Fraud and Cybercrime Investigation MCQs

Fraud and Cybercrime Investigation MCQs

These Fraud and Cybercrime Investigation multiple-choice questions and their answers will help you strengthen your grip on the subject of Fraud and Cybercrime Investigation. You can prepare for an upcoming exam or job interview with these 10 Fraud and Cybercrime Investigation MCQs.
So scroll down and start answering.

1: Catphishing involves establishing a _____ relationship with a victim for illegal or deceptive purposes.

A.   Online

B.   Offline

C.   Both

D.   None

2: Crimes that often, but not always, involve the use of a computer device in order to commit them refer to Computer Facilitated Crimes.

A.   True

B.   False

3: Cyberattacks are crimes in which a computer system is attacked; usually the intent is to _____

A.   Disable it

B.   Vandalize it

C.   Steal information from it

D.   All of these

4: Cyberbullying means Bullying behaviors that occur via the _____

A.   Internet

B.   Social media

C.   Newspaper

D.   Both a and b

5: Crimes that require the use of a _____ in order to commit them refer to Cybercrimes.

A.   Computer

B.   Electronic Device

C.   Newspaper

D.   Both a and b

6: A method used to perpetrate prescription drug fraud, which involves a person visiting multiple doctors to obtain multiple prescriptions is known as _____

A.   Doctor looting

B.   Doctor theft

C.   Doctor shopping

D.   None of these

7: A crime whereby one person steals the _____ information of another and uses it without permission is known as Identity Theft.

A.   Personal

B.   Social

C.   Relatives

D.   None of these

8: ______ usually involves former intimate partners; the offender threatens to make public compromising photos of the victim as revenge for a terminated relationship.

A.   Revenge Pornography

B.   Sextortion

C.   Spoofing

D.   None of these

A.   Sextortion

B.   Revenge Pornography

C.   Spoofing

D.   Mugging

10: _____ involves one person masquerading as another through information distortion.

A.   Spoofing

B.   Mugging

C.   Sextortion

D.   Identity theft