Info and Network Security Chapter 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What do law enforcement officials usually require of the victim in order to pursue harassment allegations? A verifiable threat of harm. A credible threat of death or serious injury A crediable threat of harm. A verifiable threat of death or serious injury.

A crediable threat of harm.

What is a cookie? A small file that contains data and is stored on your computer A piece of data that your web browser gather about you A small file made that contains data and then is stored on the web server. A piece of data that web servers gather about you

A small file that contains data and is stored on your computer

What is the term for submitting a fake but very high bid to deter other bidders? Ghost bidding Bid shielding Shill bidding Bid siphoning

Bid shielding

Which of the following occurs when a fraudulent buyer submits high bids to discourage other bidders, and then retracts the bids so people they know can get the item at a lower price? Shill bidding Bid shielding Bid siphoning Bid wars

Bid shielding

Which of the following occurs when a con artist lures bidders off legitimate auction sites by claiming to offer the same item at a lower price? Bid siphoning Shill bidding Bid shielding Bid wars

Bid siphoning

Someone who uses the Internet to harass, threaten, or intimidate another person is guilty of identity theft. True False

False

The process to induce you to provide personal information through a website is called cyberstalking. True False

False

When fraudulent sellers bid on the seller's items to drive up the price, it is called bid shielding. True False

False

Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose? Phishing Spoofi ng Browsing Harassment

Harassment

_____ theft and _______ fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception. Online Identity Neutral Cyber

Identity

What is the top rule for avoiding Internet fraud? Only work with people who have verifiable email addresses. If it seems to good to be true, it probably is. Never use your bank account numbers. Don't invest in foreigh deals.

If it seems to good to be true, it probably is.

Why is it useful to have a separate credit card dedicated to online purchases? If the credit card number is used illegally, you will limit your financial liability. You can keep better track of your auction activities. You can easily cancel that single card if you need to do so. If you are defrauded, you can possibly get the credit card company to handle the problem.

If the credit card number is used illegally, you will limit your financial liability.

Clarence is a police detective with a small-town police department. Heis trying to consider how seriously to take reports of cyber stalking.Why is cyber stalking a serious crime? It is using interstate communication. It can be a prelude to violent crime. It is frightening to the victim. It can be a prelude to identity theft.

It can be a prelude to violent crime.

Juan is a security officer for an investment firm. He is explaining various scams to the brokers. What is the term for artificially inflating a stock in order to sell it at a higher value? The Wall Street fraud Bait and switch The Nigerian fraud Pump and dump

Pump and dump

Candice is discussing Internet fraud with a colleague. She is trying to explain the most common types of fraud. What is the term for the most common type of Internet investment fraud? The pump and dump The bait and switch The Nigerian fraud The Manhattan fraud

The Nigerian fraud

You have become quite active in online investing. You do want to get some advice but are concerned about the veracity of the advice you receive. What is the most likely problem with unsolicited investment advice? The advice might not be truly unbiased. You might not earn as much as claimed. You might lose money. The advice might not be from a legitimate firm.

The advice might not be truly unbiased.

What is typically the goal of identity theft? To avoid criminal prosecution To make illicit purchase To invade privacy To discredit the victim

To avoid criminal prosecution

Why should a cybercrime law be specific? To prevent defendants from finding loopholes So it will be internationally recognized So that multiple laws will not be necessary So CSI can produce shows

To prevent defendants from finding loopholes

First-party cookies are the less likely to violate user privacy than third party cookies. True False

True

Identity theft and identity fraud refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception. True False

True

One good practice in a chat room is not to use your real name. True False

True

One good rule that applies to online investing is "Never invest money that you cannot afford to lose." True False

True

Firefox is an example of a phishing site. True False

False

What percentage of cyber stalking cases escalates to real-world violence? About 25% 90% or more About 19% Fewer than 1%

About 19%

What is cyber stalking? The use of email to stalk a person. Any use of the Internet to send or post threats. The use of email to send threats. Any use of the electronic communications to stalk a person

Any use of the electronic communications to stalk a person

A file on your computer that websites use to store information about you is a _________. Tab Cookie Firefox Browser

Cookie

Which of the following involves using the Internet to harass, threaten, or intimidate another person? Looping Licensing Phishing Cyberstalking

Cyberstalking

Which of the following is one way to protect yourself against identity theft? Do not provide personal information to anyone if it is not absolutely necessary. Use Windows as your operating system. None of the above. Use Windows as your operating system.

Do not provide personal information to anyone if it is not absolutely necessary.

What is the top way to protect yourself from cyber stalking? Do not use your real identity online. Do not give out email address. Always use a virus scanner. Always use a firewall.

Do not use your real identity online.

Which of the following is not one of the Security and Exchange Commission's tips for avoiding investment fraud? Don't invest online. Consider the source of the offer Always be skeptical Always research the investment

Don't invest online.

According to the U.S. Department of Justice, identity theft is generally motivated by what? Malicious intent Personal hostility toward the victim Economic gain Thrill seeking

Economic gain

Aliya is active on online auctions. She wants to avoid auction frauds. What are the four categories of auction fraud? Failure to disclose, sending something of lesser value, failure to send, sending something of greater value Failure to send, failure to disclose, sending something of lesser value, failure to deliver Failure to send, failure to disclose, sending to wrong address, failure to deliver. Failure to disclose, sending something of lesser value, failure to send, sending something of greater value

Failure to send, failure to disclose, sending something of lesser value, failure to deliver

If you are a victim of cyber stalking, what should you do to assist the police? Keep electronic and hard copies of all harassing communications. Try to provide the stalker into revealing personal information about himself Attempt to lure the stalker into a public place. Nothing, it is their job, and you should stay out of it.

Keep electronic and hard copies of all harassing communications.

The recommended Microsoft Edge privacy setting is _________. Very high Medium Medium high Low

Medium high

What is the first step in protecting yourself from identity theft? Routinely check for spyware on your computer Never use your real name on the Internet Never provide personal data about yourself unless absolutely necessary. Routingly check your records for signs of identity theft.

Never provide personal data about yourself unless absolutely necessary.

The top rule for chat room safety is what? Only use chat rooms that encrypt transmissions Make certain you have antivirus software installed Use chat rooms that are sponsored by well-known websites or companies. Never use your real name or any real personally identifying characteristics.

Never use your real name or any real personally identifying characteristics.

When using a chat room, one way to protect yourself from online harassment is ______. Not to say too much in the chat room Not to use computer Not to use your real name Not to use the chat room at night

Not to use your real name

What must exist for cyber stalking to be illegal in a state or territory? Specific laws against cyber stalking to be illegal in a state or territory, Nothing, existing stalking laws can apply Specific laws against cyber stalking in that nation Nothing, existing international cyber stalking laws apply

Nothing, existing stalking laws can apply

Which of the following is not an efficient method to protect yourselffrom auction fraud? Only work with well-rated sellers. Only use auctions for inexpensive items Only use reputable auction sites Only bid on items that seem realistic

Only use auctions for inexpensive items

Which of the following is the process to try to induce someone to provide you with personal information? Cyberstalking Phishing Looping Licensing

Phishing

Which country is described by experts as having the strictestcybercrime laws? Romania Russia United States France

Romania

What can you do on your local computer to protect your privacy? Set your browser's security settings Install a firewall Set your computer's filter settings Install a virus scaner

Set your browser's security settings

Which of the following is a type of fraud in which an auction site bidder is actually the seller with a fake identity, who bids high drive up the price? Shill bidding Bid shielding Bid siphoning Bid wars

Shill bidding

What is the term for a seller bidding on her own item to drive up the price? Bid shielding Ghost bidding Bid siphoning Shilling bidding

Shilling bidding

"Pump and dump" refers to the process in which a con artist purchases a large amount of a virtually worthless stock, then circulates rumors that inflate the stock's value, and then sells for a profit. True False

True

Experts consider Romania the country with the strictest cybercrime laws. True False

True

One way to protect yourself on auction sites is _____________. Use a separate credit card with a low limit. Ask someone to bid for you Bid early in the process. Bid late in the process.

Use a separate credit card with a low limit.

Firefox and Google Chrome are examples of ____________. Proxy servers Websites Web browsers Cookies

Web browsers

If you are posting anonymously in a chat room and another anonymous poster threatens you with assault or even death, is this person's post harassment? Probably not because both parties are anonymous, so the threat is not crefible. Yes, any threat of violence is harassement. No, chat room threats are different from threats in person. Probably not, because making a chat room threat is not the same as making a threat in person.

Yes, any threat of violence is harassement.


संबंधित स्टडी सेट्स