Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it?

Which of the following examples may be classified as identity fraud?

A. You are wrongfully accused of a crime committed by an impostor.

B. Your phone bill reflects long distance charges you did not make.

C. You have documents that helped you illegally immigrate into the country.

D. You use a fake name to make a restaurant reservation

2. Which of the following statements correctly distinguishes between identity theft and identity fraud?

A. Identity fraud is always a victimless crime.

B. Identity fraud may involve the fabrication of identity information based on a fictitious person.

C. Identity theft may be done for criminal purposes.

D. Identity theft does not utilize historical or biometric information

3. Which of the following refers to redirecting thin slices of accounts into a designated location?

A. Salami technique

B. Data diddling

C. Spoofing

D. ISP-jacking

4. Which of the following refers to a seller in an auction driving up the cost of his or her own item by bidding on it?

A. Fee stacking

B. Shill bidding

C. Misrepresentation

D. Non delivery

5. Which of the following refers to a software program or hardware device that records everything you type into a compromised computer?

A. Keyloggers

B. Salamis

C. Worms

D. Trojans

6. Which of the following refers to the abuse of electronic messaging systems to randomly or indiscriminately send unsolicited bulk messages?

A. Phishing

B. Spamming

C. Phreaking

D. Shoulder surfing

7. “Popcorning” is a technique used in which of the following physical methods of identity theft?

A. Child identity theft

B. Mail theft

C. Fraudulent or fictitious companies

D. Theft of computers

8. Paper shredders and disk-wiping software are means to avoid which of the following physical methods of identity theft?

A. Mail theft

B. Bag operations

C. ATM manipulation

D. Dumpster diving

9. Which of the following refers to the sale of stolen goods through technological means?

A. Day trading

B. Insider trading

C. e-Fencing

D. Spoofing

10. Which of the following refers to a malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange?

A. Worm

B. Social engineering

C. Ransomware

D. Spyware

11. A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as:

A. cyberterrorism.

B. salami technique.

C. cyberstalking.

D. cyberbullying.