Crimes Against Property MCQ

_____ is known as a scheme to defraud and the use of wires (telephones, bank transfers, computers) to execute the scheme

Answer

Correct Answer: Wire fraud

Note: This Question is unanswered, help us to find answer for this one

_____ is defined as crimes committed by people who hold positions of trust

Answer

Correct Answer: White-collar crimes

Note: This Question is unanswered, help us to find answer for this one

_____ is phishing for corporate targets

Answer

Correct Answer: Whaling

Note: This Question is unanswered, help us to find answer for this one

Is uttering passing fraudulent checks?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

_____ is known as prosecuted as wire fraud; assigns criminal liability to elected officials who personally benefit by committing crimes at the public’s expense

Answer

Correct Answer: Theft of honest services

Note: This Question is unanswered, help us to find answer for this one

_____ is defined as must have scienter (knowledge) that the property is stolen to be criminally responsible for its receipt

Answer

Correct Answer: Receiving stolen property

Note: This Question is unanswered, help us to find answer for this one

_____ is land and its permanent structures, such as houses, barns, and other buildings

Answer

Correct Answer: Real property

Note: This Question is unanswered, help us to find answer for this one

Is racketeer Influenced and Corrupt Organizations (RICO) Act comprehensive law enacted in the 1970s to combat organized crime. Elements include a pattern of racketeering activity and investment of criminal proceeds in a business that affects interstate commerce?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

_____ is known as an exchange of benefits common in public corruption cases

Answer

Correct Answer: Quid pro quo

Note: This Question is unanswered, help us to find answer for this one

_____ is defined as a list of state and federal crimes that form the basis of racketeering charges

Answer

Correct Answer: Predicate acts

Note: This Question is unanswered, help us to find answer for this one

_____ is a phony, but real-looking, Internet website that steals patrons’ passwords, personal information, or money

Answer

Correct Answer: Phishing

Note: This Question is unanswered, help us to find answer for this one

Is personal property personal possessions that can be moved from one place to another?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

_____ is known as two or more predicate acts committed and have the threat to continue

Answer

Correct Answer: Pattern of racketeering activity

Note: This Question is unanswered, help us to find answer for this one

_____ is defined as interjecting illegally obtained money into a legal stream of commerce to disguise the money’s illegal origins

Answer

Correct Answer: Money laundering

Note: This Question is unanswered, help us to find answer for this one

_____ is software deployed to infect computers

Answer

Correct Answer: Malware

Note: This Question is unanswered, help us to find answer for this one

Is mail fraud a scheme to defraud that uses the U.S. Postal Service or a private mail carrier in its execution?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

_____ is known as theft that results when a thief’s lies convince the owner to turn over his property

Answer

Correct Answer: Larceny by trick

Note: This Question is unanswered, help us to find answer for this one

_____ is defined as the taking away of the personal property of another without that person’s consent and with the intent to permanently deprive the owner

Answer

Correct Answer: Larceny

Note: This Question is unanswered, help us to find answer for this one

_____ is acquisition of personal information about another to gain something of value

Answer

Correct Answer: Identity theft

Note: This Question is unanswered, help us to find answer for this one

Is forgery alteration of signatures or documents for financial gain?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

_____ is known as the use of computers to steal things of value

Answer

Correct Answer: Financial cybercrime

Note: This Question is unanswered, help us to find answer for this one

_____ is defined as lies intended to induce the owner of property to surrender title or possession of the property

Answer

Correct Answer: False pretenses

Note: This Question is unanswered, help us to find answer for this one

_____ is blackmail; threatening to ruin the victim’s reputation or business unless the victim gives the offender something of value

Answer

Correct Answer: Extortion

Note: This Question is unanswered, help us to find answer for this one

Is embezzlement lawfully acquiring another’s property and converting it for personal use?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

_____ is known as encrypted Internet service provider that hides users’ true identity to buy and sell illicit goods

Answer

Correct Answer: Dark Web

Note: This Question is unanswered, help us to find answer for this one

_____ is defined as money represented by computer transactions

Answer

Correct Answer: Cryptocurrency

Note: This Question is unanswered, help us to find answer for this one

_____ is Defacing property, including damaging the integrity of the property

Answer

Correct Answer: Criminal mischief

Note: This Question is unanswered, help us to find answer for this one

Is counterfeit an item of value that purports to be real, but is not?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

_____ is known as illegally making another person’s property one’s own

Answer

Correct Answer: Conversion

Note: This Question is unanswered, help us to find answer for this one

_____ is defined as combining common law theft crimes into one, catch-all statute

Answer

Correct Answer: Consolidated theft statutes

Note: This Question is unanswered, help us to find answer for this one

_____ is breaking and entering into a structure with the intent to commit a felony once inside; the breaking may be achieved through fraud and deceit rather than by physical force

Answer

Correct Answer: Burglary

Note: This Question is unanswered, help us to find answer for this one

Is breaking and entering changing a structure (four walls and a roof) to enter unlawfully?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

_____ is known as a type of cryptocurrency, money represented by computer transactions

Answer

Correct Answer: Bitcoin

Note: This Question is unanswered, help us to find answer for this one

_____ is defined as the malicious and unlawful burning of structures and/or property

Answer

Correct Answer: Arson

Note: This Question is unanswered, help us to find answer for this one

_____ is a defense raised that, if successfully presented, may lead to a reduction or complete negation of criminal liability

Answer

Correct Answer: Affirmative defense

Note: This Question is unanswered, help us to find answer for this one

In a prosecution for mail or wire fraud, the government does not have to prove a scheme to defraud.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

Real property is moveable property, such as laptops and money.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

Modern theft statutes that eliminate common law distinctions among property crimes consolidate all types of theft in one law.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

In an act of revenge, Valpone went to Gibbons’ house with the intent to set the house on fire. Valpone smashed a back window and climbed through with a gas can. Valpone poured gasoline in the living room and started a fire; he left through the back door. The two crimes Valpone committed were ______.

Answer

Correct Answer: Burglary and arson

Note: This Question is unanswered, help us to find answer for this one

Predicate acts for the Racketeer Influenced and Corrupt Organizations (RICO) Act include the following types of crimes EXCEPT ______.

Answer

Correct Answer: Trespass

Note: This Question is unanswered, help us to find answer for this one

Chance sold $125,000 of heroin and then purchased a Mercedes Benz. Chance has committed the crime of ______.

Answer

Correct Answer: Money laundering

Note: This Question is unanswered, help us to find answer for this one

The intent common to both mail and wire fraud crimes is the intent to ______.

Answer

Correct Answer: Defraud

Note: This Question is unanswered, help us to find answer for this one

In the corporate world to commit theft offenses, white-collar criminals tend to be in positions that involve ______.

Answer

Correct Answer: Trust

Note: This Question is unanswered, help us to find answer for this one

Phishing is using fake websites to obtain personal financial information, while the more sophisticated phishing that targets multimillion dollar business and the executives who control the assets is called ______.

Answer

Correct Answer: Whaling

Note: This Question is unanswered, help us to find answer for this one

On the Dark Web, cryptocurrency can hide users’ identities as they engage the marketplace for illegal goods and services. But ______ can help law enforcement catch offenders by tracing digital transfers of money for the illegal transactions.

Answer

Correct Answer: Blockchain

Note: This Question is unanswered, help us to find answer for this one

Methods of hacking utilized by offenders to commit financial cybercrime include all of the following EXCEPT ______.

Answer

Correct Answer: SQL Tor

Note: This Question is unanswered, help us to find answer for this one

Perry owned a law firm and was defending Della in a criminal case. Della paid Perry’s law firm a $30,000 retainer for his representation. Perry took $10,000 and put the money in his personal, not law firm’s account. Perry has committed the crime of ______.

Answer

Correct Answer: Embezzlement

Note: This Question is unanswered, help us to find answer for this one

Margaret was selling her 2014 Prius to her friend Chris. Chris wanted the car if the Prius had low mileage. Margaret said the car had 20,000 miles. Margaret lied, the Prius had 200,000 miles on it. Margaret committed false pretenses because her lie involved ______.

Answer

Correct Answer: A material present fact

Note: This Question is unanswered, help us to find answer for this one

The basic elements of larceny include all of the following EXCEPT ______.

Answer

Correct Answer: Of another’s real property

Note: This Question is unanswered, help us to find answer for this one

Larceny as defined in early English law was ______.

Answer

Correct Answer: Trespass de bonis asportatis (trespass for good carried away)

Note: This Question is unanswered, help us to find answer for this one