Search Header Logo

7.2 ID Theft Review

Authored by Paul Johnson

7th Grade

Used 24+ times

7.2 ID Theft Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ is when a thief watches you punch in your credit card number, debit card pin, or listens to you give a friend your address.

Phishing
Pharming
Skimming
Shoulder surfing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ occurs when someone wrongfully obtains or takes your personal information and uses it.

Insurance
Personal identity
Identity theft
Dumpster diving

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________________ is when thieves go searching through dumpsters, trash cans, recycling bins, and even trash heaps at the landfill to find personal information.

Dumpster diving
Trash can diving
Recycle diving
Identity theft

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

___________________ is when thieves steal your existing credit card information and reroute your bills after they run up a balance.

Bank fraud
Credit card fraud
Finance fraud
Government document fraud

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Before you enter your personal information online, you should find out:

How the company collecting your information will protect it.
Why the company needs it.
With whom it might be shared.
All of these.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Carson's wallet with his driver's license, a debit card and his credit card has been stolen. Which of the following is NOT something an identity thief might realistically do with this information?

Take a college admissions exam in Carson's name.
Rent an apartment under Carson's name
Use Carson's name during an arrest
Make purchases with Carson's credit card

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Identity thieves can also steal your personal information from websites and computers. Common steps to protect your information online include:

creating unique passwords, giving your passwords out, and deleting your history
creating simple passwords, keeping passwords safe, and avoiding unfamiliar websites
creating unique passwords, keeping passwords safe, and clicking on all links
creating unique passwords, keeping passwords safe, and avoiding unfamiliar websites

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?