banks lose more money from fraud than from robbery.
سؤال
Which of these is the least common type of bank robbery?

A)morning glory robbery
B)note-passing robbery
C) takeover robbery
D) early-bird robbery
سؤال
Except routine processing, this occupies more resources of the banking industry than any other activity.

A)robbery prevention
B)fraud prevention
C) advertising
D) employee benefits
سؤال
War driving refers to illegally using financial information of active duty soldiers for personal gain.
سؤال
Most banks are required by law to install surveillance cameras and alarms.
سؤال
Spam is a slang term for something that is fraudulent or a swindle.
سؤال
Bank robbery was a much more serious problem in the 1930s and 1940s. Today, it rarely occurs.
سؤال
Financial institutions lose billions of dollars every year because of money laundering.
سؤال
A straw buyer works "undercover" for a bank to help banks identify cases of illegal house flipping.
سؤال
Employee training is the core of preventing robbery.
سؤال
Ethics should be the ultimate factor in making decisions in the financial world.
سؤال
The physical security of a bank includes all of the following EXCEPT

A)building design.
B)locking devices.
C) transportation security.
D) employee friendliness.
سؤال
Junk e-mail is commonly referred to as

A)sting.
B)spam.
C) phish.
D) flame.
سؤال
To discourage counterfeiting, the new $20 bill design includes color-shifting ink that changes from ____________________ when the note is tilted.

A)copper to blue
B)blue to green
C) green to gold
D) copper to green
سؤال
Marianne is a teller at River City Bank. A bank robbery is underway. Which of the following should Marianne NOT do?

A)give the robber what he wants
B)try to grab the gun from the robber's hand
C) call 911 as soon as possible
D) obey the robber's instructions
سؤال
A(n) ____________________ dilemma involves a situation that makes a person question what is the right or wrong thing to do.
سؤال
Check ____________________ requires opening accounts at two or more banks and using the "float time" of available funds to create fraudulent balances.
سؤال
What is identify theft?
سؤال
A computer program that monitors and limits incoming and outgoing online transmissions is called a(n) ____________________.
سؤال
A(n) ____________________ of interest occurs when two interests are at cross-purposes.
سؤال
Purposefully writing checks on closed accounts is called ____________________, or closed account fraud.
سؤال
Which act of Congress places restrictions on loans by corporations to their executives?

A)Sarbanes-Oxley Act of 2002
B)Expedited Funds Availability Act of 1987
C) Check 21 Act of 2003
D) Homeland Security Act of 2002
سؤال
An online criminal deposits $10,000 into a victim's account, telling the victim to send $9,500 to a third party. The victim supposedly gets to keep $500 as a "transaction fee." The criminal quickly cancels the initial deposit, though. If the criminal gets 14 people to agree to this scam, how much money has been stolen?
سؤال
How should surveillance cameras be positioned in a bank for maximum effectiveness?
سؤال
What is the difference between check forgery and check counterfeiting?
سؤال
____________________ is the act of sending a user an e-mail falsely claiming to be a legitimate enterprise in an attempt to solicit private information.
سؤال
Shady Sam robbed three banks last week: In one heist, he got away with $2,500; in the second, he netted $5,600; the third robbery was worth $4,350. After he was caught, police were able to recover 90 percent of the loot. Sam had spent the rest. What was the dollar amount of the stolen money that was NOT recovered?
سؤال
____________________ is a deception deliberately practiced to secure unfair or unlawful gain.
سؤال
A bill ____________________ is a device that sets off a security system when a bill or switch is pulled.
سؤال
The Second National Bank has just been robbed. What should bank employees do with the demand note left behind by the robber? Why?
سؤال
John and William are opening a restaurant together. William also works as a business loan officer at a local bank. John has applied to William's bank for a business loan for the restaurant, and William is responsible for approving the loan. This is a clear example of a

A)confidentiality violation.
B)money laundering scam.
C) check kiting scheme.
D) conflict of interest.
سؤال
An electronic warning placed on your accounts to monitor for suspicious financial activity is called a(n) ____________________.
سؤال
The new $20 bill design includes a(n) ____________________, a faint image similar to the large portrait. It is part of the paper itself and is visible from both sides when the bill is held up to the light.
سؤال
Jerry's Garage accepted $700 in counterfeit bills for a repair job. The company's insurance policy covers losses from counterfeit money up to $1,000 with a $250 deductible. What is the out-of-pocket loss experienced by Jerry's Garage?
سؤال
A(n) ____________________ barrier is a bulletproof plastic shield that can be positioned in front of each teller's station. It acts as a safety device.
سؤال
What can banks do to protect computer records from computer hackers and other cyberthieves?
سؤال
Briefly describe some signs of counterfeit checks.
سؤال
Briefly describe some of the safety devices mentioned in the text that are used to physically secure modern banks.
سؤال
Describe two distinct ways websites can be used for identity theft.
سؤال
Define ?ethics.
سؤال
Discuss what is generally covered in the confidentiality section of a bank's code of ethics.
سؤال
What are the powers of the Public Company Accounting Oversight Board, established by the Sarbanes-Oxley Act of 2002?
سؤال
Discuss some common sense precautions you can take to prevent becoming a victim of identity theft.​
سؤال
What is a straw buyer?
سؤال
What is the difference between a morning glory bank robbery and a takeover bank robbery?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Security, Fraud, and Ethics
1
Concealing unlawfully gained funds by converting them into seemingly legitimate income is called

A)forgery.
B)bouncing a check.
C) money laundering.
D) kiting a check.
C
2
Most banks do not allow employees to accept gifts or money to influence their performance of duties.
True
3
Which of these is NOT a suggested way to prevent check fraud?

A)Leave no extra spaces on a check.
B)Sign a check in the presence of a teller.
C) Have your Social Security number printed on your checks.
D) Reconcile your checking account regularly.
C
4
The Bureau of Justice Statistics (BJS) estimated that more than 7 million people were victims of identity theft in 2014.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
A code of ethics is a statement adopted by a company to guide employees to act appropriately.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Banks lose more money from fraud than from robbery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of these is the least common type of bank robbery?

A)morning glory robbery
B)note-passing robbery
C) takeover robbery
D) early-bird robbery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Except routine processing, this occupies more resources of the banking industry than any other activity.

A)robbery prevention
B)fraud prevention
C) advertising
D) employee benefits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
War driving refers to illegally using financial information of active duty soldiers for personal gain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Most banks are required by law to install surveillance cameras and alarms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Spam is a slang term for something that is fraudulent or a swindle.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Bank robbery was a much more serious problem in the 1930s and 1940s. Today, it rarely occurs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Financial institutions lose billions of dollars every year because of money laundering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
A straw buyer works "undercover" for a bank to help banks identify cases of illegal house flipping.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Employee training is the core of preventing robbery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Ethics should be the ultimate factor in making decisions in the financial world.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
The physical security of a bank includes all of the following EXCEPT

A)building design.
B)locking devices.
C) transportation security.
D) employee friendliness.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Junk e-mail is commonly referred to as

A)sting.
B)spam.
C) phish.
D) flame.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
To discourage counterfeiting, the new $20 bill design includes color-shifting ink that changes from ____________________ when the note is tilted.

A)copper to blue
B)blue to green
C) green to gold
D) copper to green
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Marianne is a teller at River City Bank. A bank robbery is underway. Which of the following should Marianne NOT do?

A)give the robber what he wants
B)try to grab the gun from the robber's hand
C) call 911 as soon as possible
D) obey the robber's instructions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
A(n) ____________________ dilemma involves a situation that makes a person question what is the right or wrong thing to do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
Check ____________________ requires opening accounts at two or more banks and using the "float time" of available funds to create fraudulent balances.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
What is identify theft?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
A computer program that monitors and limits incoming and outgoing online transmissions is called a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ____________________ of interest occurs when two interests are at cross-purposes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Purposefully writing checks on closed accounts is called ____________________, or closed account fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Which act of Congress places restrictions on loans by corporations to their executives?

A)Sarbanes-Oxley Act of 2002
B)Expedited Funds Availability Act of 1987
C) Check 21 Act of 2003
D) Homeland Security Act of 2002
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
An online criminal deposits $10,000 into a victim's account, telling the victim to send $9,500 to a third party. The victim supposedly gets to keep $500 as a "transaction fee." The criminal quickly cancels the initial deposit, though. If the criminal gets 14 people to agree to this scam, how much money has been stolen?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
How should surveillance cameras be positioned in a bank for maximum effectiveness?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
What is the difference between check forgery and check counterfeiting?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
____________________ is the act of sending a user an e-mail falsely claiming to be a legitimate enterprise in an attempt to solicit private information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Shady Sam robbed three banks last week: In one heist, he got away with $2,500; in the second, he netted $5,600; the third robbery was worth $4,350. After he was caught, police were able to recover 90 percent of the loot. Sam had spent the rest. What was the dollar amount of the stolen money that was NOT recovered?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
____________________ is a deception deliberately practiced to secure unfair or unlawful gain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
A bill ____________________ is a device that sets off a security system when a bill or switch is pulled.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
The Second National Bank has just been robbed. What should bank employees do with the demand note left behind by the robber? Why?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
John and William are opening a restaurant together. William also works as a business loan officer at a local bank. John has applied to William's bank for a business loan for the restaurant, and William is responsible for approving the loan. This is a clear example of a

A)confidentiality violation.
B)money laundering scam.
C) check kiting scheme.
D) conflict of interest.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
An electronic warning placed on your accounts to monitor for suspicious financial activity is called a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
The new $20 bill design includes a(n) ____________________, a faint image similar to the large portrait. It is part of the paper itself and is visible from both sides when the bill is held up to the light.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Jerry's Garage accepted $700 in counterfeit bills for a repair job. The company's insurance policy covers losses from counterfeit money up to $1,000 with a $250 deductible. What is the out-of-pocket loss experienced by Jerry's Garage?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
A(n) ____________________ barrier is a bulletproof plastic shield that can be positioned in front of each teller's station. It acts as a safety device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What can banks do to protect computer records from computer hackers and other cyberthieves?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Briefly describe some signs of counterfeit checks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Briefly describe some of the safety devices mentioned in the text that are used to physically secure modern banks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Describe two distinct ways websites can be used for identity theft.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Define ?ethics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Discuss what is generally covered in the confidentiality section of a bank's code of ethics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
What are the powers of the Public Company Accounting Oversight Board, established by the Sarbanes-Oxley Act of 2002?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Discuss some common sense precautions you can take to prevent becoming a victim of identity theft.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
What is a straw buyer?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
What is the difference between a morning glory bank robbery and a takeover bank robbery?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.