Identity Theft/Scams Quiz

Identity Theft/Scams Quiz

9th - 12th Grade

21 Qs

quiz-placeholder

Similar activities

Law & Ethics

Law & Ethics

Cybersecurity Scams Quiz

Cybersecurity Scams Quiz

Don't Fall for Fake - Vocabulary

Don't Fall for Fake - Vocabulary

Biz Law Ch 8 Review

Biz Law Ch 8 Review

PIT Ch. 33 Issues for Computer Users Review

PIT Ch. 33 Issues for Computer Users Review

Cybersecurity - Quarterly 1

Cybersecurity - Quarterly 1

Identity Theft/Scams Quiz

Identity Theft/Scams Quiz

Assessment

Quiz

Mathematics

9th - 12th Grade

Practice Problem

Easy

CCSS
RI.9-10.7, RI.11-12.10, RI.9-10.4

+30

Standards-aligned

Created by

Matthew Bird

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method used by identity thieves to capture credit card information?

Phishing

Skimming

Dumpster diving

Data breach

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key strategy to protect yourself from identity theft when dealing with emails?

Always open attachments from unknown senders.

Use the same password for all accounts.

Avoid opening attachments from unknown emails.

Share personal information freely over email.

Tags

CCSS.RI.11-12.10

CCSS.RI.6.10

CCSS.RI.7.10

CCSS.RI.8.10

CCSS.RI.9-10.10

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following actions can help protect your credit information?

Ignoring your credit report.

Regularly monitoring your credit report.

Using unsecured public Wi-Fi for banking.

Sharing your credit card details over the phone.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If you become a victim of identity theft, what is one of the first steps you should take?

Ignore the issue and hope it resolves itself.

Get replacement credit cards.

Continue using the compromised accounts.

Share your experience on social media.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a recommended practice for managing social media to protect against identity theft?

Sharing your full address and phone number publicly.

Using the same password for all social media accounts.

Carefully managing privacy settings and sharing limited personal information.

Accepting friend requests from unknown individuals.

Tags

CCSS.RI.11-12.7

CCSS.RI.9-10.7

CCSS.RL.11-12.7

CCSS.RL.8.7

CCSS.RL.9-10.7

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if your credit history is compromised due to identity theft?

Ignore the issue and continue using your accounts.

Freeze your credit histories to prevent further damage.

Share your credit card details with friends for safekeeping.

Close all your bank accounts immediately.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is when someone steals your information over email

Phishing

Vishing

Skimming

Dumpster Diving

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?