Deck 5: Identity Theft and Identity Fraud
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/62
Play
Full screen (f)
Deck 5: Identity Theft and Identity Fraud
1
If someone found a lost driver's license and then used it to open multiple bank accounts and commit tax-related fraud, which type of identity theft/fraud was committed?
A) reverse criminal record identity theft
B) criminal record identity theft/fraud
C) virtual identity theft/fraud
D) credit identity theft/fraud
A) reverse criminal record identity theft
B) criminal record identity theft/fraud
C) virtual identity theft/fraud
D) credit identity theft/fraud
D
2
Which of the following is the most general problem faced by American law enforcement and government officials who want to eradicate identity fraud/theft?
A) the rise of terrorists and organized crime groups
B) the increasing use of compound surnames
C) the trend toward removing social security numbers from drivers licenses
D) the boundless nature of the Internet
A) the rise of terrorists and organized crime groups
B) the increasing use of compound surnames
C) the trend toward removing social security numbers from drivers licenses
D) the boundless nature of the Internet
D
3
Which of the following is NOT a category of phishing attacks?
A) redirectors
B) pharming
C) botnets
D) spoofing
A) redirectors
B) pharming
C) botnets
D) spoofing
C
4
Which of the following is true regarding bag operations as a physical method of identity theft?
A) They include sifting through commercial or residential trash or waste for information deemed valuable.
B) They are typically conducted by the host government's security or intelligence services.
C) They are executed by depositing personal documents in unlocked containers on the side of the road until they are retrieved.
D) They involve the creation of shell companies that engage in the collection of personal financial information.
A) They include sifting through commercial or residential trash or waste for information deemed valuable.
B) They are typically conducted by the host government's security or intelligence services.
C) They are executed by depositing personal documents in unlocked containers on the side of the road until they are retrieved.
D) They involve the creation of shell companies that engage in the collection of personal financial information.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is true regarding the theft of computers as a physical method of identity theft?
A) Physical theft of computers is the least common technique employed by identity thieves.
B) Individuals without technical expertise cannot successfully execute this physical method of identity theft.
C) Areas particularly vulnerable to theft of computers include private residences and recreation centers.
D) Theft of computers does not alleviate the need to analyze and organize voluminous paper documents.
A) Physical theft of computers is the least common technique employed by identity thieves.
B) Individuals without technical expertise cannot successfully execute this physical method of identity theft.
C) Areas particularly vulnerable to theft of computers include private residences and recreation centers.
D) Theft of computers does not alleviate the need to analyze and organize voluminous paper documents.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following types of identity theft/fraud is defined as the use of stolen personal and financial information to facilitate the creation of fraudulent accounts?
A) virtual identity theft/fraud
B) criminal record identity theft/fraud
C) theft for employment and/or border entry
D) credit identity theft/fraud
A) virtual identity theft/fraud
B) criminal record identity theft/fraud
C) theft for employment and/or border entry
D) credit identity theft/fraud
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is a disadvantage of using SpyBuddy to steal passwords?
A) It may be detected by software.
B) It is hard to install and remove.
C) It initiates after start-up.
D) It is attached to a local machine.
A) It may be detected by software.
B) It is hard to install and remove.
C) It initiates after start-up.
D) It is attached to a local machine.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following types of identity theft/fraud is a person engaged in if he created a fictitious profile on a social networking site so as to facilitate an extramarital affair?
A) criminal record identity theft/fraud
B) assumption of identity
C) credit or financial theft
D) virtual identity theft/fraud
A) criminal record identity theft/fraud
B) assumption of identity
C) credit or financial theft
D) virtual identity theft/fraud
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following examples may be classified as identity fraud?
A) You are wrongfully accused of a crime committed by an impostor.
B) Your phone bill reflects long distance charges you did not make.
C) You have documents that helped you illegally immigrate into the country.
D) You use a fake name to make a restaurant reservation.
A) You are wrongfully accused of a crime committed by an impostor.
B) Your phone bill reflects long distance charges you did not make.
C) You have documents that helped you illegally immigrate into the country.
D) You use a fake name to make a restaurant reservation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is true regarding Trojans?
A) They provide a mechanism for cybercriminals to change Web site IP addresses.
B) They are malicious programs that redirect users' network traffic to undesired sites.
C) They record every keystroke, including BIOS passwords, and are undetectable by software.
D) They are potentially unwanted and are often housed with commercial utilities.
A) They provide a mechanism for cybercriminals to change Web site IP addresses.
B) They are malicious programs that redirect users' network traffic to undesired sites.
C) They record every keystroke, including BIOS passwords, and are undetectable by software.
D) They are potentially unwanted and are often housed with commercial utilities.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT a reason why lenders have often confounded law enforcement by their reluctance to join in the efforts to combat identity threat/fraud?
A) Consumers are unconcerned and won't take steps to protect their accounts.
B) Lenders are singularly motivated by capitalism.
C) Benefits flow to them from easily available credit.
D) Lenders willingly absorb costs associated with identity theft/fraud.
A) Consumers are unconcerned and won't take steps to protect their accounts.
B) Lenders are singularly motivated by capitalism.
C) Benefits flow to them from easily available credit.
D) Lenders willingly absorb costs associated with identity theft/fraud.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following physical methods of identity theft involves the surreptitious entry into hotel rooms to steal, photograph, or photocopy documents?
A) bag operations
B) insiders
C) card skimming
D) dumpster diving
A) bag operations
B) insiders
C) card skimming
D) dumpster diving
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is true regarding keyloggers?
A) They are designed to capture passwords and other private information.
B) They are designed to recover lost work in the case of computer problems.
C) They are designed to use company trademarks to represent a legitimate institution.
D) They are designed for worthwhile goals like parental control.
A) They are designed to capture passwords and other private information.
B) They are designed to recover lost work in the case of computer problems.
C) They are designed to use company trademarks to represent a legitimate institution.
D) They are designed for worthwhile goals like parental control.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
14
Paper shredders and disk-wiping software are means to avoid which of the following physical methods of identity theft?
A) mail theft
B) bag operations
C) ATM manipulation
D) dumpster diving
A) mail theft
B) bag operations
C) ATM manipulation
D) dumpster diving
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following types of identity theft/fraud is by far the most common and also the most feared by the American public?
A) credit identity theft/fraud
B) assumption of identity
C) theft for employment and/or border entry
D) virtual identity theft/fraud
A) credit identity theft/fraud
B) assumption of identity
C) theft for employment and/or border entry
D) virtual identity theft/fraud
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
16
"Popcorning" is a technique used in which of the following physical methods of identity theft?
A) child identity theft
B) mail theft
C) fraudulent or fictitious companies
D) theft of computers
A) child identity theft
B) mail theft
C) fraudulent or fictitious companies
D) theft of computers
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is an example of a bag operation?
A) A person surreptitiously enters a suspect's hotel room to download information from the suspect's laptop computer.
B), A person retrieves a bag full of documents containing personal and financial information from his neighbor's mailbox.
C) A logistics manager is accused of losing tapes containing personal information of government employees during shipment.
D) A person is found sifting through bags of commercial trash, looking for passwords, computer systems, and software.
A) A person surreptitiously enters a suspect's hotel room to download information from the suspect's laptop computer.
B), A person retrieves a bag full of documents containing personal and financial information from his neighbor's mailbox.
C) A logistics manager is accused of losing tapes containing personal information of government employees during shipment.
D) A person is found sifting through bags of commercial trash, looking for passwords, computer systems, and software.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
18
An upstanding citizen with no police record, Jonathan discovers that a past acquaintance who's now a career criminal is claiming Jonathan's identity.What form of identity theft/threat is Jonathan a victim of?
A) assumption of identity
B) theft for employment
C) reverse criminal record identity theft
D) credit identity theft/fraud
A) assumption of identity
B) theft for employment
C) reverse criminal record identity theft
D) credit identity theft/fraud
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following best distinguishes identity theft?
A) Identity theft is the illegal use or transfer of a third party's personal identification information with unlawful intent.
B) Identity theft encompasses identity fraud within its purview.
C) Identity theft involves any attempts by minors to use fake IDs to purchase alcohol or gain access to nightclubs or gambling establishments.
D) Identity theft is a vast array of illegal activities based on fraudulent use of identifying information of a real or fictitious person.
A) Identity theft is the illegal use or transfer of a third party's personal identification information with unlawful intent.
B) Identity theft encompasses identity fraud within its purview.
C) Identity theft involves any attempts by minors to use fake IDs to purchase alcohol or gain access to nightclubs or gambling establishments.
D) Identity theft is a vast array of illegal activities based on fraudulent use of identifying information of a real or fictitious person.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following statements correctly distinguishes between identity theft and identity fraud?
A) Identity fraud is always a victimless crime.
B) Identity fraud may involve the fabrication of identity information based on a fictitious person.
C) Identity theft may be done for criminal purposes.
D) Identity theft does not utilize historical or biometric information.
A) Identity fraud is always a victimless crime.
B) Identity fraud may involve the fabrication of identity information based on a fictitious person.
C) Identity theft may be done for criminal purposes.
D) Identity theft does not utilize historical or biometric information.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
21
According to victim reports, 42 percent of identity theft involved cases involving the procurement of government documents or benefits.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
22
An individual who creates a false virtual identity has automatically crossed the line into illegal activity.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following would NOT be classified under insurance and loan fraud?
A) enrolling in distance education and online courses using fake identities
B) creating multiple accounts with a bank to commit-tax related fraud
C) dropping out of community colleges upon receiving government loans for education
D) obtaining free medical care by procuring a victim's personal information
A) enrolling in distance education and online courses using fake identities
B) creating multiple accounts with a bank to commit-tax related fraud
C) dropping out of community colleges upon receiving government loans for education
D) obtaining free medical care by procuring a victim's personal information
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
24
The Visa Waiver Pilot Program (VWPP) caused the most recent surge in which of the following fraudulent activities?
A) credit card fraud
B) immigration benefit fraud
C) alien smuggling
D) trafficking
A) credit card fraud
B) immigration benefit fraud
C) alien smuggling
D) trafficking
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following are most often used fraudulently to obtain immigration benefits?
A) student ID
B) drivers' licenses
C) documentation of residency
D) credit cards
A) student ID
B) drivers' licenses
C) documentation of residency
D) credit cards
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
26
According to the Federal Trade Commission, there is a marked increase in the number of children victimized by identity theft since 2003.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
27
Reverse criminal record identity theft/fraud is relatively uncommon and the immediate financial repercussions are usually not significant.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
28
A full accounting of the prevalence of identity theft has been confounded by the lack of mandatory reporting and inconsistent application by federal agencies.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
29
Identity fraud is committed when a credible identity is created by accessing others' credit cards, financial or employment records, or computer system.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
30
Assumption of identity is the most common form of identity theft/fraud.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following types of fraud is most likely to involve faked work permits and green cards?
A) insurance fraud
B) identity fraud
C) computer fraud
D) immigration fraud
A) insurance fraud
B) identity fraud
C) computer fraud
D) immigration fraud
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
32
An individual who has been a victim of reverse criminal record identity theft does not face legal obstacles to his or her identity rehabilitation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
33
Costs associated with identity theft/fraud are incurred by the individual victim but not the financial institution or lender extending money or credit based on fraudulent identity.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
34
To safeguard belongings and identity from dedicated criminals, it is important to develop alternate means of identity authentication.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
35
Bag operations involve sifting through commercial or residential trash or waste for information deemed valuable.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
36
Today an identity thief is often remote from the victim.How does this pose a special problem to law enforcement?
A) Victims often don't care if a person is using their identity in a distant state.
B) Jurisdictional questions often confound local authorities.
C) The federal government can't prosecute identity thieves who work exclusively online.
D) Only a few states have passed laws forbidding Internet-facilitated identity theft and fraud.
A) Victims often don't care if a person is using their identity in a distant state.
B) Jurisdictional questions often confound local authorities.
C) The federal government can't prosecute identity thieves who work exclusively online.
D) Only a few states have passed laws forbidding Internet-facilitated identity theft and fraud.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
37
Consumers are encouraged to use different ATM machines for every transaction in order to reduce fraud caused by ATM manipulation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
38
Theft for border entry involves the willful misrepresentation of material fact on a petition or application to secure an immigration benefit.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
39
Hardware keyloggers provide screen-capture features, which users can utilize to view screenshot images of victim activity.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
40
Procurement of one foundational document of identification is often enough for its holder to secure a variety of others.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
41
________ involves the reading and recording of personal information encoded on the magnetic strip of an ATM or credit card.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
42
How can identity theft be distinguished from identity fraud? Is it true that identity theft leads to identity fraud? Explain with an example of your own.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
43
________ identity theft/fraud may be defined as the use of stolen personal and financial information to facilitate the creation of fraudulent accounts.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
44
Passports, birth certificates, and social security cards are all examples of ________ documents.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
45
In the technique known as ________, thieves often score credit card numbers and banking information by targeting those whose red flag signals outgoing mail.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
46
Exact government figures and statistics on identity theft/fraud are not available due primarily to a lack of ________ and the criminal multiplicity of the phenomenon.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
47
________ and other forms of malware are often referred to as PUPS (potentially unwanted programs).
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
48
________ is defined as the use of a vast array of illegal activities based on fraudulent use of identifying information of a real or fictitious person.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
49
________ provide a mechanism for cybercriminals to change Web site IP addresses repeatedly without affecting the domain name.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
50
________ identity theft/fraud occurs when a criminal uses a victim's identity not to engage in criminal activity but to seek gainful employment.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
51
________ is defined as the illegal use or transfer of a third party's personal identification information with unlawful intent.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
52
________ may be conducted by either individuals or criminal organizations to secure border crossings, obtain immigration benefits, or further terrorist activity.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
53
Many authorities suggest that corporate and government ________ pose the greatest risk to identity fraud with varying motivations and unintentional facilitation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
54
________ is a broad class of software that is surreptitiously installed on a user's machine to intercept the interaction between users and their computers.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
55
How do college students become victims of insurance and loan fraud? Offer suggestions on how students can minimize or overcome this victimization.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
56
________ involves the fraudulent use of stolen or fictitious personal information to obtain employment or to gain entry into the United States.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
57
In ________, some individuals willingly divulge personal and financial information to strangers if they believe that a large financial windfall will soon follow.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
58
List and explain the four phases of criminal activity facilitated by identity theft/fraud.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
59
Discuss the various crimes that are easily facilitated by identity theft/fraud.What, in your opinion, should be the measures taken by the government to eradicate such crimes?
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
60
Assess the virtual or Internet-facilitated methods by which computer criminals steal an identity.Elaborate with examples of your own.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck