1. _____ is known as a scheme to defraud and the use of wires (telephones, bank transfers, computers) to execute the scheme
Answer
Correct Answer:
Wire fraud
Note: This Question is unanswered, help us to find answer for this one
2. _____ is defined as crimes committed by people who hold positions of trust
Answer
Correct Answer:
White-collar crimes
Note: This Question is unanswered, help us to find answer for this one
3. _____ is phishing for corporate targets
Answer
Correct Answer:
Whaling
Note: This Question is unanswered, help us to find answer for this one
4. Is uttering passing fraudulent checks?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
5. _____ is known as prosecuted as wire fraud; assigns criminal liability to elected officials who personally benefit by committing crimes at the public’s expense
Answer
Correct Answer:
Theft of honest services
Note: This Question is unanswered, help us to find answer for this one
6. _____ is defined as must have scienter (knowledge) that the property is stolen to be criminally responsible for its receipt
Answer
Correct Answer:
Receiving stolen property
Note: This Question is unanswered, help us to find answer for this one
7. _____ is land and its permanent structures, such as houses, barns, and other buildings
Answer
Correct Answer:
Real property
Note: This Question is unanswered, help us to find answer for this one
8. Is racketeer Influenced and Corrupt Organizations (RICO) Act comprehensive law enacted in the 1970s to combat organized crime. Elements include a pattern of racketeering activity and investment of criminal proceeds in a business that affects interstate commerce?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
9. _____ is known as an exchange of benefits common in public corruption cases
Answer
Correct Answer:
Quid pro quo
Note: This Question is unanswered, help us to find answer for this one
10. _____ is defined as a list of state and federal crimes that form the basis of racketeering charges
Answer
Correct Answer:
Predicate acts
Note: This Question is unanswered, help us to find answer for this one
11. _____ is a phony, but real-looking, Internet website that steals patrons’ passwords, personal information, or money
Answer
Correct Answer:
Phishing
Note: This Question is unanswered, help us to find answer for this one
12. Is personal property personal possessions that can be moved from one place to another?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
13. _____ is known as two or more predicate acts committed and have the threat to continue
Answer
Correct Answer:
Pattern of racketeering activity
Note: This Question is unanswered, help us to find answer for this one
14. _____ is defined as interjecting illegally obtained money into a legal stream of commerce to disguise the money’s illegal origins
Answer
Correct Answer:
Money laundering
Note: This Question is unanswered, help us to find answer for this one
15. _____ is software deployed to infect computers
Answer
Correct Answer:
Malware
Note: This Question is unanswered, help us to find answer for this one
16. Is mail fraud a scheme to defraud that uses the U.S. Postal Service or a private mail carrier in its execution?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
17. _____ is known as theft that results when a thief’s lies convince the owner to turn over his property
Answer
Correct Answer:
Larceny by trick
Note: This Question is unanswered, help us to find answer for this one
18. _____ is defined as the taking away of the personal property of another without that person’s consent and with the intent to permanently deprive the owner
Answer
Correct Answer:
Larceny
Note: This Question is unanswered, help us to find answer for this one
19. _____ is acquisition of personal information about another to gain something of value
Answer
Correct Answer:
Identity theft
Note: This Question is unanswered, help us to find answer for this one
20. Is forgery alteration of signatures or documents for financial gain?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
21. _____ is known as the use of computers to steal things of value
Answer
Correct Answer:
Financial cybercrime
Note: This Question is unanswered, help us to find answer for this one
22. _____ is defined as lies intended to induce the owner of property to surrender title or possession of the property
Answer
Correct Answer:
False pretenses
Note: This Question is unanswered, help us to find answer for this one
23. _____ is blackmail; threatening to ruin the victim’s reputation or business unless the victim gives the offender something of value
Answer
Correct Answer:
Extortion
Note: This Question is unanswered, help us to find answer for this one
24. Is embezzlement lawfully acquiring another’s property and converting it for personal use?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
25. _____ is known as encrypted Internet service provider that hides users’ true identity to buy and sell illicit goods
Answer
Correct Answer:
Dark Web
Note: This Question is unanswered, help us to find answer for this one
26. _____ is defined as money represented by computer transactions
Answer
Correct Answer:
Cryptocurrency
Note: This Question is unanswered, help us to find answer for this one
27. _____ is Defacing property, including damaging the integrity of the property
Answer
Correct Answer:
Criminal mischief
Note: This Question is unanswered, help us to find answer for this one
28. Is counterfeit an item of value that purports to be real, but is not?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
29. _____ is known as illegally making another person’s property one’s own
Answer
Correct Answer:
Conversion
Note: This Question is unanswered, help us to find answer for this one
30. _____ is defined as combining common law theft crimes into one, catch-all statute
Answer
Correct Answer:
Consolidated theft statutes
Note: This Question is unanswered, help us to find answer for this one
31. _____ is breaking and entering into a structure with the intent to commit a felony once inside; the breaking may be achieved through fraud and deceit rather than by physical force
Answer
Correct Answer:
Burglary
Note: This Question is unanswered, help us to find answer for this one
32. Is breaking and entering changing a structure (four walls and a roof) to enter unlawfully?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
33. _____ is known as a type of cryptocurrency, money represented by computer transactions
Answer
Correct Answer:
Bitcoin
Note: This Question is unanswered, help us to find answer for this one
34. _____ is defined as the malicious and unlawful burning of structures and/or property
Answer
Correct Answer:
Arson
Note: This Question is unanswered, help us to find answer for this one
35. _____ is a defense raised that, if successfully presented, may lead to a reduction or complete negation of criminal liability
Answer
Correct Answer:
Affirmative defense
Note: This Question is unanswered, help us to find answer for this one
36. In a prosecution for mail or wire fraud, the government does not have to prove a scheme to defraud.
Answer
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
37. Real property is moveable property, such as laptops and money.
Answer
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
38. Modern theft statutes that eliminate common law distinctions among property crimes consolidate all types of theft in one law.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
39. In an act of revenge, Valpone went to Gibbons’ house with the intent to set the house on fire. Valpone smashed a back window and climbed through with a gas can. Valpone poured gasoline in the living room and started a fire; he left through the back door. The two crimes Valpone committed were ______.
Answer
Correct Answer:
Burglary and arson
Note: This Question is unanswered, help us to find answer for this one
40. Predicate acts for the Racketeer Influenced and Corrupt Organizations (RICO) Act include the following types of crimes EXCEPT ______.
Answer
Correct Answer:
Trespass
Note: This Question is unanswered, help us to find answer for this one
41. Chance sold $125,000 of heroin and then purchased a Mercedes Benz. Chance has committed the crime of ______.
Answer
Correct Answer:
Money laundering
Note: This Question is unanswered, help us to find answer for this one
42. The intent common to both mail and wire fraud crimes is the intent to ______.
Answer
Correct Answer:
Defraud
Note: This Question is unanswered, help us to find answer for this one
43. In the corporate world to commit theft offenses, white-collar criminals tend to be in positions that involve ______.
Answer
Correct Answer:
Trust
Note: This Question is unanswered, help us to find answer for this one
44. Phishing is using fake websites to obtain personal financial information, while the more sophisticated phishing that targets multimillion dollar business and the executives who control the assets is called ______.
Answer
Correct Answer:
Whaling
Note: This Question is unanswered, help us to find answer for this one
45. On the Dark Web, cryptocurrency can hide users’ identities as they engage the marketplace for illegal goods and services. But ______ can help law enforcement catch offenders by tracing digital transfers of money for the illegal transactions.
Answer
Correct Answer:
Blockchain
Note: This Question is unanswered, help us to find answer for this one
46. Methods of hacking utilized by offenders to commit financial cybercrime include all of the following EXCEPT ______.
Answer
Correct Answer:
SQL Tor
Note: This Question is unanswered, help us to find answer for this one
47. Perry owned a law firm and was defending Della in a criminal case. Della paid Perry’s law firm a $30,000 retainer for his representation. Perry took $10,000 and put the money in his personal, not law firm’s account. Perry has committed the crime of ______.
Answer
Correct Answer:
Embezzlement
Note: This Question is unanswered, help us to find answer for this one
48. Margaret was selling her 2014 Prius to her friend Chris. Chris wanted the car if the Prius had low mileage. Margaret said the car had 20,000 miles. Margaret lied, the Prius had 200,000 miles on it. Margaret committed false pretenses because her lie involved ______.
Answer
Correct Answer:
A material present fact
Note: This Question is unanswered, help us to find answer for this one
49. The basic elements of larceny include all of the following EXCEPT ______.
Answer
Correct Answer:
Of another’s real property
Note: This Question is unanswered, help us to find answer for this one
50. Larceny as defined in early English law was ______.
Answer
Correct Answer:
Trespass de bonis asportatis (trespass for good carried away)
Note: This Question is unanswered, help us to find answer for this one