Deck 11: Surveillance and Undercover Operations

ملء الشاشة (f)
exit full mode
سؤال
Corporations can largely obtain information about each other's business, operations and technology legally through:

A) internet searches
B) the Freedom of Information Act
C) googling
D) asking
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A professional trade association for private investigators is:

A) BCCFCA
B) PIAMBIA
C) NAIS
D) CFEA
سؤال
One of the largest contract security investigation companies is:

A) Peel Security Consultants
B) Pinkerton Consulting and Investigation
C) CMP Group
D) 2Cw Consulting Services
سؤال
In 2002, as a result of numerous corporate financial scandals in the past decade, congress passed this act to protect investors.

A) Hawes-Cooper Act
B) Little Lindbergh Act
C) Sarbanes-Oxley Act
D) Affirmative Action Act
سؤال
What type of security service is being utilized when the security personnel are not employees of the corporation but provide security for the organization?

A) proprietary
B) contract
C) independent investigators
D) hybrid
سؤال
What type of fraud involves setting up a fake or ghost operation to qualify for card reader installation and use stolen data to make purchases over the Internet?

A) point-of-sale fraud
B) card-not-present fraud
C) e-commerce fraud
D) ATM fraud
سؤال
The Graham-Leach-Bliley Act was passed in 2002 to prohibit any person from _________ financial information by making false statements to a financial institution.

A) keeping
B) embezzling
C) obtaining
D) copying
سؤال
Proprietary investigations by in-house security teams concentrate on background checks, loss prevention, insurance cases, and:

A) external crime investigations
B) escorting of executives
C) credit applications
D) off site investigations
سؤال
What term refers to the practice of obtaining business or technological information through surreptitious means?

A) Industrial Worms
B) Back Door OPS
C) Black OPS
D) Industrial espionage
سؤال
ATM-related credit-card fraud occurs most often when consumers___________ and keep it in their wallet.

A) write down hints to remember
B) write down PIN numbers
C) write down passwords
D) write down checking account numbers
سؤال
When a company goes through a meeting area looking for electronic devices to prevent eavesdropping, the company is:

A) combing
B) sweeping
C) debugging
D) dusting
سؤال
A type of business fraud is the theft of these rights, including counterfeiting, which can cost the company millions of dollars.

A) intellectual property rights
B) patent rights
C) credit card contracts
D) deeds and land titles
سؤال
Private investigatory services are provided in all of the following ways, except for:

A) proprietary
B) contract
C) independent private investigator
D) legislative
سؤال
Most large corporations and businesses use what type of security services?

A) proprietary
B) contract
C) independent investigators
D) hybrid
سؤال
This agency is an excellent source for insurance fraud investigations because it provides investigative services for insurers and law enforcement agencies to stop those committing insurance fraud.

A) Federal Bureau of Investigation (FBI)
B) National Insurance Crime Bureau (NICB)
C) NAFTA (North American Free Trade Agreement)
D) BBB (Better Business Bureau)
سؤال
A private investigator may be hired by a company to conduct what type of investigation, where a client has claimed to be injured by what the company sells?

A) strict liability
B) product liability
C) company liability
D) production liability
سؤال
The computer maker _______ was accused of using illegal methods to obtain phone records of board members.

A) Dell
B) HP
C) Gateway
D) Compaq
سؤال
What term is defined as theft by the intentional use of deceit or trickery?

A) fraud
B) scam
C) collusion
D) embezzlement
سؤال
The Insurance Information Institute allows consumers to obtain information on:

A) proprietary investigators
B) various types of insurance
C) customers
D) transport drivers
سؤال
Companies employ ______ in an attempt to prevent and thwart hostile espionage?

A) counterespionage
B) subterfuge
C) surveillance
D) sabotage
سؤال
Special investigative units (SIU's) have been established by the FBI to investigate fraud.
سؤال
ASIS offers professional certification and credentialing for private investigators through its Crime and Loss Prevention Program.
سؤال
In vehicle accident cases the investigators are trained to conduct accident reconstruction to aid their clients.
سؤال
What is the form of trickery in which an individual calls a bank or phone company and claim to be the customer whose records they are seeking?

A) snooping
B) pretexting
C) subterfuge
D) scamming
سؤال
__________________ investigations are a major portion of private sector investigations, which typically include medical issues or losses.
سؤال
A method of thwarting espionage is _________ any locations where important meetings and discussions are held.
سؤال
Security professionals report that _____________ thieves have become easier to catch through modern technology.
سؤال
Very often private sector investigators are hired by companies as consultants for their company's security procedures and plans.
سؤال
Investigators are hired to find people who are missing, have dropped out of sight or are trying to hide.
سؤال
______________ crimes are various crimes committed by corporations or their employees for the benefit of the corporation.
سؤال
Private sector investigators can assist financial organizations by providing investigations such as due diligence investigations that investigate companies with whom they are contemplating doing business.
سؤال
Most large corporations and businesses contract out their security services because it is cost effective.
سؤال
_________________ fraud is a major problem and can be committed by the health care provider, patient, or both, which makes investigating difficult.
سؤال
Private persons or corporations that provide detective or computerized databases to private sector investigators are called:

A) databanks
B) information brokers
C) squirrels
D) vaults
سؤال
One of the largest contracting security investigation companies is Pinkerton Consulting and Investigation.
سؤال
Most private investigators are required to be licensed by the federal government.
سؤال
The American Institute of Certified Public Accountants maintains:

A) a credit-card database
B) financial controls
C) auditing standards
D) undercover investigators
سؤال
One ruse used to obtain information is to send an individual a check for a small rebate from a dummy company.When the individual cashes the check the sender then has the bank account information.This is known as a:

A) trojan check
B) italian job
C) ghost check
D) transparent check
سؤال
The Gramm-Leach-Bliley Act was passed by congress in 2002 to ________________ any person from obtaining financial information by making false, fictitious, or fraudulent statements to a bank or other financial institution.

A) allow
B) prohibit
C) inform on
D) deter
سؤال
Most proprietary security investigations are conducted by contract security firms.
سؤال
Credit card fraud is a major problem for security investigators.There are basic types of credit card fraud.List and discuss these types of frauds.
سؤال
The Gramm-Leach-Bliley Act prohibits any person from obtaining _________ information they should not have access to.
سؤال
List and discuss the duties performed by proprietary and contract investigations.
سؤال
Many companies have developed specific measures to prevent employee theft.Discuss these measures.
سؤال
In 2006, the computer maker Hewlett-Packard (HP) was accused of using illegal methods to obtain phone records of board members, journalists, and others in order to investigate leaks of confidential information by corporate board members about the company's corporate strategy.Among the major issues discovered was the use of _______________ by investigators, to obtain calling records from a phone company.
سؤال
Industrial espionage has become a fact of life in the business world.Discuss several ways in which industrial espionage can be accomplished, and ways to combat it.
سؤال
The Federal Trade Commission was the agency initially given the responsibility to monitor and screen websites for offers to obtain _____________ information.
سؤال
__________ has a multibillion dollar counterfeiting industry consisting of high-margin but relatively low-tech products.
سؤال
List some additional duties that are performed by private security investigations beyond background or pre-employment.
سؤال
The _______________ has become a valuable tool for the investigator by giving them access to various records, which previously would have been difficult to obtain.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Surveillance and Undercover Operations
1
Corporations can largely obtain information about each other's business, operations and technology legally through:

A) internet searches
B) the Freedom of Information Act
C) googling
D) asking
B
2
A professional trade association for private investigators is:

A) BCCFCA
B) PIAMBIA
C) NAIS
D) CFEA
C
3
One of the largest contract security investigation companies is:

A) Peel Security Consultants
B) Pinkerton Consulting and Investigation
C) CMP Group
D) 2Cw Consulting Services
B
4
In 2002, as a result of numerous corporate financial scandals in the past decade, congress passed this act to protect investors.

A) Hawes-Cooper Act
B) Little Lindbergh Act
C) Sarbanes-Oxley Act
D) Affirmative Action Act
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
What type of security service is being utilized when the security personnel are not employees of the corporation but provide security for the organization?

A) proprietary
B) contract
C) independent investigators
D) hybrid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
What type of fraud involves setting up a fake or ghost operation to qualify for card reader installation and use stolen data to make purchases over the Internet?

A) point-of-sale fraud
B) card-not-present fraud
C) e-commerce fraud
D) ATM fraud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
The Graham-Leach-Bliley Act was passed in 2002 to prohibit any person from _________ financial information by making false statements to a financial institution.

A) keeping
B) embezzling
C) obtaining
D) copying
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Proprietary investigations by in-house security teams concentrate on background checks, loss prevention, insurance cases, and:

A) external crime investigations
B) escorting of executives
C) credit applications
D) off site investigations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
What term refers to the practice of obtaining business or technological information through surreptitious means?

A) Industrial Worms
B) Back Door OPS
C) Black OPS
D) Industrial espionage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
ATM-related credit-card fraud occurs most often when consumers___________ and keep it in their wallet.

A) write down hints to remember
B) write down PIN numbers
C) write down passwords
D) write down checking account numbers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
When a company goes through a meeting area looking for electronic devices to prevent eavesdropping, the company is:

A) combing
B) sweeping
C) debugging
D) dusting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
A type of business fraud is the theft of these rights, including counterfeiting, which can cost the company millions of dollars.

A) intellectual property rights
B) patent rights
C) credit card contracts
D) deeds and land titles
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Private investigatory services are provided in all of the following ways, except for:

A) proprietary
B) contract
C) independent private investigator
D) legislative
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Most large corporations and businesses use what type of security services?

A) proprietary
B) contract
C) independent investigators
D) hybrid
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
This agency is an excellent source for insurance fraud investigations because it provides investigative services for insurers and law enforcement agencies to stop those committing insurance fraud.

A) Federal Bureau of Investigation (FBI)
B) National Insurance Crime Bureau (NICB)
C) NAFTA (North American Free Trade Agreement)
D) BBB (Better Business Bureau)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
A private investigator may be hired by a company to conduct what type of investigation, where a client has claimed to be injured by what the company sells?

A) strict liability
B) product liability
C) company liability
D) production liability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
The computer maker _______ was accused of using illegal methods to obtain phone records of board members.

A) Dell
B) HP
C) Gateway
D) Compaq
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
What term is defined as theft by the intentional use of deceit or trickery?

A) fraud
B) scam
C) collusion
D) embezzlement
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
The Insurance Information Institute allows consumers to obtain information on:

A) proprietary investigators
B) various types of insurance
C) customers
D) transport drivers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
Companies employ ______ in an attempt to prevent and thwart hostile espionage?

A) counterespionage
B) subterfuge
C) surveillance
D) sabotage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Special investigative units (SIU's) have been established by the FBI to investigate fraud.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
ASIS offers professional certification and credentialing for private investigators through its Crime and Loss Prevention Program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
In vehicle accident cases the investigators are trained to conduct accident reconstruction to aid their clients.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is the form of trickery in which an individual calls a bank or phone company and claim to be the customer whose records they are seeking?

A) snooping
B) pretexting
C) subterfuge
D) scamming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
__________________ investigations are a major portion of private sector investigations, which typically include medical issues or losses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
A method of thwarting espionage is _________ any locations where important meetings and discussions are held.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Security professionals report that _____________ thieves have become easier to catch through modern technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
Very often private sector investigators are hired by companies as consultants for their company's security procedures and plans.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Investigators are hired to find people who are missing, have dropped out of sight or are trying to hide.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
______________ crimes are various crimes committed by corporations or their employees for the benefit of the corporation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Private sector investigators can assist financial organizations by providing investigations such as due diligence investigations that investigate companies with whom they are contemplating doing business.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Most large corporations and businesses contract out their security services because it is cost effective.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
_________________ fraud is a major problem and can be committed by the health care provider, patient, or both, which makes investigating difficult.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Private persons or corporations that provide detective or computerized databases to private sector investigators are called:

A) databanks
B) information brokers
C) squirrels
D) vaults
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
One of the largest contracting security investigation companies is Pinkerton Consulting and Investigation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Most private investigators are required to be licensed by the federal government.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
The American Institute of Certified Public Accountants maintains:

A) a credit-card database
B) financial controls
C) auditing standards
D) undercover investigators
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
One ruse used to obtain information is to send an individual a check for a small rebate from a dummy company.When the individual cashes the check the sender then has the bank account information.This is known as a:

A) trojan check
B) italian job
C) ghost check
D) transparent check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
The Gramm-Leach-Bliley Act was passed by congress in 2002 to ________________ any person from obtaining financial information by making false, fictitious, or fraudulent statements to a bank or other financial institution.

A) allow
B) prohibit
C) inform on
D) deter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Most proprietary security investigations are conducted by contract security firms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Credit card fraud is a major problem for security investigators.There are basic types of credit card fraud.List and discuss these types of frauds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
The Gramm-Leach-Bliley Act prohibits any person from obtaining _________ information they should not have access to.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
List and discuss the duties performed by proprietary and contract investigations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Many companies have developed specific measures to prevent employee theft.Discuss these measures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
In 2006, the computer maker Hewlett-Packard (HP) was accused of using illegal methods to obtain phone records of board members, journalists, and others in order to investigate leaks of confidential information by corporate board members about the company's corporate strategy.Among the major issues discovered was the use of _______________ by investigators, to obtain calling records from a phone company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Industrial espionage has become a fact of life in the business world.Discuss several ways in which industrial espionage can be accomplished, and ways to combat it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
The Federal Trade Commission was the agency initially given the responsibility to monitor and screen websites for offers to obtain _____________ information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
__________ has a multibillion dollar counterfeiting industry consisting of high-margin but relatively low-tech products.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
List some additional duties that are performed by private security investigations beyond background or pre-employment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
The _______________ has become a valuable tool for the investigator by giving them access to various records, which previously would have been difficult to obtain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.