Exam 1- Chapter 3- IS5610 Cybersecurity
Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders, and then retracts the bids so people they know can get the item at a lower price?
Bid shielding
Which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price?
Bid siphoning
Which of the following is one way to protect yourself against identity theft?
Do not provide personal information to anyone if it is not absolutely necessary
The process to induce you to provide personal information through a website is cyberstalking
False
When fraudulent sellers bid on the seller's items to drive up the price, it is called bid shielding.
False
Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?
Harassment
_____theft and ______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception
Identity
Why should a cybercrime law be specific?
To prevent defendants from finding loopholes
"Pump and dump" refers to the process in which a con artist purchases a large amount of a virtually worthless stock, then circulates rumors that inflate the stock's value, and then sells for a profit
True
Identity Theft and identity fraud refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception
True
One good practice in a chat room is not to use your real name
True
One good rule that applies to online investing is "Never invest money that you cannot afford to lose"
True
Which country is described by experts as having the strictest cybercrime laws?
Unites States, Russia, France (NONE OF THE ABOVE)
One way to protect yourself on auction sites is
Use a separate credit card with a low limit
Firefox is an example of a phishing site
False
Someone who uses the Internet to harass, threaten, or intimidate another person is guilty of identity theft
False
A file on your computer that websites use to store information about you is a
Cookie
Which of the following involves using the Internet to harass, threaten, or intimidate another person?
Cyberstalking
The recommended Internet Explorer privacy setting is
Medium High
When using a chat room. one way to protect yourself from online harassment is
Not to use your real name
Which of the following is the process to try to induce someone to provide you with personal information
Phishing
Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity, who bids high drive up the price?
Shill bidding
Experts consider Romania the country with the strictest cybercrime laws
True
First-party cookies are the less likely to violate user privacy than third party cookies
True
Firefox and Internet Explorer are examples of
Web browsers