Exam 6: Cyber-Frauds, Scams and Cons
Exam 1: Cybercrime and the Internet an Introduction13 Questions
Exam 2: Researching and Theorizing Cybercrime18 Questions
Exam 3: Hackers, Crackers, and Viral Coders18 Questions
Exam 4: Political Hacking20 Questions
Exam 5: Virtual Pirates21 Questions
Exam 6: Cyber-Frauds, Scams and Cons19 Questions
Exam 7: Illegal, Harmful and Offensive Content Online: From Hate Speech to the Dangers of Pornography18 Questions
Exam 8: Child Pornography and Child Sex Abuse Imagery22 Questions
Exam 9: The Victimization of Individuals Online: Cyberstalking and Paedophilia19 Questions
Exam 10: Policing the Internet17 Questions
Exam 11: Cybercrimes and Cyberliberties: Surveillance, Privacy and Crime Control18 Questions
Exam 12: Looking Toward the Future of Cybercrime6 Questions
Select questions type
Which of the following is NOT a reason why victims fail to report fraud as described in the textbook?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
C
In Australia, one of the major fraud reporting agencies is _______________.?
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
C
This is one of the oldest and best-known frauds or "cons" about a trickster who solicits help from an Englishman to help him arrange for his sister's escape from her captors.?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
D
In the US, the major fraud reporting agency is _______________.?
(Multiple Choice)
4.9/5
(45)
The internet provides users with new opportunities to sell stolen goods. The buying and selling of stolen goods is a practice commonly known as ______________.?
(Multiple Choice)
4.8/5
(39)
This type of investment fraud occurs when a perpetrator coerces a victim to buy a portion of a company's stock wherein the perpetrator suddenly sells his/her own stock to cash in on the temporary rise.?
(Multiple Choice)
4.9/5
(43)
This type of online fraud exploits the victims' emotional investment in a perceived relationship or potential relationship for monies and gifts.?
(Multiple Choice)
4.7/5
(35)
_______________ is the act of bidding on your own items in order to encourage a higher end price.?
(Multiple Choice)
4.9/5
(37)
This type of online fraud takes the form of the mass distribution of emails disguised as institutions such as banks, credit card companies, and e-sellers.?
(Multiple Choice)
4.9/5
(32)
This type of online fraud focuses on tricking people into handing over sensitive information like login credentials, social security numbers, and any other details that could compromise a person's security. Sometimes described as "human hacking".?
(Multiple Choice)
4.8/5
(35)
In Canada, the major fraud reporting agency is _______________.?
(Multiple Choice)
4.7/5
(36)
This hacker became infamous in the 1980s and 1990s for his various crimes involving phone phreaking, network intrusions, data exfiltration, and fleeing from authorities. He is perhaps best known for his social engineering exploits.?
(Multiple Choice)
4.8/5
(21)
Out of the online frauds discussed in the book, this category entailed the highest mean dollar losses to victims (over $30,000 per victim).?
(Multiple Choice)
4.9/5
(35)
Within the context of social engineering, there is a saying that _______________ is/are the weakest link in security.?
(Multiple Choice)
4.8/5
(36)
This type of phishing are more custom-tailored attacks, such as pretending to be someone close to the victim.?
(Multiple Choice)
4.9/5
(34)
This type of phishing takes the form of the mass distribution of fraudulent messages through cellular text messages.?
(Multiple Choice)
4.7/5
(28)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)