Identity Theft
Assessment Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the assessment before. Hence you can not start it again.
Assessment is loading…
You must sign in or sign up to start the assessment.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person’s name or identity in order to make transactions or purchases is called ___________________________.
CorrectIncorrect -
Question 2 of 10
2. Question
The following is a list suggested by Dr. Rizk as information that identity thieves are trying to acquire. Identify the one type of information that does not belong.
CorrectIncorrect -
Question 3 of 10
3. Question
Social Media accounts do not need strong passwords because identity thieves cannot use any information from these websites.
CorrectIncorrect -
Question 4 of 10
4. Question
Identity thieves are clever in how they access information. Give one example of a simple method and one example of a complex method that identity thieves use to acquire information.
CorrectIncorrect -
Question 5 of 10
5. Question
Match the following terms.
Sort elements
- Sending unsolicited e-mails to multiple mailing lists; similar to Phishing.
- Using a magnetic card reader to steal a card number while you use an ATM or payment keypad in a store.
- Someone else accessing your computer from a remote location while you are using it.
- Creating a replica of a legitimate web page, usually in conjunction with Pharming.
- Posing as a legitimate business and sending emails or pop-up messages asking for personal information.
- Redirecting Internet searches or links through technical means to bogus websites.
-
Spamming
-
Skimming
-
Hacking
-
Spoofing
-
Phishing
-
Pharming
CorrectIncorrect -
Question 6 of 10
6. Question
Pick the four best options for constructing a plan to protect personal investments and reduce risk.
CorrectIncorrect -
Question 7 of 10
7. Question
Which of the following constructed list provides options to reduce online identity theft.
CorrectIncorrect -
Question 8 of 10
8. Question
What is an indication of identity theft?
CorrectIncorrect -
Question 9 of 10
9. Question
Financial Institutions have software that can detect every instance of identity theft.
CorrectIncorrect -
Question 10 of 10
10. Question
The Federal Bureau of Investigation (FBI) suggests three steps need to be taken (listed below) to best retrieve your identity. Place them in order.
-
Contact your local police department
-
Contact the financial institution in question
-
Contact the fraud department of the three major credit bureaus
View Answers:
CorrectIncorrect -