CHAPTER ELEVEN
“Goods and Services”:
Gambling, Loansharking, Theft, Fencing, Sex,
Trafficking in Persons, Arms, and Counterfeit Products
Test Bank
MULTIPLE CHOICE
1. According to the Task Force on Organized Crime, the core of organized crime activity is:
a. the supplying of illegal goods and services
b. violence
c. both a and b
d. none of these
ANS: A LO: 1 REF: 246
2. A(n) _________ connection is defined as members of a criminal organization extorting money from illegal entrepreneurs under a threat of violence.
a. Reciprocal
b. Entrepreneurship
c. Parasitic
d. Patron-client
ANS: C LO: 1 REF: 246
3. A(n) _______ connection is defined as members of a criminal organization requiring legitimate or illegal entrepreneurs to pay a fixed or percentage amount but in return provide services such restricting market entry, debt collection, and arbitration.
a. Reciprocal
b. Entrepreneurship
c. Parasitic
d. Patron-client
ANS: A LO: 1 REF: 246
4. A(n) ________ connection is defined as a member of a criminal organization providing an illegal good such as drugs or a service such as enforcement of restraint of trade agreements.
a. Reciprocal
b. Entrepreneurship
c. Parasitic
d. Patron-client
ANS: B LO: 1 REF: 246
5. According to Thomas Schelling, what is the business of organized crime?
a. money laundering
b. prostitution
c. gambling
d. extortion
ANS: D LO: 2 REF: 246
6. How much did the estimated amount of illegal betting increase between 1983 and 1995?
a. threefold
b. fivefold
c. sevenfold
d. tenfold
ANS: D LO: 1 | 2 REF: 251
7. Which of the following is the oldest of the major bookmaking activities?
a. sports wagering
b. dog-race wagering
c. horse-race wagering
d. political race wagering
ANS: C LO: 1 | 2 REF: 252
8. From a gross dollar volume standpoint, what type of wagering is the king of bookmaking?
a. sports wagering
b. dog-race wagering
c. horse-race wagering
d. political race wagering
ANS: A LO: 1 | 2 REF: 252
9. The net profit for the bookmaker of sports wagering is generally less than what percent?
a. 2 percent
b. 5 percent
c. 10 percent
d. 15 percent
ANS: B LO: 2 REF: 252
10. Which of the following is a network of compromised computers that infiltrates data to capture the contents of encrypted web pages and modify them in real time?
a. botnets
b. cyber-cache
c. cyber crawler
d. cyber-crime
ANS: A LO: 3 REF: 260
Reviews
There are no reviews yet.