_____ is known as a scheme to defraud and the use of wires (telephones, bank transfers, computers) to execute the scheme
Answer
Correct Answer:
Wire fraud
Note: This Question is unanswered, help us to find answer for this one
_____ is defined as crimes committed by people who hold positions of trust
Answer
Correct Answer:
White-collar crimes
Note: This Question is unanswered, help us to find answer for this one
_____ is phishing for corporate targets
Answer
Correct Answer:
Whaling
Note: This Question is unanswered, help us to find answer for this one
Is uttering passing fraudulent checks?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
_____ is known as prosecuted as wire fraud; assigns criminal liability to elected officials who personally benefit by committing crimes at the public’s expense
Answer
Correct Answer:
Theft of honest services
Note: This Question is unanswered, help us to find answer for this one
_____ is defined as must have scienter (knowledge) that the property is stolen to be criminally responsible for its receipt
Answer
Correct Answer:
Receiving stolen property
Note: This Question is unanswered, help us to find answer for this one
_____ is land and its permanent structures, such as houses, barns, and other buildings
Answer
Correct Answer:
Real property
Note: This Question is unanswered, help us to find answer for this one
Is racketeer Influenced and Corrupt Organizations (RICO) Act comprehensive law enacted in the 1970s to combat organized crime. Elements include a pattern of racketeering activity and investment of criminal proceeds in a business that affects interstate commerce?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
_____ is known as an exchange of benefits common in public corruption cases
Answer
Correct Answer:
Quid pro quo
Note: This Question is unanswered, help us to find answer for this one
_____ is defined as a list of state and federal crimes that form the basis of racketeering charges
Answer
Correct Answer:
Predicate acts
Note: This Question is unanswered, help us to find answer for this one
_____ is a phony, but real-looking, Internet website that steals patrons’ passwords, personal information, or money
Answer
Correct Answer:
Phishing
Note: This Question is unanswered, help us to find answer for this one
Is personal property personal possessions that can be moved from one place to another?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
_____ is known as two or more predicate acts committed and have the threat to continue
Answer
Correct Answer:
Pattern of racketeering activity
Note: This Question is unanswered, help us to find answer for this one
_____ is defined as interjecting illegally obtained money into a legal stream of commerce to disguise the money’s illegal origins
Answer
Correct Answer:
Money laundering
Note: This Question is unanswered, help us to find answer for this one
_____ is software deployed to infect computers
Answer
Correct Answer:
Malware
Note: This Question is unanswered, help us to find answer for this one
Is mail fraud a scheme to defraud that uses the U.S. Postal Service or a private mail carrier in its execution?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
_____ is known as theft that results when a thief’s lies convince the owner to turn over his property
Answer
Correct Answer:
Larceny by trick
Note: This Question is unanswered, help us to find answer for this one
_____ is defined as the taking away of the personal property of another without that person’s consent and with the intent to permanently deprive the owner
Answer
Correct Answer:
Larceny
Note: This Question is unanswered, help us to find answer for this one
_____ is acquisition of personal information about another to gain something of value
Answer
Correct Answer:
Identity theft
Note: This Question is unanswered, help us to find answer for this one
Is forgery alteration of signatures or documents for financial gain?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
_____ is known as the use of computers to steal things of value
Answer
Correct Answer:
Financial cybercrime
Note: This Question is unanswered, help us to find answer for this one
_____ is defined as lies intended to induce the owner of property to surrender title or possession of the property
Answer
Correct Answer:
False pretenses
Note: This Question is unanswered, help us to find answer for this one
_____ is blackmail; threatening to ruin the victim’s reputation or business unless the victim gives the offender something of value
Answer
Correct Answer:
Extortion
Note: This Question is unanswered, help us to find answer for this one
Is embezzlement lawfully acquiring another’s property and converting it for personal use?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
_____ is known as encrypted Internet service provider that hides users’ true identity to buy and sell illicit goods
Answer
Correct Answer:
Dark Web
Note: This Question is unanswered, help us to find answer for this one
_____ is defined as money represented by computer transactions
Answer
Correct Answer:
Cryptocurrency
Note: This Question is unanswered, help us to find answer for this one
_____ is Defacing property, including damaging the integrity of the property
Answer
Correct Answer:
Criminal mischief
Note: This Question is unanswered, help us to find answer for this one
Is counterfeit an item of value that purports to be real, but is not?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
_____ is known as illegally making another person’s property one’s own
Answer
Correct Answer:
Conversion
Note: This Question is unanswered, help us to find answer for this one
_____ is defined as combining common law theft crimes into one, catch-all statute
Answer
Correct Answer:
Consolidated theft statutes
Note: This Question is unanswered, help us to find answer for this one
_____ is breaking and entering into a structure with the intent to commit a felony once inside; the breaking may be achieved through fraud and deceit rather than by physical force
Answer
Correct Answer:
Burglary
Note: This Question is unanswered, help us to find answer for this one
Is breaking and entering changing a structure (four walls and a roof) to enter unlawfully?
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
_____ is known as a type of cryptocurrency, money represented by computer transactions
Answer
Correct Answer:
Bitcoin
Note: This Question is unanswered, help us to find answer for this one
_____ is defined as the malicious and unlawful burning of structures and/or property
Answer
Correct Answer:
Arson
Note: This Question is unanswered, help us to find answer for this one
_____ is a defense raised that, if successfully presented, may lead to a reduction or complete negation of criminal liability
Answer
Correct Answer:
Affirmative defense
Note: This Question is unanswered, help us to find answer for this one
In a prosecution for mail or wire fraud, the government does not have to prove a scheme to defraud.
Answer
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
Real property is moveable property, such as laptops and money.
Answer
Correct Answer:
False
Note: This Question is unanswered, help us to find answer for this one
Modern theft statutes that eliminate common law distinctions among property crimes consolidate all types of theft in one law.
Answer
Correct Answer:
True
Note: This Question is unanswered, help us to find answer for this one
In an act of revenge, Valpone went to Gibbons’ house with the intent to set the house on fire. Valpone smashed a back window and climbed through with a gas can. Valpone poured gasoline in the living room and started a fire; he left through the back door. The two crimes Valpone committed were ______.
Answer
Correct Answer:
Burglary and arson
Note: This Question is unanswered, help us to find answer for this one
Predicate acts for the Racketeer Influenced and Corrupt Organizations (RICO) Act include the following types of crimes EXCEPT ______.
Answer
Correct Answer:
Trespass
Note: This Question is unanswered, help us to find answer for this one
Chance sold $125,000 of heroin and then purchased a Mercedes Benz. Chance has committed the crime of ______.
Answer
Correct Answer:
Money laundering
Note: This Question is unanswered, help us to find answer for this one
The intent common to both mail and wire fraud crimes is the intent to ______.
Answer
Correct Answer:
Defraud
Note: This Question is unanswered, help us to find answer for this one
In the corporate world to commit theft offenses, white-collar criminals tend to be in positions that involve ______.
Answer
Correct Answer:
Trust
Note: This Question is unanswered, help us to find answer for this one
Phishing is using fake websites to obtain personal financial information, while the more sophisticated phishing that targets multimillion dollar business and the executives who control the assets is called ______.
Answer
Correct Answer:
Whaling
Note: This Question is unanswered, help us to find answer for this one
On the Dark Web, cryptocurrency can hide users’ identities as they engage the marketplace for illegal goods and services. But ______ can help law enforcement catch offenders by tracing digital transfers of money for the illegal transactions.
Answer
Correct Answer:
Blockchain
Note: This Question is unanswered, help us to find answer for this one
Methods of hacking utilized by offenders to commit financial cybercrime include all of the following EXCEPT ______.
Answer
Correct Answer:
SQL Tor
Note: This Question is unanswered, help us to find answer for this one
Perry owned a law firm and was defending Della in a criminal case. Della paid Perry’s law firm a $30,000 retainer for his representation. Perry took $10,000 and put the money in his personal, not law firm’s account. Perry has committed the crime of ______.
Answer
Correct Answer:
Embezzlement
Note: This Question is unanswered, help us to find answer for this one
Margaret was selling her 2014 Prius to her friend Chris. Chris wanted the car if the Prius had low mileage. Margaret said the car had 20,000 miles. Margaret lied, the Prius had 200,000 miles on it. Margaret committed false pretenses because her lie involved ______.
Answer
Correct Answer:
A material present fact
Note: This Question is unanswered, help us to find answer for this one
The basic elements of larceny include all of the following EXCEPT ______.
Answer
Correct Answer:
Of another’s real property
Note: This Question is unanswered, help us to find answer for this one
Larceny as defined in early English law was ______.
Answer
Correct Answer:
Trespass de bonis asportatis (trespass for good carried away)
Note: This Question is unanswered, help us to find answer for this one