Chapter 3 Reading Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is cyber stalking? A. Only use of email to send threats B. Any use of electronic communications to stalk a person C. Any use of the Internet to send or post threats D. Only the use of email to stalk a person

B. Any use of electronic communications to stalk a person

What is the top way to protect yourself from cyber stalking? A. Always use a firewall. B. Do not use your real identity online. C. Always use a virus scanner. D. Do not give out email addresses.

B. Do not use your real identity online.

What is the top rule for avoiding Internet fraud? A. Only work with people who have verifiable email addresses. B. If it seems too good to be true, it probably is. C. Don't invest in foreign deals. D. Never use your bank account numbers.

B. If it seems too good to be true, it probably is.

If you are posting anonymously in a chat room and another anonymous poster threatens you with assault or even death, is this person's post harassment? A. Yes; any threat of violence is harassment. B. Probably not because both parties are anonymous, so the threat is not credible. C. Probably not because making a chat room threat is not the same as making a threat in person. D. Yes; chat room threats are no different from threats in person.

B. Probably not because both parties are anonymous, so the threat is not credible.

Artificially inflating a stock in order to sell it at a higher value is referred to as what? A. Bait and switch B. Pump and dump C. The Nigerian fraud D. The Wall Street fraud

B. Pump and dump

A seller bidding on her own item to drive up the price is referred to as what? A. Bid shielding B. Shill bidding C. Ghost bidding D. Bid siphoning

B. Shill bidding

What percentage of cyber stalking cases escalate to real-world violence? A. 90% or more B. Less than 1% C. 25% D. About 19%

D. About 19%

Submitting a fake but very high bid to deter other bidders is referred to as what? A. Shill bidding B. Bid siphoning C. Ghost bidding D. Bid shielding

D. Bid shielding

Which of the following is not one of the Security and Exchange Commission's tips for avoiding investment fraud? A. Always be skeptical. B. Consider the source of the offer. C. Always research the investment. D. Don't invest online.

D. Don't invest online.

According to the U.S. Department of Justice, identity theft is generally motivated by what? A. Malicious intent B. Thrill seeking C. Personal hostility toward the victim D. Economic gain

D. Economic gain

What are the four categories of auction fraud? A. Failure to disclose, sending something to wrong address, failure to send, failure to deliver B. Failure to disclose, sending something of lesser value, failure to send, sending something of greater value C. Failure to send, failure to disclose, sending to wrong address, failure to deliver D. Failure to send, failure to disclose, sending something of lesser value, failure to deliver

D. Failure to send, failure to disclose, sending something of lesser value, failure to deliver

Why is it useful to have a separate credit card dedicated to online purchases? A. If you are defrauded, you can possibly get the credit card company to handle the problem. B. You can easily cancel that single card, if you need to do so. C. You can keep better track of your auction activities. D. If the credit card number is used illegally, you will limit your financial liability.

D. If the credit card number is used illegally, you will limit your financial liability.

Why is cyber stalking a serious crime? A. It is frightening to the victim. B. It is using interstate communication. C. It can be a prelude to identity theft. D. It can be a prelude to a violent crime.

D. It can be a prelude to a violent crime.

What must exist for cyber stalking to be illegal in a state or territory? A. Nothing; existing international cyber stalking laws apply. B. Specific laws against cyber stalking in that state or territory. C. Specific laws against cyber stalking in that nation. D. Nothing; existing stalking laws can apply.

D. Nothing; existing stalking laws can apply.

What can you do on your local computer to protect your privacy? A. Set your computer's filter settings. B. Install a virus scanner. C. Install a firewall. D. Set your browser's security settings.

D. Set your browser's security settings.

What is a cookie? A. A small file made that contains data and then is stored on your computer B. A piece of data that your web browser gathers about you C. A small file made that contains data and then is stored on the web server D. A piece of data that web servers gather about you

A. A small file made that contains data and then is stored on your computer

If you are a victim of cyber stalking, what should you do to assist the police? A. Keep electronic and hard copies of all harassing communications. B. Nothing; it is their job and you should stay out of it. C. Attempt to lure the stalker into a public place. D. Try to provoke the stalker into revealing personal information about himself.

A. Keep electronic and hard copies of all harassing communications.

The top rule for chat room safety is what? A. Never use your real name or any real personally identifying characteristics. B. Only use chat rooms that encrypt transmissions. C. Make certain you have antivirus software installed. D. Use chat rooms that are sponsored by well-known websites or companies.

A. Never use your real name or any real personally identifying characteristics.

What is the most likely problem with unsolicited investment advice? A. The advice might not be truly unbiased. B. You might lose money. C. The advice might not be from a legitimate firm. D. You might not earn as much as claimed.

A. The advice might not be truly unbiased.

What will law enforcement officials usually require of the victim in order to pursue harassment allegations? A. A credible threat of death or serious injury B. A verifiable threat of death or serious injury C. A credible threat of harm D. A verifiable threat of harm

C. A credible threat of harm

What is the first step in protecting yourself from identity theft? A. Routinely check your records for signs of identity theft. B. Routinely check for spyware on your computer. C. Never provide personal data about yourself unless absolutely necessary. D. Never use your real name on the Internet.

C. Never provide personal data about yourself unless absolutely necessary.

Which of the following is not an efficient method of protecting yourself from auction fraud? A. Only use reputable auction sites. B. Only bid on items that seem realistic. C. Only use auctions for inexpensive items. D. Only work with well-rated sellers.

C. Only use auctions for inexpensive items.

The most common Internet investment fraud is known as what? A. The bait and switch B. The Manhattan fraud C. The Nigerian fraud D. The pump and dump

C. The Nigerian fraud

Identity theft is most often attempted in order to accomplish what goal? A. To avoid criminal prosecution B. To discredit the victim C. To make illicit purchases D. To invade privacy

C. To make illicit purchases


Set pelajaran terkait

Chapter 50- Introduction to the Renal System

View Set

Vocabulary Workshop Level G (Units 1, 2, 3)

View Set

ATI Peds Cardio, Comp exam 2 ATI questions

View Set

(BIOL) Human Anatomy - Ch. 4 The Integumentary System HW

View Set

Personnel Planning and Recruitment

View Set

The Notorious Jumping Frog of Calaveras County review

View Set