Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Quiz Identity Theft

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Quiz

1. When identity thieves commit this fraud, they register new accounts
using the victim's information, make expensive purchases they never
pay for, then switch the billing address to conceal the unpaid
account.
a. Account Takeover
b. True Name
c. Financial Identity Theft
d. Identity Cloning for Concealment

2. The act of obtaining another person's financial or personal


information with the intent to use it to conduct fraud, such as making
unauthorized purchases or transactions.
a. Account Takeover
b. True Name
c. Financial Identity Theft
d. Identity Theft

3. Information on a stolen identity is provided to the police by a person


who is being detained. The victim will be charged if this exploit is
successful rather than the thief.
a. Impersonation
b. Criminal Identity Theft
c. Identity Cloning for Concealment
d. Synthetic Identity Theft

4. In this situation, the identity thief impersonates someone else to


conceal their own true identity.
a. Impersonation
b. Criminal Identity Theft
c. Identity Cloning for Concealment
d. Synthetic Identity Theft

5. Unauthorized people gain control of another person's online


accounts, such as a bank account, email address, or social media
profile, without the account owner's consent.
a. Account Takeover
b. True Name
c. Financial Identity Theft
d. Identity Theft
6. Involves using the stolen identity or personal information to pretend
to be someone else, often for fraudulent purposes.
a. Impersonation
b. Criminal Identity Theft
c. Identity Cloning for Concealment
d. Synthetic Identity Theft

7. Your personal information will be used by a thief to obtain medical


care in your name.
a. Tax-related Identity Theft
b. Medical Identity Theft
c. Your health insurance benefits limit is maxed out
d. Child Identity Theft

8. Involves identity thieves filing a tax return with your personal


information to receive your refund.
a. Tax-related Identity Theft
b. Medical Identity Theft
c. Financial Identity Theft
d. Child Identity Theft

9. Often, it is not found until the victim makes an application for student
loans or other forms of credit.
a. Tax-related Identity Theft
b. Medical Identity Theft
c. Financial Identity Theft
d. Child Identity Theft

10. A fraudulent scheme involves a criminal combining real and


fake information to create a new identity, typically resulting in the
theft of the real data.
a. Impersonation
b. Criminal Identity Theft
c. Identity Cloning for Concealment
d. Synthetic Identity Theft

11. A deceptive practice where individuals deceive others into


sharing sensitive information, often using information that makes the
victim believe they are legitimate.
a. Social Engineering
b. Shoulder Surfing
c. Phishing
d. Synthetic Identity Theft

12. False emails, texts, phone calls, or websites that are intended
to deceive users into downloading malware or disclosing private
information such as Social Security and credit card numbers, bank
account details, login passwords, or other sensitive information.
a. Social Engineering
b. Shoulder Surfing
c. Phishing
d. Synthetic Identity Theft

13. Happens when someone tries to approach a victim closely


enough to steal their credentials, such as a password or PIN
number, in public places like ATMs or through a video camera setup.
a. Social Engineering
b. Shoulder Surfing
c. Phishing
d. Synthetic Identity Theft

14. To get credit, goods, services, or benefits, someone commits


this fraud by using the identity or information of another person.
a. Account Takeover
b. True Name
c. Financial Identity Theft
d. Identity Theft

15. A type of identity theft occurs when someone digs through


someone else's trash to collect private information from things like
credit card bills, utility bills, health insurance, and bank records.
a. Dumpster Diving
b. True Name
c. Mail Theft
d. Identity Theft

16. A type of identity theft occurs when someone picks your


mailbox as their target and removes mail with important information.
a. Dumpster Diving
b. True Name
c. Mail Theft
d. Identity Theft
17. A delicate balance between safeguarding sensitive
information, protecting individuals' privacy rights, and ensuring the
security of an organization's assets.
a. Monitoring
b. Intrusion
c. Monitoring and intrusion
d. Security Privacy

18. A security process that involves using tools and policies to


monitor network traffic and devices to identify potential
vulnerabilities, suspicious activity, and signs of potential breaches.
a. Monitoring
b. Intrusion
c. Monitoring and intrusion
d. Security Privacy

19. Helps organizations protect their digital assets, ensure


compliance, and respond effectively to security incidents to minimize
potential damage. Balancing security with privacy and ethical
considerations is crucial to implementing these practices
responsibly.
a. Monitoring
b. Intrusion
c. Monitoring and intrusion
d. Security Privacy

20. Usually accomplished by taking advantage of a system that is


not properly configured, a known vulnerability that was not patched,
or weak security implementations such as a blank or easily guessed
password.
a. Monitoring
b. Intrusion
c. Monitoring and intrusion
d. Security Privacy

21. The illegal act of gathering and relaying sensitive information


without authorization, usually on behalf of a foreign government or
its agents.
a. Account Takeover
b. True Name
c. Espionage
d. Cyber espionage

22. A type of cyberattack conducted by a threat actor (or cyber


spy) who accesses, steals, or exposes classified data or intellectual
property (IP) with malicious intent in order to gain an economic,
political, or competitive advantage in a corporate or government
setting.
a. Account Takeover
b. True Name
c. Espionage
d. Cyber espionage

23. To reduce the attack surface, restrict user and system access
to only what is required for their responsibilities. Review user and
system access privileges frequently to make sure they are relevant
and required.
a. Strong Cybersecurity Practices
b. Employee Training and Awareness
c. Access Control
d. Cyber espionage

24. To prevent illegal access, employ multi-factor authentication


(MFA) for user accounts. Utilize strong unique passwords and multi-
factor authentication.
a. Strong Cybersecurity Practices
b. Employee Training and Awareness
c. Access Control
d. Cyber espionage

25. Create and enforce security policies and best practices for
employees to adhere to, including rules for handling sensitive
information and strong password policies.
a. Strong Cybersecurity Practices
b. Employee Training and Awareness
c. Access Control
d. Cyber espionage

26. It involves collecting and analyzing information from a variety


of sources to build a complete picture of the subject or situation in
question.
a. Source Diversification
b. Intelligence gathering
c. Collaborate with others
d. Cyber intelligence

27. The systematic process of gathering, analyzing, and


interpreting digital information and data to gain insights into cyber
threats, vulnerabilities, and cyber actors' activities.
a. Source Diversification
b. Intelligence gathering
c. Collaborate with others
d. Cyber intelligence

28. It is an important part of any professional investigation.


a. Source Diversification
b. Intelligence gathering
c. Collaborate with others
d. Cyber intelligence

29. Protection against Shoulder Surfing


a. Be cautious when downloading or installing programs online.
b. Be aware of your surroundings when accessing password- or
PIN-requiring accounts in public.
c. Stay vigilant, avoid sharing personal information, obtain contact
numbers if unsure, verify identification, and confirm with others or
the company the person represents if necessary.
d. Identity theft warning signs include newly opened credit cards or
loans in your name.

30. Protection against Social Engineering


a. Be cautious when downloading or installing programs online.
b. Be aware of your surroundings when accessing password- or
PIN-requiring accounts in public.
c. Stay vigilant, avoid sharing personal information, obtain
contact numbers if unsure, verify identification, and confirm
with others or the company the person represents if necessary.
d. Identity theft warning signs include newly opened credit cards or
loans in your name.
Answer Key

1. b. True Name
2. d. Identity Theft
3. b. Criminal Identity Theft
4. c. Identity Cloning for Concealment
5. a. Account Takeover
6. b. Impersonation
7. b. Medical Identity Theft
8. a. Tax-related Identity Theft
9. d. Child Identity Theft
10. d. Synthetic Identity Theft
11. a. Social Engineering
12. c. Phishing
13. b. Shoulder Surfing
14. c. Financial Identity Theft
15. a. Dumpster Diving
16. c. Mail Theft
17. c. Monitoring and intrusion
18. a. Monitoring
19. c. Monitoring and intrusion
20. b. Intrusion
21. c. Espionage
22. d. Cyber espionage
23. c. Access Control
24. a. Strong Cybersecurity Practices
25. b. Employee Training and Awareness
26. b. Intelligence gathering
27. d. Cyber intelligence
28. b. Intelligence gathering
29. b. Be aware of your surroundings when accessing password- or
PIN-requiring accounts in public.
30. c. Stay vigilant, avoid sharing personal information, obtain contact
numbers if unsure, verify identification, and confirm with others or the
company the person represents if necessary.

You might also like