Deck 3: Cyber Stalking, Fraud, and Abuse

Full screen (f)
exit full mode
Question
Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders,and then retracts the bids so people they know can get the item at a lower price?

A)Shill bidding
B)Bid shielding
C)Bid siphoning
D)None of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity,who bids high drive up the price?

A)Shill bidding
B)Bid shielding
C)Bid siphoning
D)None of the above
Question
Firefox is an example of a phishing site.
Question
Which of the following is the process to try to induce someone to provide you with personal information?

A)Cyberstalking
B)Looping
C)Phishing
D)Licensing
Question
Which country is described by experts as having the strictest cybercrime laws?

A)United States
B)Russia
C)France
D)None of the above
Question
One good rule that applies to online investing is "Never invest money that you cannot afford to lose."
Question
Identity theft and identity fraud refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception.
Question
First-party cookies are the less likely to violate user privacy than third party cookies.
Question
Someone who uses the Internet to harass,threaten,or intimidate another person is guilty of identity theft.
Question
When fraudulent sellers bid on the seller's items to drive up the price,it is called bid shielding.
Question
Which of the following is one way to protect yourself against identity theft?

A)Do not provide personal information to anyone if it is not absolutely necessary.
B)Use Firefox as your web browser.
C)Use Windows as your operating system.
D)None of the above.
Question
"Pump and dump" refers to the process in which a con artist purchases a large amount of a virtually worthless stock,then circulates rumors that inflate the stock's value,and then sells for a profit.
Question
The process to induce you to provide personal information through a website is called cyberstalking.
Question
Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?

A)Phishing
B)Browsing
C)Harassment
D)None of the above
Question
Why should a cybercrime law be specific?

A)To prevent defendants from finding loopholes
B)So it will be internationally recognized
C)So that multiple laws will not be necessary
D)None of the above
Question
A file on your computer that websites use to store information about you is a _________.

A)Cookie
B)Browser
C)Tab
D)None of the above
Question
Experts consider Romania the country with the strictest cybercrime laws.
Question
Which of the following involves using the Internet to harass,threaten,or intimidate another person?

A)Cyberstalking
B)Looping
C)Phishing
D)Licensing
Question
One good practice in a chat room is not to use your real name.
Question
Which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price?

A)Shill bidding
B)Bid shielding
C)Bid siphoning
D)None of the above
Question
The recommended Internet Explorer privacy setting is _________.

A)Medium
B)Medium high
C)Very high
D)None of the above
Question
One way to protect yourself on auction sites is _____________.

A)Use a separate credit card with a low limit.
B)Bid late in the process.
C)Bid early in the process.
D)None of the above.
Question
When using a chat room,one way to protect yourself from online harassment is ______.

A)Not to use your real name
B)Not to use the chat room at night
C)Not to say too much in the chat room
D)None of the above
Question
_____ theft and _______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception.

A)Cyber
B)Neutral
C)Identity
D)None of the above
Question
Firefox and Internet Explorer are examples of ____________.

A)Cookies
B)Web browsers
C)Websites
D)Proxy servers
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Cyber Stalking, Fraud, and Abuse
1
Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders,and then retracts the bids so people they know can get the item at a lower price?

A)Shill bidding
B)Bid shielding
C)Bid siphoning
D)None of the above
B
2
Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity,who bids high drive up the price?

A)Shill bidding
B)Bid shielding
C)Bid siphoning
D)None of the above
A
3
Firefox is an example of a phishing site.
False
4
Which of the following is the process to try to induce someone to provide you with personal information?

A)Cyberstalking
B)Looping
C)Phishing
D)Licensing
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Which country is described by experts as having the strictest cybercrime laws?

A)United States
B)Russia
C)France
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
One good rule that applies to online investing is "Never invest money that you cannot afford to lose."
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Identity theft and identity fraud refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
First-party cookies are the less likely to violate user privacy than third party cookies.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Someone who uses the Internet to harass,threaten,or intimidate another person is guilty of identity theft.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
When fraudulent sellers bid on the seller's items to drive up the price,it is called bid shielding.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is one way to protect yourself against identity theft?

A)Do not provide personal information to anyone if it is not absolutely necessary.
B)Use Firefox as your web browser.
C)Use Windows as your operating system.
D)None of the above.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
"Pump and dump" refers to the process in which a con artist purchases a large amount of a virtually worthless stock,then circulates rumors that inflate the stock's value,and then sells for a profit.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The process to induce you to provide personal information through a website is called cyberstalking.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?

A)Phishing
B)Browsing
C)Harassment
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Why should a cybercrime law be specific?

A)To prevent defendants from finding loopholes
B)So it will be internationally recognized
C)So that multiple laws will not be necessary
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
A file on your computer that websites use to store information about you is a _________.

A)Cookie
B)Browser
C)Tab
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Experts consider Romania the country with the strictest cybercrime laws.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following involves using the Internet to harass,threaten,or intimidate another person?

A)Cyberstalking
B)Looping
C)Phishing
D)Licensing
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
One good practice in a chat room is not to use your real name.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price?

A)Shill bidding
B)Bid shielding
C)Bid siphoning
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
The recommended Internet Explorer privacy setting is _________.

A)Medium
B)Medium high
C)Very high
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
One way to protect yourself on auction sites is _____________.

A)Use a separate credit card with a low limit.
B)Bid late in the process.
C)Bid early in the process.
D)None of the above.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
When using a chat room,one way to protect yourself from online harassment is ______.

A)Not to use your real name
B)Not to use the chat room at night
C)Not to say too much in the chat room
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
_____ theft and _______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception.

A)Cyber
B)Neutral
C)Identity
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Firefox and Internet Explorer are examples of ____________.

A)Cookies
B)Web browsers
C)Websites
D)Proxy servers
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.