Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Chapter 3 Reading Quiz with complete solutions

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
07-06-2022
Written in
2020/2021

Chapter 3 Reading Quiz with complete solutions What can you do on your local computer to protect your privacy? A. Set your computer's filter settings. B. Install a virus scanner. C. Install a firewall. D. Set your browser's security settings. D. Set your browser's security settings. What is the most likely problem with unsolicited investment advice? A. The advice might not be truly unbiased. B. You might lose money. C. The advice might not be from a legitimate firm. D. You might not earn as much as claimed. A. The advice might not be truly unbiased. 01:02 01:20 Identity theft is most often attempted in order to accomplish what goal? A. To avoid criminal prosecution B. To discredit the victim C. To make illicit purchases D. To invade privacy C. To make illicit purchases What is cyber stalking? A. Only use of email to send threats B. Any use of electronic communications to stalk a person C. Any use of the Internet to send or post threats D. Only the use of email to stalk a person B. Any use of electronic communications to stalk a person A seller bidding on her own item to drive up the price is referred to as what? A. Bid shielding B. Shill bidding C. Ghost bidding D. Bid siphoning B. Shill bidding According to the U.S. Department of Justice, identity theft is generally motivated by what? A. Malicious intent B. Thrill seeking C. Personal hostility toward the victim D. Economic gain D. Economic gain If you are posting anonymously in a chat room and another anonymous poster threatens you with assault or even death, is this person's post harassment? A. Yes; any threat of violence is harassment. B. Probably not because both parties are anonymous, so the threat is not credible. C. Probably not because making a chat room threat is not the same as making a threat in person. D. Yes; chat room threats are no different from threats in person. B. Probably not because both parties are anonymous, so the threat is not credible. What will law enforcement officials usually require of the victim in order to pursue harassment allegations? A. A credible threat of death or serious injury B. A verifiable threat of death or serious injury C. A credible threat of harm D. A verifiable threat of harm C. A credible threat of harm Artificially inflating a stock in order to sell it at a higher value is referred to as what? A. Bait and switch B. Pump and dump C. The Nigerian fraud D. The Wall Street fraud B. Pump and dump What percentage of cyber stalking cases escalate to real-world violence? A. 90% or more B. Less than 1% C. 25% D. About 19% D. About 19% What is a cookie? A. A small file made that contains data and then is stored on your computer B. A piece of data that your web browser gathers about you C. A small file made that contains data and then is stored on the web server D. A piece of data that web servers gather about you A. A small file made that contains data and then is stored on your computer What is the first step in protecting yourself from identity theft? A. Routinely check your records for signs of identity theft. B. Routinely check for spyware on your computer. C. Never provide personal data about yourself unless absolutely necessary. D. Never use your real name on the Internet. C. Never provide personal data about yourself unless absolutely necessary. The top rule for chat room safety is what? A. Never use your real name or any real personally identifying characteristics. B. Only use chat rooms that encrypt transmissions. C. Make certain you have antivirus software installed. D. Use chat rooms that are sponsored by well-known websites or companies. A. Never use your real name or any real personally identifying characteristics. Why is it useful to have a separate credit card dedicated to online purchases? A. If you are defrauded, you can possibly get the credit card company to handle the problem. B. You can easily cancel that single card, if you need to do so. C. You can keep better track of your auction activities. D. If the credit card number is used illegally, you will limit your financial liability. D. If the credit card number is used illegally, you will limit your financial liability. Why is cyber stalking a serious crime? A. It is frightening to the victim. B. It is using interstate communication. C. It can be a prelude to identity theft. D. It can be a prelude to a violent crime. D. It can be a prelude to a violent crime. The most common Internet investment fraud is known as what? A. The bait and switch B. The Manhattan fraud C. The Nigerian fraud D. The pump and dump C. The Nigerian fraud If you are a victim of cyber stalking, what should you do to assist the police? A. Keep electronic and hard copies of all harassing communications. B. Nothing; it is their job and you should stay out of it. C. Attempt to lure the stalker into a public place. D. Try to provoke the stalker into revealing personal information about himself. A. Keep electronic and hard copies of all harassing communications. What is the top rule for avoiding Internet fraud? A. Only work with people who have verifiable email addresses. B. If it seems too good to be true, it probably is. C. Don't invest in foreign deals. D. Never use your bank account numbers. B. If it seems too good to be true, it probably is. Which of the following is not one of the Security and Exchange Commission's tips for avoiding investment fraud? A. Always be skeptical. B. Consider the source of the offer. C. Always research the investment. D. Don't invest online. D. Don't invest online. What must exist for cyber stalking to be illegal in a state or territory? A. Nothing; existing international cyber stalking laws apply. B. Specific laws against cyber stalking in that state or territory. C. Specific laws against cyber stalking in that nation. D. Nothing; existing stalking laws can apply. D. Nothing; existing stalking laws can apply. What are the four categories of auction fraud? A. Failure to disclose, sending something to wrong address, failure to send, failure to deliver B. Failure to disclose, sending something of lesser value, failure to send, sending something of greater value C. Failure to send, failure to disclose, sending to wrong address, failure to deliver D. Failure to send, failure to disclose, sending something of lesser value, failure to deliver D. Failure to send, failure to disclose, sending something of lesser value, failure to deliver What is the top way to protect yourself from cyber stalking? A. Always use a firewall. B. Do not use your real identity online. C. Always use a virus scanner. D. Do not give out email addresses. B. Do not use your real identity online. Submitting a fake but very high bid to deter other bidders is referred to as what? A. Shill bidding B. Bid siphoning C. Ghost bidding D. Bid shielding D. Bid shielding Which of the following is not an efficient method of protecting yourself from auction fraud? A. Only use reputable auction sites. B. Only bid on items that seem realistic. C. Only use auctions for inexpensive items. D. Only work with well-rated sellers. C. Only use auctions for inexpensive items.

Show more Read less
Institution
Course

Content preview

Chapter 3 Reading Quiz
What can you do on your local computer to protect your privacy?
A. Set your computer's filter settings.
B. Install a virus scanner.
C. Install a firewall.
D. Set your browser's security settings. - Answer D. Set your browser's security
settings.

What is the most likely problem with unsolicited investment advice?
A. The advice might not be truly unbiased.
B. You might lose money.
C. The advice might not be from a legitimate firm.
D. You might not earn as much as claimed. - Answer A. The advice might not be truly
unbiased.

Identity theft is most often attempted in order to accomplish what goal?
A. To avoid criminal prosecution
B. To discredit the victim
C. To make illicit purchases
D. To invade privacy - Answer C. To make illicit purchases

What is cyber stalking?
A. Only use of email to send threats
B. Any use of electronic communications to stalk a person
C. Any use of the Internet to send or post threats
D. Only the use of email to stalk a person - Answer B. Any use of electronic
communications to stalk a person

A seller bidding on her own item to drive up the price is referred to as what?
A. Bid shielding
B. Shill bidding
C. Ghost bidding
D. Bid siphoning - Answer B. Shill bidding

According to the U.S. Department of Justice, identity theft is generally motivated by
what?
A. Malicious intent
B. Thrill seeking
C. Personal hostility toward the victim
D. Economic gain - Answer D. Economic gain

If you are posting anonymously in a chat room and another anonymous poster
threatens you with assault or even death, is this person's post harassment?
A. Yes; any threat of violence is harassment.
B. Probably not because both parties are anonymous, so the threat is not credible.
C. Probably not because making a chat room threat is not the same as making a threat
in person.

Written for

Course

Document information

Uploaded on
June 7, 2022
Number of pages
4
Written in
2020/2021
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EvaTee Phoenix University
Follow You need to be logged in order to follow users or courses
Sold
5202
Member since
4 year
Number of followers
3567
Documents
55582
Last sold
9 hours ago
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

947 reviews

5
451
4
167
3
171
2
48
1
110

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions