Info and Network Security Chapter 3
What do law enforcement officials usually require of the victim in order to pursue harassment allegations? A verifiable threat of harm. A credible threat of death or serious injury A crediable threat of harm. A verifiable threat of death or serious injury.
A crediable threat of harm.
What is a cookie? A small file that contains data and is stored on your computer A piece of data that your web browser gather about you A small file made that contains data and then is stored on the web server. A piece of data that web servers gather about you
A small file that contains data and is stored on your computer
What is the term for submitting a fake but very high bid to deter other bidders? Ghost bidding Bid shielding Shill bidding Bid siphoning
Bid shielding
Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders, and then retracts the bids so people they know can get the item at a lower price? Shill bidding Bid shielding Bid siphoning Bid wars
Bid shielding
Which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price? Bid siphoning Shill bidding Bid shielding Bid wars
Bid siphoning
Someone who uses the Internet to harass, threaten, or intimidate another person is guilty of identity theft. True False
False
The process to induce you to provide personal information through a website is called cyberstalking. True False
False
When fraudulent sellers bid on the seller's items to drive up the price, it is called bid shielding. True False
False
Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose? Phishing Spoofi ng Browsing Harassment
Harassment
_____ theft and _______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception. Online Identity Neutral Cyber
Identity
What is the top rule for avoiding Internet fraud? Only work with people who have verifiable email addresses. If it seems to good to be true, it probably is. Never use your bank account numbers. Don't invest in foreigh deals.
If it seems to good to be true, it probably is.
Why is it useful to have a separate credit card dedicated to online purchases? If the credit card number is used illegally, you will limit your financial liability. You can keep better track of your auction activities. You can easily cancel that single card if you need to do so. If you are defrauded, you can possibly get the credit card company to handle the problem.
If the credit card number is used illegally, you will limit your financial liability.
Clarence is a police detective with a small-town police department. Heis trying to consider how seriously to take reports of cyber stalking.Why is cyber stalking a serious crime? It is using interstate communication. It can be a prelude to violent crime. It is frightening to the victim. It can be a prelude to identity theft.
It can be a prelude to violent crime.
Juan is a security officer for an investment firm. He is explaining various scams to the brokers. What is the term for artificially inflating a stock in order to sell it at a higher value? The Wall Street fraud Bait and switch The Nigerian fraud Pump and dump
Pump and dump
Candice is discussing Internet fraud with a colleague. She is trying to explain the most common types of fraud. What is the term for the most common type of Internet investment fraud? The pump and dump The bait and switch The Nigerian fraud The Manhattan fraud
The Nigerian fraud
You have become quite active in online investing. You do want to get some advice but are concerned about the veracity of the advice you receive. What is the most likely problem with unsolicited investment advice? The advice might not be truly unbiased. You might not earn as much as claimed. You might lose money. The advice might not be from a legitimate firm.
The advice might not be truly unbiased.
What is typically the goal of identity theft? To avoid criminal prosecution To make illicit purchase To invade privacy To discredit the victim
To avoid criminal prosecution
Why should a cybercrime law be specific? To prevent defendants from finding loopholes So it will be internationally recognized So that multiple laws will not be necessary So CSI can produce shows
To prevent defendants from finding loopholes
First-party cookies are the less likely to violate user privacy than third party cookies. True False
True
Identity theft and identity fraud refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception. True False
True
One good practice in a chat room is not to use your real name. True False
True
One good rule that applies to online investing is "Never invest money that you cannot afford to lose." True False
True
Firefox is an example of a phishing site. True False
False
What percentage of cyber stalking cases escalates to real-world violence? About 25% 90% or more About 19% Fewer than 1%
About 19%
What is cyber stalking? The use of email to stalk a person. Any use of the Internet to send or post threats. The use of email to send threats. Any use of the electronic communications to stalk a person
Any use of the electronic communications to stalk a person
A file on your computer that websites use to store information about you is a _________. Tab Cookie Firefox Browser
Cookie
Which of the following involves using the Internet to harass, threaten, or intimidate another person? Looping Licensing Phishing Cyberstalking
Cyberstalking
Which of the following is one way to protect yourself against identity theft? Do not provide personal information to anyone if it is not absolutely necessary. Use Windows as your operating system. None of the above. Use Windows as your operating system.
Do not provide personal information to anyone if it is not absolutely necessary.
What is the top way to protect yourself from cyber stalking? Do not use your real identity online. Do not give out email address. Always use a virus scanner. Always use a firewall.
Do not use your real identity online.
Which of the following is not one of the Security and Exchange Commission's tips for avoiding investment fraud? Don't invest online. Consider the source of the offer Always be skeptical Always research the investment
Don't invest online.
According to the U.S. Department of Justice, identity theft is generally motivated by what? Malicious intent Personal hostility toward the victim Economic gain Thrill seeking
Economic gain
Aliya is active on online auctions. She wants to avoid auction frauds. What are the four categories of auction fraud? Failure to disclose, sending something of lesser value, failure to send, sending something of greater value Failure to send, failure to disclose, sending something of lesser value, failure to deliver Failure to send, failure to disclose, sending to wrong address, failure to deliver. Failure to disclose, sending something of lesser value, failure to send, sending something of greater value
Failure to send, failure to disclose, sending something of lesser value, failure to deliver
If you are a victim of cyber stalking, what should you do to assist the police? Keep electronic and hard copies of all harassing communications. Try to provide the stalker into revealing personal information about himself Attempt to lure the stalker into a public place. Nothing, it is their job, and you should stay out of it.
Keep electronic and hard copies of all harassing communications.
The recommended Microsoft Edge privacy setting is _________. Very high Medium Medium high Low
Medium high
What is the first step in protecting yourself from identity theft? Routinely check for spyware on your computer Never use your real name on the Internet Never provide personal data about yourself unless absolutely necessary. Routingly check your records for signs of identity theft.
Never provide personal data about yourself unless absolutely necessary.
The top rule for chat room safety is what? Only use chat rooms that encrypt transmissions Make certain you have antivirus software installed Use chat rooms that are sponsored by well-known websites or companies. Never use your real name or any real personally identifying characteristics.
Never use your real name or any real personally identifying characteristics.
When using a chat room, one way to protect yourself from online harassment is ______. Not to say too much in the chat room Not to use computer Not to use your real name Not to use the chat room at night
Not to use your real name
What must exist for cyber stalking to be illegal in a state or territory? Specific laws against cyber stalking to be illegal in a state or territory, Nothing, existing stalking laws can apply Specific laws against cyber stalking in that nation Nothing, existing international cyber stalking laws apply
Nothing, existing stalking laws can apply
Which of the following is not an efficient method to protect yourselffrom auction fraud? Only work with well-rated sellers. Only use auctions for inexpensive items Only use reputable auction sites Only bid on items that seem realistic
Only use auctions for inexpensive items
Which of the following is the process to try to induce someone to provide you with personal information? Cyberstalking Phishing Looping Licensing
Phishing
Which country is described by experts as having the strictestcybercrime laws? Romania Russia United States France
Romania
What can you do on your local computer to protect your privacy? Set your browser's security settings Install a firewall Set your computer's filter settings Install a virus scaner
Set your browser's security settings
Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity, who bids high drive up the price? Shill bidding Bid shielding Bid siphoning Bid wars
Shill bidding
What is the term for a seller bidding on her own item to drive up the price? Bid shielding Ghost bidding Bid siphoning Shilling bidding
Shilling bidding
"Pump and dump" refers to the process in which a con artist purchases a large amount of a virtually worthless stock, then circulates rumors that inflate the stock's value, and then sells for a profit. True False
True
Experts consider Romania the country with the strictest cybercrime laws. True False
True
One way to protect yourself on auction sites is _____________. Use a separate credit card with a low limit. Ask someone to bid for you Bid early in the process. Bid late in the process.
Use a separate credit card with a low limit.
Firefox and Google Chrome are examples of ____________. Proxy servers Websites Web browsers Cookies
Web browsers
If you are posting anonymously in a chat room and another anonymous poster threatens you with assault or even death, is this person's post harassment? Probably not because both parties are anonymous, so the threat is not crefible. Yes, any threat of violence is harassement. No, chat room threats are different from threats in person. Probably not, because making a chat room threat is not the same as making a threat in person.
Yes, any threat of violence is harassement.