Exam 3: Cyber Stalking, Fraud, and Abuse

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Why should a cybercrime law be specific?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

A

When using a chat room,one way to protect yourself from online harassment is ______.

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

A

First-party cookies are the less likely to violate user privacy than third party cookies.

Free
(True/False)
4.8/5
(29)
Correct Answer:
Verified

True

Which of the following is the process to try to induce someone to provide you with personal information?

(Multiple Choice)
4.9/5
(38)

Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity,who bids high drive up the price?

(Multiple Choice)
4.8/5
(34)

_____ theft and _______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception.

(Multiple Choice)
4.8/5
(36)

A file on your computer that websites use to store information about you is a _________.

(Multiple Choice)
4.8/5
(39)

Which of the following is one way to protect yourself against identity theft?

(Multiple Choice)
4.9/5
(32)

Experts consider Romania the country with the strictest cybercrime laws.

(True/False)
4.8/5
(29)

Which country is described by experts as having the strictest cybercrime laws?

(Multiple Choice)
4.9/5
(33)

One way to protect yourself on auction sites is _____________.

(Multiple Choice)
4.8/5
(31)

Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders,and then retracts the bids so people they know can get the item at a lower price?

(Multiple Choice)
5.0/5
(40)

Which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price?

(Multiple Choice)
4.9/5
(31)

One good rule that applies to online investing is "Never invest money that you cannot afford to lose."

(True/False)
4.8/5
(37)

Identity theft and identity fraud refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception.

(True/False)
4.8/5
(40)

Firefox and Internet Explorer are examples of ____________.

(Multiple Choice)
4.8/5
(35)

Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?

(Multiple Choice)
5.0/5
(33)

Which of the following involves using the Internet to harass,threaten,or intimidate another person?

(Multiple Choice)
4.9/5
(37)

Someone who uses the Internet to harass,threaten,or intimidate another person is guilty of identity theft.

(True/False)
4.8/5
(41)

The recommended Internet Explorer privacy setting is _________.

(Multiple Choice)
4.8/5
(37)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)