Read the passage and mark the letter A, B, C or D on your answer sheet to indicate the best answer to each of the following questions from 7...
Đề bài
Read the passage and mark the letter A, B, C or D on your answer sheet to indicate the best answer to each of the following questions from 7 to 16.
Invoice fraud thrives where routine trust lives. Criminals compromise or convincingly impersonate a supplier’s email, then substitute bank coordinates on familiar invoices; dutiful customers, presuming continuity, remit funds into mule accounts. [I] Because confirmations are rarely sought via an independent channel, the deception can persist across billing cycles, multiplying losses. If due diligence is skipped, restitution is unlikely, as payments are laundered rapidly and beneficial ownership is obscured once money is dispersed through nested accounts.
Phishing arrives as persuasive ordinariness: polished logos, urgent tones, and spurious login portals that harvest credentials or plant malware. Messages purporting to be banks, parcel couriers, or tax offices exploit trust heuristics and fatigue. They often weaponise attachments and shortened links to obfuscate destinations. [II] Should a victim comply, accounts may be seized, secondary authentication reset, and identity fragments collated for later abuse. Even wary users can be caught if they rush; verification rituals – hovering, cross-checking domains, calling back – work precisely because they slow decisions.
Remote-access ruses enlist false authority: a “technician” rings to remediate a fabricated error, then shepherds the target toward screen-sharing tools. If a caller demands immediate access to “fix” an issue you did not report, the safest course is to refuse and terminate the contact. Once privileged control is granted, keystrokes, wallets, and backups become searchable, while coercive follow-ups – sometimes invoking police or tax threats – extract further payment. [III] Where systems are encrypted or settings sabotaged, recovery is costly, and shame often delays reporting.
Romance impostors and get-rich evangelists cultivate intimacy, then migrate off public platforms to “safer” spaces. On these channels, emotional reciprocity and time-pressure converge: gifts or crypto “opportunities” are urged as proofs of commitment, allegedly fleeting. [IV] Profiles are stolen or fabricated; windfalls are promised, withdrawals “pending”. If skepticism surfaces, manipulation escalates – gaslighting, isolation, sometimes menacing hints – until the target either pays or blocks. Detachment tactics work: slow the cadence, verify images, and insist on independent financial advice before any transfer.
(Adapted from https://www.cyber.gov.au/learn-basics/watch-out-threats/types-scams)
Question 7. The word spurious in paragraph 2 mostly means ______.
A. loosely credible B. openly persuasive
C. deceptively fake D. mildly authentic
Question 8. Where in the passage does the following sentence best fit?
Such deception often succeeds because victims rarely confirm altered bank details via a separate, trusted channel.
A. [I] B. [II] C. [III] D. [IV]
Question 9. Which of the following best summarises paragraph 1?
A. Customers thoroughly audit every invoice, reporting anomalies before funds are transferred.
B. Criminals hijack vendor emails, alter invoice details, and thrive unless independent verification interrupts payments.
C. Invoice fraud is rare and easily reversed when banks act with vigilant customers.
D. Automated systems now block all altered account numbers, eliminating losses entirely.
Question 10. What is the primary lure in phishing scams?
A. Free antivirus on CDs B. Guaranteed tax refunds instantly
C. Personal visits from officials D. Seemingly legitimate, urgent messages
Question 11. According to paragraph 4, they move to private channels to ______.
A. share photos in higher resolution without public moderation or community flags
B. archive conversations securely with better encryption than mainstream social networks
C. avoid fees charged by dating platforms during extended relationship building
D. evade platform safeguards and manipulate victims more freely without oversight
Question 12. What should a user do when a “technician” requests urgent remote access?
A. Grant access briefly while recording the session to collect evidence against scammers.
B. Ask for employee ID numbers and continue until the error is demonstrated live.
C. Decline access, verify independently via official contacts, and end communication immediately.
D. Switch computers, then reconnect to isolate risk before permitting remote diagnostics.
Question 13. The phrase They in paragraph 2 refers to ______.
A. banks B. tax offices C. parcel couriers D. messages
Question 14. Which of the following can be inferred from the passage?
A. Bank reimbursement is guaranteed if invoice fraud is reported immediately after transfer.
B. Most scams cannot be prevented because verification fails even when users check independently.
C. Romance scams rarely involve money and usually avoid investment or gifting requests.
D. Cross-channel verification and delaying tactics reduce vulnerability by disrupting urgency and denying unmonitored access.
Question 15. Which of the following best paraphrases the underlined sentence in paragraph 3?
Once privileged control is granted, keystrokes, wallets, and backups become searchable, while coercive follow-ups – sometimes invoking police or tax threats – extract further payment.
A. Because privileged control blocks searches, only public files are visible and any additional payments are voluntary and threat-free.
B. Granting privileged access merely allows password resets; finances and backups remain off-limits and authorities step in to reimburse victims.
C. Once access is granted, funds are lawfully seized from wallets immediately so there is no need for follow-up demands.
D. After admin privileges are obtained, keystroke logs, digital wallets, and backups can be combed through while intimidation pressures victims to pay more.
Question 16. Which of the following best summarises the passage?
A. Across invoices, messages, calls, and relationships, scammers exploit urgency and trust; verification, slowing down, and refusing access help prevent losses.
B. Love and money seldom intersect; technology mainly accelerates relationships with minor financial risks.
C. Cryptocurrency alone is dangerous; banks should halt cross-border transfers during crime waves.
D. Government crackdowns have eliminated most scams; remaining cases reflect only individual negligence.
