Exam 6: Cyber-Frauds, Scams and Cons

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is NOT a reason why victims fail to report fraud as described in the textbook?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

C

In Australia, one of the major fraud reporting agencies is _______________.?

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

C

This is one of the oldest and best-known frauds or "cons" about a trickster who solicits help from an Englishman to help him arrange for his sister's escape from her captors.?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

D

In the UK, frauds can be reported to _______________.?

(Multiple Choice)
4.8/5
(37)

In the US, the major fraud reporting agency is _______________.?

(Multiple Choice)
4.9/5
(45)

The internet provides users with new opportunities to sell stolen goods. The buying and selling of stolen goods is a practice commonly known as ______________.?

(Multiple Choice)
4.8/5
(39)

This type of investment fraud occurs when a perpetrator coerces a victim to buy a portion of a company's stock wherein the perpetrator suddenly sells his/her own stock to cash in on the temporary rise.?

(Multiple Choice)
4.9/5
(43)

This type of online fraud exploits the victims' emotional investment in a perceived relationship or potential relationship for monies and gifts.?

(Multiple Choice)
4.7/5
(35)

Who were 'phone phreaks'?

(Multiple Choice)
4.9/5
(28)

_______________ is the act of bidding on your own items in order to encourage a higher end price.?

(Multiple Choice)
4.9/5
(37)

This type of online fraud takes the form of the mass distribution of emails disguised as institutions such as banks, credit card companies, and e-sellers.?

(Multiple Choice)
4.9/5
(32)

This type of online fraud focuses on tricking people into handing over sensitive information like login credentials, social security numbers, and any other details that could compromise a person's security. Sometimes described as "human hacking".?

(Multiple Choice)
4.8/5
(35)

In Canada, the major fraud reporting agency is _______________.?

(Multiple Choice)
4.7/5
(36)

This hacker became infamous in the 1980s and 1990s for his various crimes involving phone phreaking, network intrusions, data exfiltration, and fleeing from authorities. He is perhaps best known for his social engineering exploits.?

(Multiple Choice)
4.8/5
(21)

Out of the online frauds discussed in the book, this category entailed the highest mean dollar losses to victims (over $30,000 per victim).?

(Multiple Choice)
4.9/5
(35)

Within the context of social engineering, there is a saying that _______________ is/are the weakest link in security.?

(Multiple Choice)
4.8/5
(36)

This type of phishing are more custom-tailored attacks, such as pretending to be someone close to the victim.?

(Multiple Choice)
4.9/5
(34)

The 419 scam gets its name from _______________.?

(Multiple Choice)
4.7/5
(38)

This type of phishing takes the form of the mass distribution of fraudulent messages through cellular text messages.?

(Multiple Choice)
4.7/5
(28)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)