
J808 LO4 Threats Recap
Authored by Rachel Pugh
Computers
7th - 11th Grade
Used 37+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Using a person’s name or personal information without permission to make purchases or get loans is called
fraud.
acting.
identity theft.
impersonation.
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
People who attempt to swindle or trick you into illegal schemes are commonly called
schemers.
con artists.
film flames.
embezzlers.
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following steps would help reduce your potential of being a victim of consumer fraud?
Delete all e-mails asking for personal information without responding to them.
Go along with a scheme so you get more information and then report it to local law enforcement officials.
If you get a special offer in the mail, send cash so they cannot get your personal information from a check or credit card.
Give your best friends your personal information, like your Social
Security number and bank account number(s), in case anything happens to you.
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
The MOST secure password for Internet or other uses should include
your first name or birthday.
a series of letters than mean nothing.
your Social Security number.
a combination of numbers and letters.
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following is NOT a good way to protect yourself from being a fraud victim?
Enter your personal information on a Web site so you can get more information before deciding on an investment.
Take time to do careful research before giving money or personal information.
Avoid letting emotions interfere with financial decisions.
Get all information in writing before giving money or personal information.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is the most appropriate definition of a hacker?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is meant by the term 'white hat hacker'?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?