Search Header Logo

23. Impersonation and Identity Fraud

Authored by Jennifer Clark

Professional Development

Professional Development

Used 1+ times

23. Impersonation and Identity Fraud
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of an attacker using impersonation?

To entertain the victim

To provide technical support

To sell products

To gain the victim's trust and extract information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of Vishing?

Hacking into a computer system

Calling someone and pretending to be from their bank to get their account details

Sending a fake invoice

Sending a phishing email

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do attackers use identity fraud to open a bank account?

By using their own information

By using stolen personal information of the victim

By hacking into the bank's system

By bribing bank officials

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if someone calls asking for your password to fix a problem on your computer?

Give them the password immediately

Verify their identity through a public phone number

Ignore the call

Provide them with your social security number instead

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common sign that a call might be a scam?

The caller asks for sensitive information

The caller claims to be from a high-ranking position

All of the above

The caller uses technical jargon

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?