Crimes Against Property MCQ

Crimes Against Property MCQ

 

1. _____ is known as a scheme to defraud and the use of wires (telephones, bank transfers, computers) to execute the scheme

Answer

Correct Answer: Wire fraud

Note: This Question is unanswered, help us to find answer for this one

2. _____ is defined as crimes committed by people who hold positions of trust

Answer

Correct Answer: White-collar crimes

Note: This Question is unanswered, help us to find answer for this one

3. _____ is phishing for corporate targets

Answer

Correct Answer: Whaling

Note: This Question is unanswered, help us to find answer for this one

4. Is uttering passing fraudulent checks?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

5. _____ is known as prosecuted as wire fraud; assigns criminal liability to elected officials who personally benefit by committing crimes at the public’s expense

Answer

Correct Answer: Theft of honest services

Note: This Question is unanswered, help us to find answer for this one

6. _____ is defined as must have scienter (knowledge) that the property is stolen to be criminally responsible for its receipt

Answer

Correct Answer: Receiving stolen property

Note: This Question is unanswered, help us to find answer for this one

7. _____ is land and its permanent structures, such as houses, barns, and other buildings

Answer

Correct Answer: Real property

Note: This Question is unanswered, help us to find answer for this one

8. Is racketeer Influenced and Corrupt Organizations (RICO) Act comprehensive law enacted in the 1970s to combat organized crime. Elements include a pattern of racketeering activity and investment of criminal proceeds in a business that affects interstate commerce?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

9. _____ is known as an exchange of benefits common in public corruption cases

Answer

Correct Answer: Quid pro quo

Note: This Question is unanswered, help us to find answer for this one

10. _____ is defined as a list of state and federal crimes that form the basis of racketeering charges

Answer

Correct Answer: Predicate acts

Note: This Question is unanswered, help us to find answer for this one

11. _____ is a phony, but real-looking, Internet website that steals patrons’ passwords, personal information, or money

Answer

Correct Answer: Phishing

Note: This Question is unanswered, help us to find answer for this one

12. Is personal property personal possessions that can be moved from one place to another?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

13. _____ is known as two or more predicate acts committed and have the threat to continue

Answer

Correct Answer: Pattern of racketeering activity

Note: This Question is unanswered, help us to find answer for this one

14. _____ is defined as interjecting illegally obtained money into a legal stream of commerce to disguise the money’s illegal origins

Answer

Correct Answer: Money laundering

Note: This Question is unanswered, help us to find answer for this one

15. _____ is software deployed to infect computers

Answer

Correct Answer: Malware

Note: This Question is unanswered, help us to find answer for this one

16. Is mail fraud a scheme to defraud that uses the U.S. Postal Service or a private mail carrier in its execution?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

17. _____ is known as theft that results when a thief’s lies convince the owner to turn over his property

Answer

Correct Answer: Larceny by trick

Note: This Question is unanswered, help us to find answer for this one

18. _____ is defined as the taking away of the personal property of another without that person’s consent and with the intent to permanently deprive the owner

Answer

Correct Answer: Larceny

Note: This Question is unanswered, help us to find answer for this one

19. _____ is acquisition of personal information about another to gain something of value

Answer

Correct Answer: Identity theft

Note: This Question is unanswered, help us to find answer for this one

20. Is forgery alteration of signatures or documents for financial gain?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

21. _____ is known as the use of computers to steal things of value

Answer

Correct Answer: Financial cybercrime

Note: This Question is unanswered, help us to find answer for this one

22. _____ is defined as lies intended to induce the owner of property to surrender title or possession of the property

Answer

Correct Answer: False pretenses

Note: This Question is unanswered, help us to find answer for this one

23. _____ is blackmail; threatening to ruin the victim’s reputation or business unless the victim gives the offender something of value

Answer

Correct Answer: Extortion

Note: This Question is unanswered, help us to find answer for this one

24. Is embezzlement lawfully acquiring another’s property and converting it for personal use?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

25. _____ is known as encrypted Internet service provider that hides users’ true identity to buy and sell illicit goods

Answer

Correct Answer: Dark Web

Note: This Question is unanswered, help us to find answer for this one

26. _____ is defined as money represented by computer transactions

Answer

Correct Answer: Cryptocurrency

Note: This Question is unanswered, help us to find answer for this one

27. _____ is Defacing property, including damaging the integrity of the property

Answer

Correct Answer: Criminal mischief

Note: This Question is unanswered, help us to find answer for this one

28. Is counterfeit an item of value that purports to be real, but is not?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

29. _____ is known as illegally making another person’s property one’s own

Answer

Correct Answer: Conversion

Note: This Question is unanswered, help us to find answer for this one

30. _____ is defined as combining common law theft crimes into one, catch-all statute

Answer

Correct Answer: Consolidated theft statutes

Note: This Question is unanswered, help us to find answer for this one

31. _____ is breaking and entering into a structure with the intent to commit a felony once inside; the breaking may be achieved through fraud and deceit rather than by physical force

Answer

Correct Answer: Burglary

Note: This Question is unanswered, help us to find answer for this one

32. Is breaking and entering changing a structure (four walls and a roof) to enter unlawfully?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

33. _____ is known as a type of cryptocurrency, money represented by computer transactions

Answer

Correct Answer: Bitcoin

Note: This Question is unanswered, help us to find answer for this one

34. _____ is defined as the malicious and unlawful burning of structures and/or property

Answer

Correct Answer: Arson

Note: This Question is unanswered, help us to find answer for this one

35. _____ is a defense raised that, if successfully presented, may lead to a reduction or complete negation of criminal liability

Answer

Correct Answer: Affirmative defense

Note: This Question is unanswered, help us to find answer for this one

36. In a prosecution for mail or wire fraud, the government does not have to prove a scheme to defraud.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

37. Real property is moveable property, such as laptops and money.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

38. Modern theft statutes that eliminate common law distinctions among property crimes consolidate all types of theft in one law.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

39. In an act of revenge, Valpone went to Gibbons’ house with the intent to set the house on fire. Valpone smashed a back window and climbed through with a gas can. Valpone poured gasoline in the living room and started a fire; he left through the back door. The two crimes Valpone committed were ______.

Answer

Correct Answer: Burglary and arson

Note: This Question is unanswered, help us to find answer for this one

40. Predicate acts for the Racketeer Influenced and Corrupt Organizations (RICO) Act include the following types of crimes EXCEPT ______.

Answer

Correct Answer: Trespass

Note: This Question is unanswered, help us to find answer for this one

41. Chance sold $125,000 of heroin and then purchased a Mercedes Benz. Chance has committed the crime of ______.

Answer

Correct Answer: Money laundering

Note: This Question is unanswered, help us to find answer for this one

42. The intent common to both mail and wire fraud crimes is the intent to ______.

Answer

Correct Answer: Defraud

Note: This Question is unanswered, help us to find answer for this one

43. In the corporate world to commit theft offenses, white-collar criminals tend to be in positions that involve ______.

Answer

Correct Answer: Trust

Note: This Question is unanswered, help us to find answer for this one

44. Phishing is using fake websites to obtain personal financial information, while the more sophisticated phishing that targets multimillion dollar business and the executives who control the assets is called ______.

Answer

Correct Answer: Whaling

Note: This Question is unanswered, help us to find answer for this one

45. On the Dark Web, cryptocurrency can hide users’ identities as they engage the marketplace for illegal goods and services. But ______ can help law enforcement catch offenders by tracing digital transfers of money for the illegal transactions.

Answer

Correct Answer: Blockchain

Note: This Question is unanswered, help us to find answer for this one

46. Methods of hacking utilized by offenders to commit financial cybercrime include all of the following EXCEPT ______.

Answer

Correct Answer: SQL Tor

Note: This Question is unanswered, help us to find answer for this one

47. Perry owned a law firm and was defending Della in a criminal case. Della paid Perry’s law firm a $30,000 retainer for his representation. Perry took $10,000 and put the money in his personal, not law firm’s account. Perry has committed the crime of ______.

Answer

Correct Answer: Embezzlement

Note: This Question is unanswered, help us to find answer for this one

48. Margaret was selling her 2014 Prius to her friend Chris. Chris wanted the car if the Prius had low mileage. Margaret said the car had 20,000 miles. Margaret lied, the Prius had 200,000 miles on it. Margaret committed false pretenses because her lie involved ______.

Answer

Correct Answer: A material present fact

Note: This Question is unanswered, help us to find answer for this one

49. The basic elements of larceny include all of the following EXCEPT ______.

Answer

Correct Answer: Of another’s real property

Note: This Question is unanswered, help us to find answer for this one

50. Larceny as defined in early English law was ______.

Answer

Correct Answer: Trespass de bonis asportatis (trespass for good carried away)

Note: This Question is unanswered, help us to find answer for this one

search