Deck 3: Cyber Stalking, Fraud, and Abuse
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 3: Cyber Stalking, Fraud, and Abuse
1
Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders,and then retracts the bids so people they know can get the item at a lower price?
A)Shill bidding
B)Bid shielding
C)Bid siphoning
D)None of the above
A)Shill bidding
B)Bid shielding
C)Bid siphoning
D)None of the above
B
2
Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity,who bids high drive up the price?
A)Shill bidding
B)Bid shielding
C)Bid siphoning
D)None of the above
A)Shill bidding
B)Bid shielding
C)Bid siphoning
D)None of the above
A
3
Firefox is an example of a phishing site.
False
4
Which of the following is the process to try to induce someone to provide you with personal information?
A)Cyberstalking
B)Looping
C)Phishing
D)Licensing
A)Cyberstalking
B)Looping
C)Phishing
D)Licensing
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Which country is described by experts as having the strictest cybercrime laws?
A)United States
B)Russia
C)France
D)None of the above
A)United States
B)Russia
C)France
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
One good rule that applies to online investing is "Never invest money that you cannot afford to lose."
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Identity theft and identity fraud refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
First-party cookies are the less likely to violate user privacy than third party cookies.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
Someone who uses the Internet to harass,threaten,or intimidate another person is guilty of identity theft.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
When fraudulent sellers bid on the seller's items to drive up the price,it is called bid shielding.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is one way to protect yourself against identity theft?
A)Do not provide personal information to anyone if it is not absolutely necessary.
B)Use Firefox as your web browser.
C)Use Windows as your operating system.
D)None of the above.
A)Do not provide personal information to anyone if it is not absolutely necessary.
B)Use Firefox as your web browser.
C)Use Windows as your operating system.
D)None of the above.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
"Pump and dump" refers to the process in which a con artist purchases a large amount of a virtually worthless stock,then circulates rumors that inflate the stock's value,and then sells for a profit.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
The process to induce you to provide personal information through a website is called cyberstalking.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?
A)Phishing
B)Browsing
C)Harassment
D)None of the above
A)Phishing
B)Browsing
C)Harassment
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Why should a cybercrime law be specific?
A)To prevent defendants from finding loopholes
B)So it will be internationally recognized
C)So that multiple laws will not be necessary
D)None of the above
A)To prevent defendants from finding loopholes
B)So it will be internationally recognized
C)So that multiple laws will not be necessary
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
A file on your computer that websites use to store information about you is a _________.
A)Cookie
B)Browser
C)Tab
D)None of the above
A)Cookie
B)Browser
C)Tab
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Experts consider Romania the country with the strictest cybercrime laws.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following involves using the Internet to harass,threaten,or intimidate another person?
A)Cyberstalking
B)Looping
C)Phishing
D)Licensing
A)Cyberstalking
B)Looping
C)Phishing
D)Licensing
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
One good practice in a chat room is not to use your real name.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price?
A)Shill bidding
B)Bid shielding
C)Bid siphoning
D)None of the above
A)Shill bidding
B)Bid shielding
C)Bid siphoning
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
The recommended Internet Explorer privacy setting is _________.
A)Medium
B)Medium high
C)Very high
D)None of the above
A)Medium
B)Medium high
C)Very high
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
One way to protect yourself on auction sites is _____________.
A)Use a separate credit card with a low limit.
B)Bid late in the process.
C)Bid early in the process.
D)None of the above.
A)Use a separate credit card with a low limit.
B)Bid late in the process.
C)Bid early in the process.
D)None of the above.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
When using a chat room,one way to protect yourself from online harassment is ______.
A)Not to use your real name
B)Not to use the chat room at night
C)Not to say too much in the chat room
D)None of the above
A)Not to use your real name
B)Not to use the chat room at night
C)Not to say too much in the chat room
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
_____ theft and _______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception.
A)Cyber
B)Neutral
C)Identity
D)None of the above
A)Cyber
B)Neutral
C)Identity
D)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Firefox and Internet Explorer are examples of ____________.
A)Cookies
B)Web browsers
C)Websites
D)Proxy servers
A)Cookies
B)Web browsers
C)Websites
D)Proxy servers
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck