Exam 1- Chapter 3- IS5610 Cybersecurity

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders, and then retracts the bids so people they know can get the item at a lower price?

Bid shielding

Which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price?

Bid siphoning

Which of the following is one way to protect yourself against identity theft?

Do not provide personal information to anyone if it is not absolutely necessary

The process to induce you to provide personal information through a website is cyberstalking

False

When fraudulent sellers bid on the seller's items to drive up the price, it is called bid shielding.

False

Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?

Harassment

_____theft and ______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception

Identity

Why should a cybercrime law be specific?

To prevent defendants from finding loopholes

"Pump and dump" refers to the process in which a con artist purchases a large amount of a virtually worthless stock, then circulates rumors that inflate the stock's value, and then sells for a profit

True

Identity Theft and identity fraud refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception

True

One good practice in a chat room is not to use your real name

True

One good rule that applies to online investing is "Never invest money that you cannot afford to lose"

True

Which country is described by experts as having the strictest cybercrime laws?

Unites States, Russia, France (NONE OF THE ABOVE)

One way to protect yourself on auction sites is

Use a separate credit card with a low limit

Firefox is an example of a phishing site

False

Someone who uses the Internet to harass, threaten, or intimidate another person is guilty of identity theft

False

A file on your computer that websites use to store information about you is a

Cookie

Which of the following involves using the Internet to harass, threaten, or intimidate another person?

Cyberstalking

The recommended Internet Explorer privacy setting is

Medium High

When using a chat room. one way to protect yourself from online harassment is

Not to use your real name

Which of the following is the process to try to induce someone to provide you with personal information

Phishing

Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity, who bids high drive up the price?

Shill bidding

Experts consider Romania the country with the strictest cybercrime laws

True

First-party cookies are the less likely to violate user privacy than third party cookies

True

Firefox and Internet Explorer are examples of

Web browsers


संबंधित स्टडी सेट्स

Mathematics: Notable Mathematicians (& their Most Famous Works and Contributions and Notable Biographical Information)

View Set

World History - Chapter 13.1 & 13.2

View Set

NPTE Scorebuilders OA Practice Exam 1

View Set