Test your knowledge

Choose wisely. There is only one correct answer to each question.

0%
Keep studying!
Review your answers below to learn more.
1.
Trojans and spyware are examples of _______.
Choose wisely. There is only one correct answer.
Malware. Malware is software that damages or disables computers.
2.
Why might scammers go to great lengths to detail the intricate aspects of the scams they present?
Choose wisely. There is only one correct answer.
Detail makes it look legitimate. It can look more like a legitimate opportunity when there are details involved.
3.
Which of the following are ways to protect your computer from intrusion for identity theft?
Choose wisely. There is only one correct answer.
All of the above. Using all of these steps can help ensure that your PC is protected.
4.
Under the Fair Credit Reporting Act, you can be exempted from direct mail solicitations that are based on lists obtained from credit bureaus.
Choose wisely. There is only one correct answer.
True. You have the right to not be included in them.
5.
It is a felony to use another person's identity to commit an unlawful act.
Choose wisely. There is only one correct answer.
True. The Identity Theft and Assumption Deterrence Act was established by Congress in 1998 to address this.
6.
What is an identity theft affidavit?
Choose wisely. There is only one correct answer.
It is a form provided by the Federal Trade Commission that creditors may accept when you claim you are not responsible for new transactions. The information you provide will help creditors investigate your claim.
7.
If a salesman is promoting an investment opportunity as being limited to just a few people, that means it is likely legitimate.
Choose wisely. There is only one correct answer.
False. Generally, describing such an opportunity as limited to just a few people is a sign of a scam. It is designed to make you feel special and therefore willing to give up your money.