Identity Theft Flashcards
To help prevent identity theft, businesses should strive to limit the personal information they collect from customers.
A. True
B. False
True
All the following are methods of identity theft prevention that are recommended for businesses EXCEPT:
A. Restricting the use of laptops to those employees who need them to do their jobs
B. Limiting employees from accessing the personal information of customers
C. Performing audits of practices involving the handling of information only when regulators require it
D. Conducting background checks on prospective employees when permitted by law to gather that information
C. Performing audits of practices involving the handling of information only when regulators require it
Credit card receipts, bank statements, and birthday cards can all provide dumpster divers with useful information for committing an identity theft scheme.
A. True
B. False
True
All the following are correct statements about identity theft EXCEPT:
A. Solicitations for pre-approved credit cards are especially valuable to identity thieves.
B. One way to conceal identity theft is to change the victim’s mailing address.
C. The type of malware that is most commonly associated with identity theft is ransomware.
D. Identity thieves often engage in pretexting by impersonating the victim’s bank.
C. The type of malware that is most commonly associated with identity theft is ransomware.
Which of the following BEST describes how a baiting scheme works in the context of identity theft?
A. Fraudsters use imitation websites to deceive computer users into entering sensitive data.
B. Fraudsters use telephone calls or voice messages to manipulate people into revealing personal or business information.
C. Fraudsters deceive victims into inserting data storage devices that have been infected with malware into their computers.
D. Fraudsters impersonate the victim’s bank to persuade the victim into releasing information.
C. Fraudsters deceive victims into inserting data storage devices that have been infected with malware into their computers.
Second-hand computers, media drives, and mobile phones are safe from identity thieves if the former owner has manually deleted all personal information from such devices.
A. True
B. False
False
Which of the following is an example of traditional identity theft?
A. Applying for a credit card using a real government identification number and a fake name
B. Using a child’s government identification number to create a false identity
C. Creating a fictitious name, birthdate, and address to apply for a loan
D. Stealing an individual’s personal information and opening an account under their name
D. Stealing an individual’s personal information and opening an account under their name
Traditional identity theft involves the use of entirely fabricated personal information or a combination of real and fabricated information to create a new identity.
A. True
B. False
False
Which of the following is a recommended step that individuals should take to protect themselves from identity theft?
A. Limit personal information shared on social media
B. Create unique answers for security questions
C. Use passwords that have at least eight characters
D. All of the above
D. All of the above
Employment identity theft occurs when a fraudster impersonates a business to commit financial fraud.
A. True
B. False
False
All the following are methods of identity theft prevention that are recommended for individuals EXCEPT:
A. Instructing the postal service to suspend mail during vacations
B. Using the same password or passphrase for all accounts
C. Using biometric authentication when available
D. Avoiding the use of unsecured, public Wi-Fi networks
B. Using the same password or passphrase for all accounts
Which of the following is a recommended step that businesses should take to protect their customers and employees from identity theft?
A. Only retain personal information for as long as it is necessary
B. Conduct regular employee training on best practices regarding the handling of information
C. Require employees to use complex passwords or passphrases
D. All of the above
D. All of the above
Susanna was arrested for committing a fraud scheme. During her arrest, she falsely identified herself as her cousin, Laura, so that the crime would be attributed to Laura instead of Susanna. This scheme is an example of which of the following?
A. Business identity theft
B. True name fraud
C. Criminal identity theft
D. Account takeover
C. Criminal identity theft