Quiz Identity Theft
Quiz Identity Theft
Quiz Identity Theft
1. When identity thieves commit this fraud, they register new accounts
using the victim's information, make expensive purchases they never
pay for, then switch the billing address to conceal the unpaid
account.
a. Account Takeover
b. True Name
c. Financial Identity Theft
d. Identity Cloning for Concealment
9. Often, it is not found until the victim makes an application for student
loans or other forms of credit.
a. Tax-related Identity Theft
b. Medical Identity Theft
c. Financial Identity Theft
d. Child Identity Theft
12. False emails, texts, phone calls, or websites that are intended
to deceive users into downloading malware or disclosing private
information such as Social Security and credit card numbers, bank
account details, login passwords, or other sensitive information.
a. Social Engineering
b. Shoulder Surfing
c. Phishing
d. Synthetic Identity Theft
23. To reduce the attack surface, restrict user and system access
to only what is required for their responsibilities. Review user and
system access privileges frequently to make sure they are relevant
and required.
a. Strong Cybersecurity Practices
b. Employee Training and Awareness
c. Access Control
d. Cyber espionage
25. Create and enforce security policies and best practices for
employees to adhere to, including rules for handling sensitive
information and strong password policies.
a. Strong Cybersecurity Practices
b. Employee Training and Awareness
c. Access Control
d. Cyber espionage
1. b. True Name
2. d. Identity Theft
3. b. Criminal Identity Theft
4. c. Identity Cloning for Concealment
5. a. Account Takeover
6. b. Impersonation
7. b. Medical Identity Theft
8. a. Tax-related Identity Theft
9. d. Child Identity Theft
10. d. Synthetic Identity Theft
11. a. Social Engineering
12. c. Phishing
13. b. Shoulder Surfing
14. c. Financial Identity Theft
15. a. Dumpster Diving
16. c. Mail Theft
17. c. Monitoring and intrusion
18. a. Monitoring
19. c. Monitoring and intrusion
20. b. Intrusion
21. c. Espionage
22. d. Cyber espionage
23. c. Access Control
24. a. Strong Cybersecurity Practices
25. b. Employee Training and Awareness
26. b. Intelligence gathering
27. d. Cyber intelligence
28. b. Intelligence gathering
29. b. Be aware of your surroundings when accessing password- or
PIN-requiring accounts in public.
30. c. Stay vigilant, avoid sharing personal information, obtain contact
numbers if unsure, verify identification, and confirm with others or the
company the person represents if necessary.