Which of the following is NOT a way to avoid a pyramid scheme?
a. Find out if the plan involves a training program
b. Research the company involved before signing a contract
c. Shred and document which contains personal information
d. Call the Better Business Bureau to inquire about the company
Shred any document which contains personal information.
You receive an email from a woman claiming her father was poisoned by business associates, but before his passing placed 12 million dollars in a secret account for her. To safely use the money she must first move it to a bank account in another country. She is offering 15% of the funds for your help. She asks you to wire funds to her in order to pay taxes that will release the money. Which type of fraud is this an example of?
A. Bank fraud
B. 4-1-9 fraud
C. Phishing
D. Skimming
4-1-9 fraud
Which type of scam can be promoted by spam mail and often contains viruses?
A. Credit repair
B. Prizes and lotteries
C. E-mail scams
D. Employment scams
E-mail scams
__________ prey(s) upon members of identifiable groups by using their affiliation with the group.
A. Ponzi schemes
B. Identity theft
C. Affinity fraud
D. Elevator schemes
Affinity fraud
Which of the following accurately describes watermarks?
A. Subtle designs on the fronts and backs of checks B. Treatment of checks making “VOID” appear upon chemical application
C. Metallic stripes containing holograms
D. Small printing on the signature line of a check
Subtle designs on the fronts and backs of checks
Which of the following can be described as a hierarchy for which individuals who join make payments to those above them?
a. Affinity Scheme
b. Pyramid Scheme
c. 4-1-9- Fraud
d. Identity theft
Pyramid Scheme
You receive an email that appears to legitimately be from your Bank. The email indicates the need for verification of your information and provides a link to their site in order for you to enter the information. Which type of bank fraud is this an example of?
A. 4-1-9 fraud
B. Skimming
C. Phishing
D. Check kiting
Phishing
Which type of scam includes the scammer selling information of no value and can be a pyramid scheme? A. Prizes and lotteries
B. Door-to-door scams
C. E-mail scams
D. Employment scams
Employment scams
Which of the following is the fastest growing form of fraud in the United States?
A. Ponzi schemes
B. Identity theft
C. Shoulder surfing
D. 4-1-9 frauds
Identity Theft
__________ are non-sustainable business models which involve the exchange of money.
A. Ponzi schemes
B. Elevator schemes
C. Pyramid schemes
D. 4-1-9 frauds
Pyramid schemes
Which of the following is NOT a way to avoid identity theft?
A. Check your financial information regularly
B. View a copy of your credit report often
C. Maintain accurate records of all financial transactions
D. Throw away receipts and statements containing private information
Throw away receipts and statements containing private information
Which type of fraud can be completed with only your name, address and phone number?
A. Government document fraud
B. Phishing
C. Insurance fraud
D. Utilities fraud
Utilities fraud
You receive an email claiming you are one of three names drawn from millions, and you have won 2 million dollars. All you have to do is send some personal information and the money will be released to you. What type of scam is this an example of?
A. Credit repair
B. Prizes and lotteries
C. Employment scams
D. Door-to-door scams
Prizes and lotteries
__________ is the act of making or producing an illegal copy of items so they look genuine.
A. Spamming
B. Identity theft
C. Shoulder surfing
D. Forgery
Forgery
__________ are fraudulent investment operations which involve paying abnormally high returns to investors out of the money paid by other investors.
A. Ponzi schemes
B. Elevator schemes
C. Pyramid schemes
D. 4-1-9 frauds
Ponzi schemes
Which of the following can be described as a hierarchy for which individuals who join make payments to those above them?
A. Affinity Scheme
B. Pyramid Scheme
C. 4-1-9 Fraud
D. Identity theft
Pyramid Scheme
Which type of fraud is the most common in society?
A. Credit card fraud
B. Utilities fraud
C. Insurance fraud
D. Telemarketing fraud
Credit card fraud
Which type of scam can result in individuals violating federal laws such as obtaining a false Social Security number?
A. Credit repair
B. Door-to-door
C. E-mail scams
D. Employment scams
Credit Repair
Skimming is a type of __________.
A. Ponzi scheme
B. Phishing
C. Affinity fraud
D. Credit card fraud
Credit card fraud
__________ is obtaining property or money which does not belong to you from any federally insured financial institution.
A. Insurance fraud
B. Bank fraud
C. Utilities fraud
D. Government documents fraud
Bank fraud
Minority groups, religious groups and community organizations are examples of target groups for which type of scheme?
A. Affinity Fraud
B. Ponzi Scheme
C. Pyramid Scheme
D. Elevator Scheme
Affinity Fraud
Which of the following is NOT a type of insurance fraud?
A. Arson
B. Staged auto accident
C. Owning multiple policies
D. Stolen card fraud
Stolen card fraud
How frequently should passwords and pin numbers be changed?
A. At least every day
B. No more than one year
C. At least every six months
D. No more than every six months
At least every 6 months
Credit repair scams promise which of the following?
A. Erase false information from your credit line
B. Erase accurate negative information from your credit file
C. Refinance lines of credit to reduce minimum payments
D. Lower interest rates on lines of credit
Erase accurate negative information from your credit file
Workers’ compensation fraud is a type of __________.
A. Insurance fraud
B. Bank fraud
C. Utilities fraud
D. Government documents fraud
Insurance fraud