Deck 6: Cyber-Frauds, Scams and Cons

Full screen (f)
exit full mode
Question
This is one of the oldest and best-known frauds or "cons" about a trickster who solicits help from an Englishman to help him arrange for his sister's escape from her captors.?

A) The 'Italian performer'
B) The 'French guard'
C) The 'German captain'
D) The 'Spanish prisoner'
Use Space or
up arrow
down arrow
to flip the card.
Question
This type of online fraud exploits the victims' emotional investment in a perceived relationship or potential relationship for monies and gifts.?

A) Advanced fee frauds
B) Phishing and spoofing
C) Romance scams
D) Investment fraud
Question
This type of online fraud focuses on tricking people into handing over sensitive information like login credentials, social security numbers, and any other details that could compromise a person's security. Sometimes described as "human hacking".?

A) Social engineering
B) Hacking
C) Advanced fee frauds
D) Identity theft
Question
This type of online fraud takes the form of the mass distribution of emails disguised as institutions such as banks, credit card companies, and e-sellers.?

A) Phishing and spoofing
B) Investment fraud
C) Internet auction frauds
D) Advanced fee frauds
Question
This type of phishing are more custom-tailored attacks, such as pretending to be someone close to the victim.?

A) 'Spear-phishing'
B) 'Whaling'
C) 'Smishing'
D) 'Vishing'
Question
This type of phishing takes the form of the mass distribution of fraudulent messages through cellular text messages.?

A) 'Spear-phishing'
B) 'Whaling'
C) 'Smishing'
D) 'Vishing'
Question
Out of the online frauds discussed in the book, this category entailed the highest mean dollar losses to victims (over $30,000 per victim).?

A) Investment fraud
B) Romance scams
C) Phishing and spoofing
D) Internet auction fraud
Question
This type of investment fraud occurs when a perpetrator coerces a victim to buy a portion of a company's stock wherein the perpetrator suddenly sells his/her own stock to cash in on the temporary rise.?

A) The 'up-and-down'
B) The 'in-and-out'
C) The 'pump-and-dump'
D) The 'one-and-done'
Question
Who were 'phone phreaks'?

A) Trickers who would dial a random number and hang up
B) Hackers that focused on exploring and manipulating telephone systems
C) Businessmen who dabbled in the 'black market' of smartphones
D) Artists commissioned to customize old landline phones
Question
Within the context of social engineering, there is a saying that _______________ is/are the weakest link in security.?

A) computers
B) code
C) passwords
D) humans
Question
In the US, the major fraud reporting agency is _______________.?

A) The Internet Crime Complaint Center
B) Action Fraud
C) ACORN
D) Office for National Statistics
Question
In Australia, one of the major fraud reporting agencies is _______________.?

A) The Internet Crime Complaint Center
B) Action Fraud
C) ACORN
D) Office for National Statistics
Question
In the UK, frauds can be reported to _______________.?

A) The Internet Crime Complaint Center
B) Action Fraud
C) ACORN
D) ACCC
Question
The internet provides users with new opportunities to sell stolen goods. The buying and selling of stolen goods is a practice commonly known as ______________.?

A) Tossing
B) Pitching
C) Fencing
D) Slashing
Question
_______________ is the act of bidding on your own items in order to encourage a higher end price.?

A) Snipping
B) Ruse bidding
C) Pretexting
D) Shill bidding
Question
The 419 scam gets its name from _______________.?

A) the relevant section of the Nigerian penal code prohibiting that kind of fraudulent activity.
B) the Nigerian area code where most of these scammers were known to operate from in the early 2000s.
C) the police data record locator number used to catalog these offenses in the Uniform Crime Report.
D) the number of scammers arrested in a bust of one of the largest organized crime groups ever, once which focused on this kind of scam.
Question
In Canada, the major fraud reporting agency is _______________.?

A) ACORN
B) CAFC
C) Scamwatch
D) Action Fraud
Question
Which of the following is NOT a reason why victims fail to report fraud as described in the textbook?

A) The may decide that the relatively small amounts of money involved do not make pursuing the matter worthwhile.
B) They may feel embarrassed about having been taken in by a fraudster.
C) They do not trust authorities to protect their confidentiality upon reporting.
D) They may judge that there is little likelihood of a successful outcome.
E) None of the above
Question
This hacker became infamous in the 1980s and 1990s for his various crimes involving phone phreaking, network intrusions, data exfiltration, and fleeing from authorities. He is perhaps best known for his social engineering exploits.?

A) Chris Hadnagy
B) Kevin Mitnick
C) Oxblood Ruffin
D) Aaron Swartz
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/19
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Cyber-Frauds, Scams and Cons
1
This is one of the oldest and best-known frauds or "cons" about a trickster who solicits help from an Englishman to help him arrange for his sister's escape from her captors.?

A) The 'Italian performer'
B) The 'French guard'
C) The 'German captain'
D) The 'Spanish prisoner'
D
2
This type of online fraud exploits the victims' emotional investment in a perceived relationship or potential relationship for monies and gifts.?

A) Advanced fee frauds
B) Phishing and spoofing
C) Romance scams
D) Investment fraud
C
3
This type of online fraud focuses on tricking people into handing over sensitive information like login credentials, social security numbers, and any other details that could compromise a person's security. Sometimes described as "human hacking".?

A) Social engineering
B) Hacking
C) Advanced fee frauds
D) Identity theft
A
4
This type of online fraud takes the form of the mass distribution of emails disguised as institutions such as banks, credit card companies, and e-sellers.?

A) Phishing and spoofing
B) Investment fraud
C) Internet auction frauds
D) Advanced fee frauds
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
5
This type of phishing are more custom-tailored attacks, such as pretending to be someone close to the victim.?

A) 'Spear-phishing'
B) 'Whaling'
C) 'Smishing'
D) 'Vishing'
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
6
This type of phishing takes the form of the mass distribution of fraudulent messages through cellular text messages.?

A) 'Spear-phishing'
B) 'Whaling'
C) 'Smishing'
D) 'Vishing'
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
7
Out of the online frauds discussed in the book, this category entailed the highest mean dollar losses to victims (over $30,000 per victim).?

A) Investment fraud
B) Romance scams
C) Phishing and spoofing
D) Internet auction fraud
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
8
This type of investment fraud occurs when a perpetrator coerces a victim to buy a portion of a company's stock wherein the perpetrator suddenly sells his/her own stock to cash in on the temporary rise.?

A) The 'up-and-down'
B) The 'in-and-out'
C) The 'pump-and-dump'
D) The 'one-and-done'
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
9
Who were 'phone phreaks'?

A) Trickers who would dial a random number and hang up
B) Hackers that focused on exploring and manipulating telephone systems
C) Businessmen who dabbled in the 'black market' of smartphones
D) Artists commissioned to customize old landline phones
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
10
Within the context of social engineering, there is a saying that _______________ is/are the weakest link in security.?

A) computers
B) code
C) passwords
D) humans
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
11
In the US, the major fraud reporting agency is _______________.?

A) The Internet Crime Complaint Center
B) Action Fraud
C) ACORN
D) Office for National Statistics
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
12
In Australia, one of the major fraud reporting agencies is _______________.?

A) The Internet Crime Complaint Center
B) Action Fraud
C) ACORN
D) Office for National Statistics
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
13
In the UK, frauds can be reported to _______________.?

A) The Internet Crime Complaint Center
B) Action Fraud
C) ACORN
D) ACCC
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
14
The internet provides users with new opportunities to sell stolen goods. The buying and selling of stolen goods is a practice commonly known as ______________.?

A) Tossing
B) Pitching
C) Fencing
D) Slashing
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
15
_______________ is the act of bidding on your own items in order to encourage a higher end price.?

A) Snipping
B) Ruse bidding
C) Pretexting
D) Shill bidding
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
16
The 419 scam gets its name from _______________.?

A) the relevant section of the Nigerian penal code prohibiting that kind of fraudulent activity.
B) the Nigerian area code where most of these scammers were known to operate from in the early 2000s.
C) the police data record locator number used to catalog these offenses in the Uniform Crime Report.
D) the number of scammers arrested in a bust of one of the largest organized crime groups ever, once which focused on this kind of scam.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
17
In Canada, the major fraud reporting agency is _______________.?

A) ACORN
B) CAFC
C) Scamwatch
D) Action Fraud
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is NOT a reason why victims fail to report fraud as described in the textbook?

A) The may decide that the relatively small amounts of money involved do not make pursuing the matter worthwhile.
B) They may feel embarrassed about having been taken in by a fraudster.
C) They do not trust authorities to protect their confidentiality upon reporting.
D) They may judge that there is little likelihood of a successful outcome.
E) None of the above
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
19
This hacker became infamous in the 1980s and 1990s for his various crimes involving phone phreaking, network intrusions, data exfiltration, and fleeing from authorities. He is perhaps best known for his social engineering exploits.?

A) Chris Hadnagy
B) Kevin Mitnick
C) Oxblood Ruffin
D) Aaron Swartz
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 19 flashcards in this deck.