Podcast
Questions and Answers
Which of the following is NOT a common way that identity thieves get hold of your data?
Which of the following is NOT a common way that identity thieves get hold of your data?
- Physical appearances (correct)
- Unsecure browsing
- Data breaches
- Dark web marketplaces
What kind of information can be stolen in identity theft?
What kind of information can be stolen in identity theft?
- Name and address
- Social Security number
- Account numbers for credit cards, bank accounts, or medical insurance
- All of the above (correct)
What is a data breach?
What is a data breach?
- When someone gains access to an organization's data without authorization (correct)
- When someone physically steals your personal information
- When someone impersonates you
- When someone shares your personal information on the dark web
Which of the following is NOT a recommended action to protect your information when shopping online?
Which of the following is NOT a recommended action to protect your information when shopping online?
What should you do if you suspect identity fraud?
What should you do if you suspect identity fraud?
Which of the following is NOT a recommended action to protect your information at home?
Which of the following is NOT a recommended action to protect your information at home?
What is the purpose of placing a fraud alert on your credit reports?
What is the purpose of placing a fraud alert on your credit reports?
Which of the following is NOT a method used by identity thieves to steal personal information?
Which of the following is NOT a method used by identity thieves to steal personal information?
What is one potential consequence of identity fraud?
What is one potential consequence of identity fraud?
Which of the following is NOT a way to protect your personal information and lower your risk of identity theft?
Which of the following is NOT a way to protect your personal information and lower your risk of identity theft?
What can an identity thief do if they gain access to your credit card information?
What can an identity thief do if they gain access to your credit card information?
Which of the following is NOT a common type of information stolen in data breaches?
Which of the following is NOT a common type of information stolen in data breaches?
What is one potential consequence of identity fraud?
What is one potential consequence of identity fraud?
What is the purpose of placing a fraud alert on your credit reports?
What is the purpose of placing a fraud alert on your credit reports?
What is one potential consequence of credit card theft?
What is one potential consequence of credit card theft?
Which of the following is NOT a method used by identity thieves to steal personal information?
Which of the following is NOT a method used by identity thieves to steal personal information?
What is a skimming device used for by identity thieves?
What is a skimming device used for by identity thieves?
What can an identity thief do if they gain access to your personal information?
What can an identity thief do if they gain access to your personal information?
Which of the following is NOT a recommended action to protect your information when shopping online?
Which of the following is NOT a recommended action to protect your information when shopping online?
What is one potential consequence of identity fraud?
What is one potential consequence of identity fraud?
What is the purpose of placing a fraud alert on your credit reports?
What is the purpose of placing a fraud alert on your credit reports?
What should you do if you suspect identity fraud?
What should you do if you suspect identity fraud?
Flashcards are hidden until you start studying