
23. Impersonation and Identity Fraud
Authored by Jennifer Clark
Professional Development
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of an attacker using impersonation?
To entertain the victim
To provide technical support
To sell products
To gain the victim's trust and extract information
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of Vishing?
Hacking into a computer system
Calling someone and pretending to be from their bank to get their account details
Sending a fake invoice
Sending a phishing email
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do attackers use identity fraud to open a bank account?
By using their own information
By using stolen personal information of the victim
By hacking into the bank's system
By bribing bank officials
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do if someone calls asking for your password to fix a problem on your computer?
Give them the password immediately
Verify their identity through a public phone number
Ignore the call
Provide them with your social security number instead
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common sign that a call might be a scam?
The caller asks for sensitive information
The caller claims to be from a high-ranking position
All of the above
The caller uses technical jargon
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?