Identity Theft and Fraud

Identity Theft and Fraud

Are you ready to test your knowledge about identity theft and fraud? This ten-question multiple-choice quiz will explore identity theft and fraud methods and what you can do to protect yourself. After completing all ten questions, click "What's my grade?" at the end of the quiz to see how you did.

Correct!

Incorrect. You answered "". But the correct answer is "". Please make sure and read the information at the bottom to better understand the answer.

_______ is the practice of sending an e-mail that appears to originate from a financial institution, government agency, or other reputable entity. It contains a message that you must "verify" personal or confidential information by clicking a link.
According to the Federal Trade Commission, when individuals or organizations attempt to commit internet fraud by tricking consumers into giving out their personal information, it is called 'phishing.' If you are a phishing target, you should immediately delete email or text messages that request your personal information (i.e., account numbers, passwords, personally identifiable information). Also, do not reply or click on links or call phone numbers provided in the message. Those links typically take you to fake sites that resemble the real ones but are set up to steal your information.

Correct!

Incorrect. You answered "". But the correct answer is "". Please make sure and read the information at the bottom to better understand the answer.

If you think someone has misused your personal or financial information, the first thing you should do is:
The Federal Trade Commission recommends the first line of defense is to contact any one of the 'big 3' credit reporting agencies (Experian, Equifax, and TransUnion) to place a fraud alert on your credit report. If you call any one of them, they must share that fraud request with the others. Placing a fraud alert on your credit report can make it more difficult for accounts to be set up in your name, using the information the identity thief obtained.

Correct!

Incorrect. You answered "". But the correct answer is "". Please make sure and read the information at the bottom to better understand the answer.

If you are contacted via telephone by someone purporting to represent a financial institution you do business with and are asked to provide or update personal or account information, you should:
One of the tricks 'fraudsters' use when conducting phishing attacks is to call consumers on the phone, pretending to be one of your financial service providers. They'll request account information as part of their scam. You should never provide such information if you're not the one who initiated contact through a phone number designated by your financial provider when you opened your account.

Correct!

Incorrect. You answered "". But the correct answer is "". Please make sure and read the information at the bottom to better understand the answer.

To prevent identity thieves from finding personally identifiable information by looking through your trash, you should:
Documents containing personal information disposed of by placing them in the trash will pass through several processing stages before reaching their final resting place. Each of these stages presents an opportunity to have your personal information pass in front of individuals who might do you harm with that information. Financial institutions recommend that you shred or destroy these documents before placing them in the trash. And many financial institutions offer free shredding services to make it easy for you to protect this information.

Correct!

Incorrect. You answered "". But the correct answer is "". Please make sure and read the information at the bottom to better understand the answer.

If a crook opened a credit card account in your name and ran up thousands of dollars in charges, what's the most you be liable for?
Under the terms of the Fair Credit Billing Act (FCBA) and Electronic Funds Transfer Act (EFTA), your maximum liability for unauthorized use of your credit card is $50.00. However, if you report the card's loss before a fraudster uses the card, your liability drops to zero for any activity that occurs after your report.

Correct!

Incorrect. You answered "". But the correct answer is "". Please make sure and read the information at the bottom to better understand the answer.

You may be a victim of medical identity theft if:
Fraudsters use the names, birth dates, addresses, insurance policy numbers, and medical and billing information to create fake identities, file false claims, or buy drugs. And since your medical information is something you seldom check, fraud activity can go on for a long time without you even knowing about it. If it hits you, you may find your medical records with information that is not related to your actual medical history and huge financial claims for procedures you never had.

Correct!

Incorrect. You answered "". But the correct answer is "". Please make sure and read the information at the bottom to better understand the answer.

You're exposing yourself to potential credit card fraud if you:
Leaving your cards or receipts lying around can expose yourself to potential credit card fraud. It is best to keep track of your cards location and to destroy any cards that have no use.

Correct!

Incorrect. You answered "". But the correct answer is "". Please make sure and read the information at the bottom to better understand the answer.

Which of the following are not recommended security practices when setting up a wireless network in your home?
Generally, when we're talking about Internet security and your wireless router, we're talking about fraudsters gaining access to the wireless signal and not the router itself. Safeguards related to router signal security, such as secure data transmission, password security, and keeping fraudsters guessing about your setup, are the best ways to protect yourself.

Correct!

Incorrect. You answered "". But the correct answer is "". Please make sure and read the information at the bottom to better understand the answer.

You can make sure that the web page you are visiting is secure by:
HTTPS is a protocol for secure communication over a computer network. Properly configured by the website owner, HTTPS authenticates the website to the web server it is hosted on and provides data encryption between your web browser and the site´s web server that keeps your information secure and protected against hackers and fraudsters.

Correct!

Incorrect. You answered "". But the correct answer is "". Please make sure and read the information at the bottom to better understand the answer.

Which of the following are NOT popular online or computer-related scam methods?
Internet scams are everywhere. They range from Nigerian email scams that will couple a sob story with a big payday for you, to technical support scams that will make claims about problems with your computer for them to gain access to it, to phishing attacks where fraudsters impersonate a business in the hope that they can trick you into providing your personal or financial information.

You scored out of 10.

What's my grade?