1.
Which of the following is a type of fraud in which an auction site bidder is actually the
seller with a fake identity, who bids high drive up the price?
A) Shill bidding
B) Bid shielding
C) Bid siphoning
D) None of the above - Answer B) Bid shielding
2.
Which of the following occurs when a fraudulent buyer submits high bids to discourage
other bidders, and then retracts the bids so people they know can get the item at a
lower price?
A) Shill bidding
B) Bid shielding
C) Bid siphoning
D) None of the above - Answer B) Bid shielding
3.
Which of the following occurs when a con artist lures bidders off legitimate auction sites
by claiming to offer the same item at a lower price?
A) Shill bidding
B) Bid shielding
C) Bid siphoning
D) None of the above - Answer C) Bid siphoning
4.
Which of the following is the process to try to induce someone to provide you with
personal information?
A) Cyberstalking
B) Looping
C) Phishing
D) Licensing - Answer C) Phishing
5.
Which of the following involves using the Internet to harass, threaten, or intimidate
another person?
A) Cyberstalking
B) Looping
C) Phishing
D) Licensing - Answer A) Cyberstalking
6.
A file on your computer that websites use to store information about you is a
_________.
A) Cookie
B) Browser
, CIST1601- Exam 2 - Chapters 3, 4, and 5
C) Tab
D) None of the above - Answer A) Cookie
7.
Which of the following is one way to protect yourself against identity theft?
A) Do not provide personal information to anyone if it is not absolutely necessary.
B) Use Firefox as your web browser.
C) Use Windows as your operating system.
D) None of the above. - Answer A) Do not provide personal information to anyone if it is
not absolutely necessary.
8.
Which country is described by experts as having the strictest cybercrime laws?
A) United States
B) Russia
C) France
D) None of the above - Answer D) None of the above
9.
Which of these could be considered a course of conduct directed at a specific person
that causes substantial emotional distress in such person and serves no legitimate
purpose?
A) Phishing
B) Browsing
C) Harassment
D) None of the above - Answer C) Harassment
10.
Why should a cybercrime law be specific?
A) To prevent defendants from finding loopholes
B) So it will be internationally recognized
C) So that multiple laws will not be necessary
D) None of the above - Answer A) To prevent defendants from finding loopholes
11.
_____ theft and _______ fraud are terms used to refer to all types of crime in which
someone wrongfully obtains and uses another person's personal data in some way that
involves fraud or deception.
A) Cyber
B) Neutral
C) Identity
D) None of the above - Answer C) Identity
12.
The recommended Internet Explorer privacy setting is _________.
A) Medium