Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

 1.   Which of the following types of information do credit reporting agencies not maintain?

MULTIPLE CHOICE

     1.   Which of the following types of information do credit reporting agencies not maintain?

a.

Information of current and former employers

b.

Account information such as payment schedules, items purchased, and buying habits.

c.

Marketing information such as customer breakdowns by age, sex, and income levels

d.

Consumer information such as addresses and family members

e.

Credit reporting agencies maintain all of the above information

ANS:

     2.               Using the data below the income from unknown sources for year 2 and 3 respectively are:

Year 1

Year 2

Year 3

Home

220000

220000

220000

Car

25000

25000

50000

Investments

40000

50000

65000

Bank Account

3000

7000

10000

Total Assets

288000

302000

345000

Home Loan

200000

150000

100000

Auto Loan

20000

0

0

Student Loan

60000

20000

0

Total Liabilities

280000

170000

100000

Salary

95000

105000

Investments

4000

5000

Inheritance

6000

0

Total Income

105000

110000

Homeloan

13200

13200

Auto loan

9600

9600

Other living

20000

22000

Wedding

4000

0

Total Expenses

46800

44800

a.

-27,800; -41,800

b.

275,800; 267,800

c.

81,800; 311,800

d.

65,800; 47,800

ANS:

     3.   Social Security contains information about an individual.  Which item below is not included in an individual's social security number?

a.

Area the person was living when the number was issued

b.

A unique serial number for a person

c.

Race

d.

Group number

ANS:

A: A is included in a social security number.

B: B is included in a social security number.

D: D is included in a social security number.

     4.   Searching through someone's garbage is considered a legal activity when:

a.

the trash is more than 14 days old

b.

the trash is in the person's possession

c.

the trash has left the person's home or sidewalk

d.

Stealing a person's trash is never considered a legal activity.

ANS:

     5.   Income from known sources subtracted from total income gives a reasonable estimate of:

a.

Unknown funds

b.

Liabilities

c.

Living Expenses

d.

Net Worth

ANS:

     6.   During an interview with Heidi Royce, she confessed to accepting $64,500 in kickbacks from a key supplier over the last 6 months.  Heidi’s income for the year was $48,000 and her living expenses totaled $94,500 due mainly to medical costs of $40,000.  She has a current net worth of $20,000.  What was her (increase/decrease) in net worth?

a.

$6,500

b.

$2,000

c.

$71,000

d.

$9,500

ANS:

     7.   What is the purpose of the net worth calculation in fraud?

a.

It is used to determine the extent of stolen funds

b.

It is used to determine how much money can be stolen without causing a company to go bankrupt.

c.

It is used to help locate fraudulent asset accounts

d.

All of the above

ANS:

     8.   Which of the following is not one of the credit reporting agencies used to check identity theft?

a.

Experian

b.

Equifax

c.

Transunion

d.

Proquest

ANS:

     9.   ________ is both a federal and state source of information.

a.

Secretary of state

b.

Bureau of prisons

c.

Department of defense

d.

Permit departments

ANS:

   10.   Which of the following is not a needed component for computing a person's Net Worth?

a.

Parent's financial status

b.

Prior year's net worth

c.

Funds from known sources

d.

Net worth increase

ANS:

   11.   Which of the following is not a type of information that can be obtained from the County Land Office and Tax Assessor's Office?

a.

Real Estate that has been purchased

b.

Automobile registration

c.

Property's current assessed value

d.

Liens removed

ANS:

B: This would be available from the DMV

   12.   All of the following federal agencies maintain information that can help fraud investigations except which?

a.

ATF

b.

Social Security Administration

c.

Department of Justice

d.

Postal Service

ANS:

   13.   Which of the following agencies is generally the least productive in a records search?

a.

Searching Local agencies

b.

Searching County agencies

c.

Searching State agencies

d.

Searching Federal agencies

ANS:

   14.   Which of the following is not a federal source of information?

a.

Secretary of State

b.

CIA

c.

Bureau of Prisons

d.

FBI

ANS:

   15.   Evidence gathered from searching through someone's trash:

a.

Can help identify concealment attempts

b.

Can help to determine how a perpetrator is spending stolen money

c.

Can help understand how a perpetrator is stealing money

d.

All of the above are true

ANS:

A: Because b and c are also correct

B: Because a and c are also correct

C: Because a and b are also correct

   16.   Net worth calculations do all of the following except:

a.

Determine Net worth

b.

Determine funds from unknown sources

c.

Determine where fraudulent monies are hidden

d.

Determine a person's Net Worth Increase

ANS:

   17.   Which of the following statements is false regarding the net worth method?

a.

The net worth method generally understates amounts stolen.

b.

Much of the information necessary for determining an individual's assets, liabilities, living expenses, and income is available through public records.

c.

Courts are generally suspicious of dollar amounts determined by the net worth method because courts realize that the net worth method can only provide approximations of the amount stolen.

d.

The net worth method is useful for obtaining confessions from suspects during interviews or interrogations.

ANS:

   18.   Which of the following is not a good reason for involving postal inspectors in a fraud investigation?

a.

Postal inspectors share jurisdiction with other federal, state, and local agencies.

b.

Postal inspectors work for the prosecution of offenders who violate postal laws.

c.

Postal inspectors have access to an individual’s past and current addresses.

d.

Postal inspectors work to protect citizens from loss through theft that uses the mail system.

ANS:

   19.   Mandy calls a local newspaper and pretends to be a neighbor who is away for the winter.  She obtains account history and orders newspaper service for six months.  Has Mandy committed fraud?

a.

No.  The newspaper has not yet been delivered nor paid.

b.

Yes.  She is in violation of the Gramm-Leach Bliley Act of 1999.

c.

No.  Her neighbor can obtain all of the newspapers when they return next spring.

d.

Yes.  She has engaged in mail fraud, Title 18, U.S. Code Section 1344.

ANS:

   20.   You are investigating a fraud in which you suspect that one of your suppliers from another state has been giving bribes and kickbacks to your purchasing agent in exchange for a lucrative, exclusive contract.  Which of the following agencies/individuals would be the most helpful in investigating this fraud?

a.

The FBI because they have national jurisdiction and can investigate and prosecute violators from a different state.

b.

The state attorney general for the supplier’s state because they are responsible for enforcing all state civil and criminal laws.

c.

Postal inspectors because the bribes and kickbacks were most likely made through the mail system; therefore, federal mail statutes apply.

d.

The IRS because your purchasing agent is not too bright and probably reported the bribes and kickbacks as income on his tax returns.

ANS:

   21.   Which of the following is false?

a.

Rarely do perpetrators save what they steal.

b.

Conversion searches are performed to find out more about a suspect's life

c.

Conversion searches are performed to gather evidence to be used in interrogations.

d.

Public records searches are preferred to uncover concealment attempts.

ANS:

.

   22.   To find marital and voting records, one would need to look at:

a.

The state attorney general's office

b.

The social security administration office

c.

The county clerk's office

d.

The local courts office

ANS:

   23.   Funds from unknown sources equals:

a.

Assets - Liabilities.

b.

Net Worth Increase + Living Expenses.

c.

Income - Funds from Known Sources.

d.

Net Worth - Prior Year's Net Worth.

ANS:

   24.   The Gramm-Leach Bliley Act stipulates the following:

a.

Trash that has not left the possession of a person may not be legally searched.

b.

Credit information about an individual that is furnished to a third party must also be made available to that individual.

c.

Banks may share customers' financial information with others.

d.

None of the above.

ANS:

   25.   Where can a fraud investigator search for public information without a search warrant?

a.

County and local records

b.

Federal and State records

c.

Financial institution records

d.

Internal Revenue Service records

ANS:

   26.   The Gramm-Leach Bliley Act prohibits

a.

Telemarketers selling information to corporations

b.

The use of false pretenses to access the personal information of others

c.

Public access to FBI criminal database

d.

None of the Above

ANS:

   27.   What will perpetrators of fraud almost universally do with their stolen funds?

a.

Invest the stolen funds

b.

Save the funds for emergency retirement, etc.

c.

Spend them

d.

Return them

ANS:

   28.   To effectively conduct conversion investigations, a fraud examiner must thoroughly understand all of the following except:

a.

How to search federal, state, local and other records for information.

b.

The types of information available from federal, state, and local searches.

c.

The net worth method of spending and analyzing spending information.

d.

The different types of audits that can be conducted

ANS:

   29.   In calculating the net worth method, you should do the following:

a.

find net worth, find the net worth increase, find Income, find the funds from unknown sources

b.

find net worth, find the net worth decrease, find income, find the funds from known sources

c.

find net worth, find the net worth decrease, find Income, find the funds from unknown sources

d.

find net worth, find the net worth increase, find Income, find the funds from known sources

ANS:

   30.   Which government agency would provide information that is most useful detecting "dummy doctors"?

a.

Department of business regulation

b.

Secretary of state

c.

Postal service

d.

County clerk

ANS:

   31.   Public information can be gathered from which of the following sources?

a.

State government

b.

County and local government

c.

Federal government

d.

All of the above

ANS:

   32.   After 1999, how could you obtain information from a financial institution?

a.

Court Subpoena

b.

Search warrants

c.

False pretenses

d.

Both a and b

ANS:

   33.   True or false: Federal records are usually more useful than state and local records when investigating fraud.

a.

True

b.

False

ANS:

   34.   Lexis-Nexis and Dun & Bradstreet are examples of:

a.

Law firms that specialize in fraud prosecution

b.

Publicly available databases

c.

Companies that have committed fraud in the past

d.

Names of legislative bills regarding fraud

ANS:

   35.   What are the three major credit reporting agencies?

a.

Experian, Equifax, and TransUnion

b.

Providian, Equifax, and TransUnion

c.

Providian, FairIsaac, and Experian

d.

TransUnion, FairIsaac, and Providian

ANS:

   36.   The ____________ contains information on individuals who may be a threat to national security.

a.

Department of justice

b.

Bureau of prisons

c.

Department of defense

d.

Secret service

ANS:

   37.   The CIA is responsible to investigate matters:

a.

Inside the United States

b.

Outside the United States

c.

Dealing with the President of the United States

d.

All of the above

ANS:

   38.   One of the agencies included in the Department of Justice is the:

a.

FBI

b.

Secret Service

c.

CIA

d.

Bureau of Prisons

ANS:

   39.   Which of the following is/are not federal sources of information?

a.

Central Intelligence Agency

b.

Social Security Administration

c.

Postal Service

d.

Department of Motor Vehicles

e.

All of the above are federal sources of information

ANS:

   40.   All of the following information can be obtained from an Internet search, except:

a.

Criminal records

b.

How many traffic tickets a person has

c.

Birth records

d.

A perpetrator’s purchase of expensive jewelry

ANS:

.

   41.   Why is the net worth method advantageous?

a.

It is conservative

b.

It can be used in court

c.

It can help calculate all amounts embezzled

d.

Both A and B

ANS:

   42.   Which of the following would provide the best information regarding the FBI?

a.

The Bureau of Prisons

b.

The Department of Justice

c.

The Department of Vital Statistics

d.

The Attorney General

ANS:

   43.   True or false: A net worth calculation usually yields a conservative estimate of stolen funds that is readily accepted as evidence in court.

a.

True

b.

False

ANS:

   44.   Under the "Net Worth Method", a person who has an increase in net worth of $100,000, known income of $80,000, and a salary of $60,000, would have unknown income of

a.

$0

b.

$10,000

c.

$20,000

d.

$40,000

ANS:

   45.   The Gramm-Leach Bliley Act allows all of the following except:

a.

Banks to sell customer information

b.

Individuals to gather information under false pretenses.

c.

Companies to share customer information even if the customer has "opted out".

d.

Financial Institutions to share personal information with law enforcement agencies

ANS:

   46.   Which of the following is an example of a state source of information?

a.

Social Security Administration.

b.

Utility records.

c.

Department of Motor Vehicles.

d.

Permit departments.

ANS:

   47.   The Bureau of Prisons records are available under

a.

Federal sources of information

b.

State sources of information

c.

Both of the above

d.

None of the above

ANS:

   48.   Which of the following government agencies does not typically use the net worth method to detect fraud?

a.

Internal Revenue Service

b.

Federal Bureau of Investigation

c.

Social Security Administration

d.

Drug Enforcement Agency

ANS:

   49.   When investigating conversion the ‘financial footprints’ that fraud investigators are looking for are?

a.

Purchase of assets

b.

Changes in lifestyles

c.

Changes in net worth

d.

All of the above

ANS:

   50.   The Net-Worth Method:

a.

Is a conservative method and is, therefore, typically accepted as evidence in court

b.

Is used in every fraud case

c.

Is useful evidence for court but does not help in the interrogation process.

d.

Both a and b

e.

Both a and c

ANS:

   51.   Which of the following is a true disadvantage of using the net worth method?

a.

the amounts are not readily accepted as evidence by courts

b.

it rarely facilitates the obtaining of a confession

c.

it is widely used by the DEA, FBI, and IRS

d.

embezzlers typically spend their money on luxuries that are difficult to track

ANS:

   52.   Which of the following is the correct method of applying the net worth method

a.

Assets – liabilities – prior year’s net worth – living expenses + funds from known sources = Funds from Unknown sources

b.

Assets – Liabilities + prior year’s net worth + living expenses – funds from known sources = Funds from Unknown sources

c.

Assets – liabilities – prior year’s net worth + living expenses – funds from known sources = Funds from Unknown sources

d.

Net Worth – prior year’s net worth + Assets + living expenses – funds from known sources = Funds from Unknown sources

ANS:

   53.   Which of the following frauds would conversion investigation methods be most effective in uncovering?

a.

Kickback schemes

b.

Revenue fraud schemes

c.

Underrecording of accounts payable

d.

Payroll schemes

ANS:

   54.   Which of the following statements are true:

             I.         The amounts determined to be stolen using the net worth method are            usually readily accepted as evidence by courts.

            II.        Net worth calculations tend to give a conservative estimate of stolen                 funds.

a.

I only

b.

II only

c.

Both I and II

d.

Neither I or II

ANS:

   55.   The net worth method for determining amounts embezzled is not regularly used by:

a.

The Federal Executive Board

b.

The Drug Enforcement Administration

c.

The Federal Bureau of Investigation

d.

The Internal Revenue Service

ANS:

   56.   Why do most fraud perpetrators initiate fraudulent activity?

a.

To increase their savings account

b.

To meet a perceived critical need

c.

To improve their lifestyle

d.

All of the above

ANS:

   57.   Because the use of ________ is so common in frauds, the ­­­­_________ can be a fraud investigators most important ally.

a.

mail, Postal Service

b.

tax returns, Internal Revenue Service

c.

narcotics, Drug Enforcement Administration

d.

fake social security numbers, Social Security Administration

ANS:

   58.   The ­­­__________ is a database that contains arrest and criminal records on a nationwide basis.

a.

National Crime Information Center

b.

Interstate Identification Index

c.

National Prison Bureau Database

d.

None of the above

ANS:

   59.   The Secret Service performs all of the following functions except:

a.

Protects the president of the United States

b.

Investigates counterfeiting

c.

Investigates theft of government checks

d.

Investigates charges of treason

e.

The Secret Service performs all of the above functions

ANS:

   60.   UCC records can identify all of the following except:

a.

Collateral on purchased assets

b.

The nature of the lending company

c.

Where a person banks

d.

Whether a person has a need for money

e.

UCC records cann identify all of the above

ANS:

   61.   A fraud investigator would have the least amount of difficulty obtaining the _________ of a suspect.

a.

Tax returns

b.

Military records

c.

Birth records

d.

Social security number

ANS:

Show more
  • @
  • 165 orders completed
ANSWER

Tutor has posted answer for $50.00. See answer's preview

$50.00

******* 9Conversion ************* ***************** ******** * ***** of the ********* types of *********** do ****** reporting ******** *** ********************* ** ******* *** former ***************** *********** **** ** ******* ********* items ********* *** ****** **************** *********** **** as ******** ********** by *** sex and ****** *************** *********** such ** ********* *** ****** ************** ********* agencies maintain *** ** the above information  ANS: ED: ****** ********* ******** ******** *** ** the ****** information  2 Using *** **** ***** the ****** **** unknown sources *** **** * *** * ************ are: Year ***** 2Year 3Home220000220000220000Car250002500050000Investments400005000065000Bank ************************* ************************************ ************************** Loan2000000Student ******************** **************************************************************************************************** **************************************************** loan 96009600Other ************************************* **************************** ************** ************* ************* ************* *** *********** * Social ******** ******** *********** ***** an ********** ***** **** below is *** included ** an ************ ****** ******** ************ the person *** ****** **** *** ****** was ******** ****** serial ****** *** a ***************** number  ANS: *** * ** ******** ** a ****** security ******** * ** ******** in * ****** ******** ******** ********* * ** included ** * ****** security ******** * Searching through ********* ******* is ********** * ***** ******** ********* ***** ** **** **** 14 days oldbthe trash ** ** *** person's ************** trash *** **** the ******** home or sidewalkdStealing * ******** ***** ** ***** ********** * ***** activity  ANS: *** ********** ***** is no **** *********** ****** ******** ******* * ***** activityB: ********** ********* ***** ***** it ** ** ********** ** *** ******* is against *** ***** ********* *********** * ****** **** ***** ******* ********** from ***** ****** ***** * ********** ******** *********** ************************ ExpensesdNet Worth  ANS: *** Correct  * ****** an ********* with Heidi ***** she ********* ** accepting $64500 ** ********* from * *** ******** **** the **** * months ********* income *** *** year *** ****** *** her ****** expenses totaled ****** due ****** ** medical ***** of ****** *** *** * ******* *** ***** of $20000 What *** her ******************* ** *** *************************************** *** Correct  * **** ** *** ******* of *** net worth *********** ** ********* is **** to ********* *** ****** ** ****** ******** is **** ** determine how **** money can be stolen ******* ******* a company to go *********** ** **** ** **** locate ********** ***** accountsdAll ** *** ************* *** Answer: *** ** ******* *** *** ***** *********** ********** the ****** ** ****** ***** ** analyzing * person's ****** liabilities ****** expenses *** ****** ******* *** *** *** are ********* ******* **** are false ************ * Which ** *** ********* is *** *** ** *** credit ********* ******** **** to ***** ******** theft?aExperianbEquifaxcTransuniondProquest  ANS: *** *********** are *** *** ***** ****** ********* ********** 9 ******** ** **** a ******* *** ***** source ** ********************* ** statebBureau ** ****************** ** defensedPermit departments  ANS: *** ********* ** ***** of *** ********* is *** * ****** component *** ********* * ******** *** Worth?aParent's financial ************ year's *** worthcFunds from known sourcesdNet ***** **************** AA: *** ********* status ** *** ******* ** not ******* ****** the ******* **** given money ** the ********* 11 ***** ** *** following is *** a **** of information **** *** ** obtained **** *** ****** **** ****** and *** Assessor's Office?aReal ****** **** *** been ******************** registrationcProperty's current ******** *********** *************** *** **** ***** be available **** the ***** ** All ** the ********* ******* ******** ******** information **** can **** ***** investigations ****** ***************** Security ************************* ** ************** *************** *** ********* 13 ***** ** *** ********* ******** ** generally *** ***** ********** ** * ******* ***************** ***** ****************** ****** agenciescSearching State ****************** ******* **************** *** ********* ***** ******** is generally *** most ********** ******** County agency ** **** another name *** local agencyC: ***** agencies **** **** *********** than federal ********** ********* ** ***** of the ********* ** not * federal ****** ** ********************** ** **************** ** ******************* AA: A ** ******* This ** * ***** ****** ****** ** ****** **** * ******* one ** meB: * ** incorrect ******* ** is a ******* ******** C ** ********* because ***** it *** ** * state ****** of *********** ** ** **** ****** ** a ******* levelD: D ** incorrect ******* ** *** F It is * federal ******** ** ******** ******** **** ********* ******* someone's ********** **** ******** *********** attemptsbCan **** to determine how * *********** is ******** stolen ********* **** ********** *** * *********** is stealing moneydAll of *** above *** ************ DA: Because * *** c are **** ********* ******* * *** * *** **** correctC: ******* * *** * *** **** ********* 16 *** ***** ************ do *** ** the ********* ***************** *** worthbDetermine funds from ******* sourcescDetermine ***** ********** monies *** **************** * ******** *** ***** **************** CA: ********** **** ** * **** *********** ********** **** is * **** *********** CorrectD: ********** **** ** * **** *********** 17 ***** of the ********* ********** ** ***** regarding the net ***** *********** *** ***** method generally understates ******* stolenbMuch of *** *********** ********* *** *********** ** ************ ****** *********** ****** ******** *** income ** ********* ******* ****** ************** *** ********* ********** of dollar ******* ********** ** *** *** ***** ****** ******* ****** ******* that *** *** ***** method *** **** ******* ************** ** *** ****** ********** net ***** method ** ****** *** ********* *********** from suspects during interviews ** interrogations  ANS: CC: Courts ******* ****** *** *** worth method's *********** of *** ****** stolen ******* ** ** a ************ ******** the other ********** *** ****** ** ***** ** *** ********* is not a good reason for ********* ****** inspectors ** * fraud ********************* ********** ***** ************ with ***** federal ***** *** ***** *************** inspectors **** for *** *********** ** ********* *** ******* ****** lawscPostal ********** **** ****** ** ** ************** **** and current addressesdPostal ********** **** ** ******* ******** **** **** through theft **** **** *** **** ************** *** ********** **** ** * **** *********** Incorrect; **** ** * true statementC: CorrectD: ********** **** is * true *********** 19 ***** ***** a ***** newspaper *** ******** ** be a ******** who ** **** *** *** ****** *** ******* ******* ******* and orders ********* ******* *** *** months Has ***** ********* fraud?aNo *** ********* *** *** yet **** delivered *** paidbYes *** ** ** ********* ** the Gramm-Leach Bliley *** ** ******* *** ******** *** ****** *** ** the newspapers **** they return next ********** *** has engaged ** **** fraud Title ** ** **** ******* ************ *** ** *** has acted ** the ********* ** **** ***** ***** ** ** ********* ** *** ********** bliley *** of **** ******* *** **** ***** pretenses ** ****** ******** information of ******** ** *** *** ************* a ***** ** ***** *** ******* that *** ** **** suppliers from ******* ***** *** **** ****** bribes and ********* ** **** ********** ***** ** exchange *** * lucrative ********* ******** ***** ** *** following ******************** ***** ** *** most ******* ** ************* this ********** *** ******* **** **** national ************ *** can *********** *** ********* ********* **** * ********* ********* ***** ******** general *** *** ************ state ******* **** are *********** for enforcing *** state civil *** criminal *********** ********** ******* *** ****** *** ********* **** **** likely **** ******* the **** ******* ********* ******* mail ******** applydThe IRS because **** ********** ***** ** not *** ****** *** ******** reported *** bribes *** kickbacks ** ****** ** his *** returns  ANS: *** ********* 21 ***** ** *** ********* ** ************* ** ************ **** **** **** stealbConversion ******** *** ********* ** find *** **** ***** a suspect's *************** ******** *** performed ** ****** evidence ** ** used in ********************* ******* searches *** preferred ** ******* *********** **************** DA: **** *********** True *********** **** *********** ****** records ******** *** ********* ** focus on the ********** ******* ** *** perpetrators ***** ***** *** gotten ******* ** ** **** marital *** ****** ******* one ***** **** to **** at:aThe ***** attorney ********* ********** social security administration ********** ****** ******* ********** ***** ****** office  ANS: *** A is ********* ******* **** ****** ******** records ******** ** individuals *** **** **** convicted of * ****** ** state civil *** criminal lawsB: * ** incorrect because **** office has *********** ***** ************ ****** security numbers *** social security ****** ***** *** ***** *** *********** *** ******** **** *** ****** *** issuedC: * ** correctD: * is ********* ******* the ***** ****** maintain ******* on **** *** ********* *** ********* *********** **** as personal history ********** ******* ******** and physical *********** ***** ******* divorces *** property ********** ********** ******** ****** ******** financial ****** *** ********** fraud ****** *** *************** bankruptcies ***** and ********** ** ***** **** ******* sources equals:aAssets * LiabilitiesbNet Worth Increase * Living ExpensescIncome - ***** from ***** *********** ***** * ***** Year's *** Worth  ANS: *** Correct  ** *** Gramm-Leach Bliley *** ********** the **************** **** has *** left the ********** ** * ****** *** *** be ******* searchedbCredit *********** ***** ** ********** that is ********* to * third ***** **** **** be made ********* ** that individualcBanks *** ***** ********** ********* *********** **** othersdNone ** the ************* *** ********* * ********* * ******* **** the **** does not ****** ********* B ********* *** **** Credit Reporting *** ** ****** ********* *********** ** ***** *** a fraud ************ ****** *** public *********** without * search *************** and ***** recordsbFederal and ***** ***************** *********** **************** Revenue ******* *************** *** ******** *** *** ******* *** *** ****** *********** *** ******* ******* ** ***** ******* ** *** *********** Bliley Act *********************** ******* information ** **************** use of ***** ********* to ****** *** ******** *********** of ************* ****** to *** ******** ************* ** *** Above  ANS: *** Correct  ** What **** perpetrators of ***** ****** universally do **** ***** ****** ************* *** ****** ********** *** funds *** ********* retirement ********* themdReturn them  ANS: *** Correct  28 ** *********** conduct ********** ************** a ***** examiner **** ********** understand all ** *** following *********** ** search federal ***** ***** *** ***** records *** informationbThe ***** ** *********** ********* **** ******* ***** and ***** ************ *** ***** method ** ******** *** ********* spending informationdThe ********* ***** of ****** that can ** ***************** DA: ********** **** *********** ********** **** *********** ********** **** *********** ******** ****** ******* **** **** **** *** *********** ******* of * fraud  ** ** *********** the *** ***** ****** *** should ** *** following:afind *** ***** **** the *** ***** ******** find ****** find *** ***** from ******* ************ *** ***** find *** *** ***** decrease **** ****** **** *** funds **** ***** ************ net worth **** the *** worth ******** **** ****** **** *** ***** **** ******* ************ *** ***** **** *** net ***** increase **** ****** find *** funds from ***** *************** *** ***** want to **** *** net ***** ******** **** *** prior **** to ********* **** ****** *** this year finding *** *** ***** decrease ***** **** ********* *** ** it is ***** ******** didn't **** ***** ***** want to find the ***** from unknown ******* *** already **** the funds from ***** ******* **** ****** ** * given *** ****** **** ** **** *** ***** **** unknown ********* You **** to **** the *** ***** ******** over *** ***** **** ** ********* **** income *** **** **** ******* the *** ***** ******** isn't **** ********* and ** ** is fraud ******** ****** **** ******* *** **** ** **** the ***** from ******* ******* you already **** *** ***** **** ***** sources **** number is a given you ****** **** to **** *** ***** from ******* ********* ** ***** government agency would provide information that is most ****** detecting ****** ******************** ** ******** ******************** ** ************ ************** clerk  ANS: *** ********* ********* because ********* ** ***** ********* *** types ** ******* ******** to ********** *** *** filings but *** ********* *********** ***** ******* *************** ********* because ***** ** ** licensing *********** *** ** ******* ********* **** reason ** *** ** ****** *********** *** ** ******** **** ***** ** *** ********* ************** ***************** *** ***** ****************** ************** ** the above  ANS: *** ******* * *** c *** **** ********* ******* * *** * *** **** ********* ******* * *** * *** **** ********* *********** can ** ******** from *** levels of ************ ** ***** **** *** could *** obtain *********** from * ********* institution?aCourt *************** ************** pretensesdBoth * *** ********* DA: ********* ******* **** * *** * *** correctB: ********* **** reason as *** ********* ******* ***** ***** ********* ** ******* ***** *** *** *********** ****** ActD: ********* ** **** or ****** Federal ******* *** usually **** useful **** ***** *** ***** records when ************* ************************ BB: ******** ****** *** ********** ******** ******* ******* *********** property ******* prison records ******* *** bankruptcy proceedings ***** ** *********** and *** ***** ********** are ******** of:aLaw ***** **** ********** in ***** ******************** available databasescCompanies **** have ********* ***** ** the pastdNames of *********** ***** ********* ************* BB: ********* 35 What *** *** ***** major credit reporting agencies?aExperian ******* *** ******************** ******* *** ******************** ********* and ******************* ********* *** ***************** AA: ********* ** *** ____________ ******** *********** on *********** who may ** * threat ** ******** securityaDepartment ** justicebBureau ** ****************** ** defensedSecret *************** *** ********* 37 *** CIA ** *********** ** investigate *************** the ****** ************** the ****** StatescDealing **** *** President of *** ****** ********** ** the ************* *** ********** ******* **** ** the duty of *** ***** ******* they ** **** ************** ******* the **** 38 One ** *** ******** ******** ** *** Department ** ******* ** *************** ****************** ** *************** *** The ****** ******* ** *** own federal agencyC: The *** ** *********** to *** ********* of *** ****** ******** *** ****** ** prisons ** *** *** federal ******** ** Which ** *** ********* ****** not ******* ******* of information?aCentral ************ ************* ******** ********************* ****************** ** Motor ************ ** the ***** *** ******* ******* ** ******************* *** A ** incorrect ******* the *** is *********** to *** ********* of *** United ****** It ************ ******** ******* outside *** ****** States and ** is * ******* ****** ** ************* * is ********* ******* the social ******** administration *** *********** ***** individuals' ****** ******** ******* and ** run ** * federal ******* * ** incorrect ******* *** ****** ******* ** run on *** federal level ****** ** * ******* ****** of *********** ** ** *********** *** *** *** ** **** *** for protecting citizens **** **** ******* ***** **** **** *** mail systemD: D ** correctE: E ** ********* ******* D ** ********* ** *** of *** ********* *********** *** ** ******** **** an ******** ****** **************** *********** **** ******* ******* a ****** ********* ********* perpetrator’s purchase ** expensive jewelry  ANS: *** ******** ****** *** ** located ******* the ********** An ************ traffic ****** *** ** ******** ******* the ********** Birth records *** ** ******** ******* *** ********** **** *********** ***** ******* *** be *********** 41 Why ** *** net ***** ****** **************** ** *************** *** ** **** in ******** *** **** calculate *** ******* ************** * *** B  ANS: *** * is incorrect ******* ***** ** ****** b ** be **** ** *** ** ****** ** ** *** ************** B ** correctC: * is ********* because it ****** ** **** *** ********* **** ** * ************** D ** ********* because * ** incorrect  ** ***** ** *** following ***** ******* *** best *********** ********* *** ******** Bureau ** *********** ********** ** *********** ********** of ***** ************** Attorney General  ANS: *** **** ** a ***** ****** ** ************* ********* This is * ***** ****** ** ************* **** ** a ***** ****** ** ************* ** True ** false: * *** worth calculation usually ****** * ************ ******** ** stolen ***** that ** ******* accepted ** ******** ** ************************ *** Correct: ***** **** ********* ** *********** *** expenditures ********** **** and ******** ******** **** ******* *** *** ***** calculation ***** ************** ****** expenses *** therefore ************** ****** **** ******* ********* ** ***** *** **** Worth ******* a ****** who has ** ******** in *** worth ** $100000 ***** income of ****** and * ****** ** $60000 ***** **** ******* income ofa$0b$10000c$20000d$40000  ANS: *** ********* - *** ****** *** ******* ****** ** ****** *** **** ********* * **** answer ** ************** impossible **** the ******* ********* ******* - ******* minus ****** ****** ****** *** ****** ** not ******** **** *** ******** since ** ** **** * part ** ***** incomeD: ********* * This ****** **** accounts for $60000 of ***** ****** and *** *** **** ******** ** *** *********** ****** *** ****** all ** *** following ************* ** sell ******** *********************** ** ****** information ***** false pretensescCompanies ** ***** customer information **** ** *** ******** has "opted ************** ************ ** share ******** *********** **** *** enforcement agencies  ANS: *** ********** This ** * **** *********** ******** *** law ********* using ******** ** ****** informationC: ********** **** is * true *********** ********** **** has ****** been ****** ** ***** of *** ********* is ** ******* of * ***** ****** ** ******************* ******** ********************** ****************** of ***** VehiclesdPermit ******************* CA: This ** ** ******* ** * federal ****** ** ************* **** is * ******* ****** ** ************* This ** ******* a ****** or ***** ******** ** The ****** ** Prisons ******* *** available underaFederal sources of informationbState ******* ** **************** of *** ********** of *** ************* CA: Incorrect - **** ****** is correct *** c is **** ******* ***** * is **** ********* ********* * **** ****** ** correct *** * ** **** ******* ***** * ** **** correctC: ******* * **** * *** * *** correctD: ********* - **** * *** * *** correct  ** Which of *** ********* government agencies **** not ********* use *** *** worth ****** ** ****** *************** ******* *************** ****** ** ******************** ******** ******************* *********** ************** *** The *** ******** **** *** *** ***** ****** more **** *** ***** agencyB: *** *** **** **** the net ***** methodC: *** *** does *** ******* use *** net ***** methodD: The DEA utilizes *** *** ***** ******** 49 **** ************* ********** the ************ ************* **** ***** investigators *** looking *** ************* ** assetsbChanges ** ****************** ** *** ********* ** *** ************* *** *** ** the above *** ********* ** *** ********* ********** * ************ method and ** ********* typically ******** ** ******** ** ******** used ** every ***** casecIs useful ******** for court *** **** not help in *** interrogation ************ a *** ****** * *** ********* *** ********* ********** *** net-worth ****** ** *** **** ** ***** fraud caseC: ********** *** ********* ****** *** ** very useful in *** ************* ********* 51 ***** ** the ********* ** a true ************ ** using *** net worth *********** amounts are not ******* ******** ** evidence ** ********* rarely facilitates *** ********* ** * ************* ** ****** used ** *** *** FBI and IRSdembezzlers ********* spend ***** money on luxuries **** *** ********* ** ************* *** Correct  52 ***** ** *** ********* ** the ******* ****** ** ******** the *** ***** ************* *** liabilities *** ***** ******** *** ***** *** ****** ******** + ***** **** known sources = Funds **** Unknown ************** – *********** + prior year’s net ***** * ****** ******** – funds **** ***** ******* * ***** **** ******* sourcescAssets – *********** *** prior ******** net ***** * living ******** *** ***** **** known sources * ***** **** ******* sourcesdNet ***** – ***** ******** *** worth + ****** * ****** ******** *** ***** from ***** ******* * Funds **** Unknown *************** *** Correct  ** ***** ** *** ********* ****** would ********** ************* ******* ** **** ********* ** ******************** *************** ***** ********************** of ******** *************** *************** *** ******** Certain ****** such as ******** ******* ** *** ******** ********** ******* ******* and investigating *** ***** *** *********** ******** ** some ****** ** for practical purposes ************ 54 ***** ** *** ********* statements are true: I *** amounts ********** ** ** ****** using the net ***** ****** are usually ******* ******** ** ******** by ****** ** Net worth calculations **** to **** * conservative estimate ** stolen ******* ******* ********* * *** IIdNeither * ** ********** *** Correct  ** *** *** ***** method for determining ******* ********* ** *** ********* used ******* ******* Executive ********* Drug *********** AdministrationcThe ******* ****** ** ***************** Internal ******* *************** *** ******** *** ******** lists *** *** other ************ ******** *** ******* ********* ***** ** * ***** used to ********** ***** ********** of ******* departments ** ***** such as recruiting personal policies *** ********* ********** *** *** not ********* ** *** ****** ** *** ** **** ***** ************ initiate ********** activity? aTo ******** ***** ******* ********** **** * ********* ******** ******* ******* their lifestyledAll ** the *********** *** *********** Correct; **** ****** initially commit ***** ** meet a ********* ******** need *** ******** *** fraud *** ******* other ********* IncorrectD: *********** 57 Because *** *** ** ________ ** ** ****** in ****** the ­­­­_________ *** be * ***** investigators **** ********* ally amail ****** Servicebtax returns ******** ******* ***************** Drug *********** ******************* social security ******* ****** ******** Administration ANS: *** ********* 58 The **************** ** * ******** that ******** ****** *** ******** records on * ********** ************** Crime *********** ***************** ************** ************** ****** ****** ************* of the *********** *** ********** *** NCIC ******** *********** ** ****** ******** ******* ****** securities ***** *** ******* ****** and missing firearms; ******* ******** *** *********** *** *** ********* ****** ** *********** ********** ********* *********** Incorrect  59 The ****** ******* ******** *** ** *** ********* ********* **************** the ********* of the ****** StatesbInvestigates counterfeitingcInvestigates ***** of government ******************* ******* ** *********** ****** ******* ******** *** ** *** ***** *************** *** ********** **** ** * **** *********** Incorrect; **** is * **** statementC: Incorrect; this ** * **** statementD: ********* *********** 60 *** ******* can ******** *** of *** ********* ****************** ** ********* assetsbThe nature of *** lending companycWhere * person banksdWhether a ****** *** * **** *** moneyeUCC ******* **** ******** *** ** *** *********** *** ********* ** * fraud investigator would **** the least ****** ** ********** ********* the ********* ** * suspectaTax **************** recordscBirth recordsdSocial ******** ************ BB: ******** ******** records are *** **************

Click here to download attached files: Answer key .doc
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question