QUESTION 1
1. 1. Sending email messages that are not returned in an attempt to reach valid business e-mail addresses is an example of:
a. SPAM ham | ||
b. buffoonery | ||
c. data fraud | ||
d. direct harvesting attack |
16 points
QUESTION 2
1. 2. This group are younger and have more computer experience and skills:
a. Silicon Valley programmers | ||
b. posing fraudsters | ||
c. e-commerce pirates | ||
d. fraud perpetrators |
14 points
QUESTION 3
1. 3. The statement that “only a few people believe that copying software is fraud” is:
a. was a big issue for regulators in the early 90s. | ||
b. false, many people believe that. | ||
c. true | ||
d. not be taken literally |
14 points
QUESTION 4
1. 4. The FBI reported that _____ of the complaints they receive are about internet auction fraud.
a. almost all | ||
b. less than 2% | ||
c. less than 46% | ||
d. the bulk of the etrade launch |
14 points
QUESTION 5
1. 5. doing a survey with the intent of obtaining privacy info is an example of
a. pretexting | ||
b. bad fraud | ||
c. steganography | ||
d. cyber-extortion |
14 points
QUESTION 6
1. 6. This allows fraudsters to justify how they behave
a. fraud planning | ||
b. impersonation | ||
c. rationalization | ||
d. scavenging |
14 points
QUESTION 7
1. 7. The majority of these occur when a user executes an infected program in an e-mail
a. botnet | ||
b. malware malfunctions | ||
c. trojan | ||
d. hacking |
14 points
Click Save and Submit to save and submit. Click Save All Answers to save all answers.