Home > Articles

  • Print
  • + Share This
This chapter is from the book

Test Your Skills

Multiple Choice

  1. The most common Internet investment fraud is known as what?

    1. The Nigerian fraud
    2. The Manhattan fraud
    3. The pump and dump
    4. The bait and switch
  2. What is the most likely problem with unsolicited investment advice?

    1. You might not earn as much as claimed.
    2. The advice might not be truly unbiased.
    3. The advice might not be from a legitimate firm.
    4. You might lose money.
  3. Artificially inflating a stock in order to sell it at a higher value is referred to as what?

    1. Bait and switch
    2. The Nigerian fraud
    3. Pump and dump
    4. The Wall Street fraud
  4. What is the top rule for avoiding Internet fraud?

    1. If it seems too good to be true, it probably is.
    2. Never use your bank account numbers.
    3. Only work with people who have verifiable email addresses.
    4. Don’t invest in foreign deals.
  5. Which of the following is not one of the Security and Exchange Commission’s tips for avoiding investment fraud?

    1. Don’t invest online.
    2. Consider the source of the offer.
    3. Always be skeptical.
    4. Always research the investment.
  6. What are the four categories of auction fraud?

    1. Failure to send, failure to disclose, sending to wrong address, failure to deliver
    2. Failure to send, failure to disclose, sending something of lesser value, failure to deliver
    3. Failure to disclose, sending something to wrong address, failure to send, failure to deliver
    4. Failure to disclose, sending something of lesser value, failure to send, sending something of greater value
  7. A seller bidding on his or her own item to drive up the price is referred to as what?

    1. Bid siphoning
    2. Bid shielding
    3. Shill bidding
    4. Ghost bidding
  8. Submitting a fake but very high bid to deter other bidders is referred to as what?

    1. Bid siphoning
    2. Bid shielding
    3. Shill bidding
    4. Ghost bidding
  9. Identity theft is most often attempted in order to accomplish what goal?

    1. To make illicit purchases
    2. To discredit the victim
    3. To avoid criminal prosecution
    4. To invade privacy
  10. According to the U.S. Department of Justice, identity theft is generally motivated by what?

    1. Malicious intent
    2. Personal hostility towards the victim
    3. Economic gain
    4. Thrill seeking
  11. Why is cyber stalking a serious crime?

    1. It is frightening to the victim.
    2. It can be a prelude to violent crime.
    3. It is using interstate communication.
    4. It can be a prelude to identity theft.
  12. What is cyber stalking?

    1. Any use of the Internet to send or post threats
    2. Any use of electronic communications to stalk a person
    3. Only use of email to send threats
    4. Only the use of email to stalk a person
  13. What will law enforcement officials usually require of the victim in order to pursue harassment allegations?

    1. A verifiable threat of death or serious injury
    2. A credible threat of death or serious injury
    3. A verifiable threat of harm
    4. A credible threat of harm
  14. If you are posting anonymously in a chat room and another anonymous poster threatens you with assault or even death, is this person’s post harassment?

    1. Yes, any threat of violence is harassment.
    2. Probably not, because both parties are anonymous, so the threat is not credible.
    3. Yes, chat room threats are no different than threats in person.
    4. Probably not, because making a chat room threat is not the same as making a threat in person.
  15. What must exist for cyber stalking to be illegal in a state or territory?

    1. Specific laws against cyber stalking in that state or territory.
    2. Specific laws against cyber stalking in that nation.
    3. Nothing; existing stalking laws can apply.
    4. Nothing; existing international cyber stalking laws apply.
  16. What is the first step in protecting yourself from identity theft?

    1. Never provide any personal data about yourself unless absolutely necessary.
    2. Routinely check your records for signs of identity theft.
    3. Never use your real name on the Internet.
    4. Routinely check for spyware on your computer.
  17. What can you do on your local computer to protect your privacy?

    1. Install a virus scanner.
    2. Install a firewall.
    3. Set your browser’s security settings.
    4. Set your computer’s filter settings.
  18. What is a cookie?

    1. A piece of data that web servers gather about you.
    2. A small file made that contains data and then is stored on your computer.
    3. A piece of data that your web browser gathers about you.
    4. A small file made that contains data and then is stored on the web server.
  19. Which of the following is not an efficient method of protecting yourself from auction fraud?

    1. Only use auctions for inexpensive items.
    2. Only use reputable auction sites.
    3. Only work with well-rated sellers.
    4. Only bid on items that seem realistic.
  20. The top rule for chat room safety is what?

    1. Make certain you have antivirus software installed.
    2. Never use your real name or any real personally identifying characteristics.
    3. Only use chat rooms that encrypt transmissions.
    4. Use chat rooms that are sponsored by well-known websites or companies.
  21. Why is it useful to have a separate credit card dedicated to online purchases?

    1. If the credit card number is used illegally, you will limit your financial liability.
    2. You can keep better track of your auction activities.
    3. If you are defrauded, you can possibly get the credit card company to handle the problem.
    4. You can easily cancel that single card, if you need to do so.
  22. What percentage of cyber stalking cases escalate to real-world violence?

    1. Less than 1%
    2. 25%
    3. 90% or more
    4. About 19%
  23. If you are a victim of cyber stalking, what should you do to assist the police?

    1. Nothing; it is their job and you should stay out of it.
    2. Attempt to lure the stalker into a public place.
    3. Keep electronic and hard copies of all harassing communications.
    4. Try to provoke the stalker into revealing personal information about himself or herself.
  24. What is the top way to protect yourself from cyber stalking?

    1. Do not use your real identity online.
    2. Always use a firewall.
    3. Always use a virus scanner.
    4. Do not give out email addresses.


Exercise 3.1: Setting Web Browser Privacy in Internet Explorer

  1. This process was described in detail with images in the chapter, but we will walk through the process here:
  • Select Tools from the drop-down menu at the top of Internet Explorer, then choose Internet Options.
  • Select the third tab, which is labeled Privacy.
  • Click the Advanced button.
  • Set your browser to accept first party cookies, prompt for third-party cookies, and accept session cookies.

Exercise 3.2: Using Alternative Web Browsers

  1. Download the Firefox browser from www.mozilla.org.
  2. Set privacy and security settings.

Exercise 3.3: Tracking in a Chat Room

The purpose of this exercise is to grasp how easy it is to obtain personal information about someone from his or her online activities.

  1. Enter any chat room. If you are not familiar with chat rooms or have not used them before, any of the following websites would make a good starting point for you:





  2. Note those people who use their real names.
  3. Note those people who reveal personal details.
  4. Compile as much information as you can about posers in the chat room.


Project 3.1: Finding Out about Cyber Stalking and the Law

  1. Using the Web or other resources, find out what your state, country, or province’s laws are regarding cyber stalking.
  2. Write a brief paper describing those laws and what they mean. You may select to do a quick summary of several laws or a more in-depth examination of one law. If you choose the former, then simply list the laws and write a brief paragraph explaining what they cover. If you choose the latter option, then discuss the law’s authors, why it was written, and possible ramifications of the law.

Project 3.2: Looking for Auction Fraud

Go to any auction site and try to identify if there are any sellers you feel might be fraudulent. Write a brief paper explaining what about that seller indicated that he or she may not be dealing honestly.

Project 3.3: Examining Cyber Stalking Case Studies

  1. Using the Web, find a case of cyber stalking not mentioned in this chapter. You may find some of the following websites helpful:




  2. Write a brief paper discussing this case, with particular attention to steps you think might have helped avoid or ameliorate the situation.
  • + Share This
  • 🔖 Save To Your Account