Online Test Review Personal Finance Objective 7.03 Identity Theft

Online Test Review Personal Finance Objective 7.03 Identity Theft

Online Test Review Personal Finance Objective 7.03 Identity Theft

Directions: Before answering the review questions, go to the following website. Play Identity Theft Face Off Game! 

http://www.onguardonline.gov/games/id-theft-faceoff.aspx

Save the document to your name on the school network. Name the file- YOUR NAME - 7.03 TEST REVIEW. Highlight your answers in yellow. We will go over correct answers in class to review before test.

  1. While Michael was sleeping, his friend used his credit card number to make online purchases. This illustrates what?
  2. Direct deposits and withdrawals
  3. Fraud
  4. Online banking
  5. Pay-by-phone transfers
  1. Thieves in another state withdrew all the money from Cynthia’s account. What financial transaction was MOST LIKELY used?
  2. Electronic funds transfer
  3. Direct deposit and withdrawal
  4. Pay-by-phone transfer
  5. Point-of-sale transfer
  1. When Sharon read the website’s privacy policy, she found that it advised visitors to notify the store to “opt out” if they did not want their personal information shared. She concluded that Not “opting out” would do what?
  2. Mean their information would be shared with other businesses
  3. Prevent having cookies placed in their browsers
  4. Require them to carry a credit card in their wallets
  5. Require them to print their Social Security number on checks
  1. Deb is at the ATM kiosk at the mall. Someone is standing very close to her and Deb is uncomfortable and concerned they are trying to see her PIN. What should Deb do?
  2. Call 911 and report a theft
  3. Hit them in the nose as hard as she can
  4. Step away from ATM and return a few minutes later
  5. Text her mother a picture of the person
  1. Which is an example of sensitive personal information typically found on financial statements?
  2. Internet service provider’s number
  3. Stop payment requests
  4. Your cell phone number
  5. Your Social Security number
  1. Scott warned his younger brother not to post a photo of his credit card on Facebook. What form of identity theft is he seeking to avoid?
  2. Obtaining personal information from one’s home
  3. Obtaining personal information submitted on the Internet
  4. Using card readers to swipe a card and capture the card number
  5. Using technology to capture credit card number from magnetic strip
  1. Identity thieves MOST LIKELY would use stolen credit cards, payroll, or tax information to:
  2. Obtain jobs
  3. Pose as representatives of banks
  4. Post personal information on the internet
  5. Write checks on the account
  1. Which is a way to protect sensitive personal information?
  2. Asking companies not to use your Social Security number
  3. Making financial transactions on an insecure site
  4. Printing your Social Security number on your checks
  5. Sharing your passwords with friends
  1. Tony bought hunting camouflage online at Bass Pro Shoppes website. After making the purchases, he received a discount coupon to be used for his next camouflage purchase. What is the store doing?
  2. Hacking sensitive personal info
  3. Marketing their goods based on customer preferences
  4. Obtaining personal information from the internet
  5. Using EFTs for transactions
  1. Thieves stole Trish’s wallet with her credit cards. Trish reported the theft to the credit card company that afternoon. How much will she be liable for if the thieves have used the cards?
  2. $25
  3. $50
  4. $250
  5. Nothing
  1. A thief steals a pre-approved credit card application from Cara’s mailbox? What does the thief do with it without Cara’s knowledge or consent?
  2. Cashes Cara’s check
  3. Opens new accounts
  4. Buys merchandise
  5. Obtains Cara’s tax refund
  1. A thief steals Cara’s credit card from her pocketbook. What does the thief do without Cara’s knowledge or consent?
  2. Cashes Cara’s check
  3. Opens new accounts
  4. Buys merchandise
  5. Obtains Cara’s tax refund
  1. Which of the following are opportunities for exposure to identity theft?
  2. Electronic funds transfers
  3. Direct deposits
  4. Pay by phone transfers
  5. All of the above
  1. Thieves illegally used Chester’s personal identification to withdraw money from his checking account. What is this called?
  2. Dumpster diving
  3. Identity theft
  4. Phishing
  5. Skimming
  1. To safely mail her bills, what should Margot do?
  2. Immediately mail from home mail box
  3. Mail from a US post office
  4. Use email
  5. Use e-commerce sites
  1. Travis’s bank account was accessed by a hacker. The hacker transferred the stolen money to his offshore bank account. Which transactions will he most likely access?
  2. Payroll check direct deposit
  3. Pay utility bill by phone
  4. Electronic funds transfer
  5. Point of sale transfer
  1. Will Helms, whose birthday is March 10th, wants to choose a new safe password for online banking. Which should he use?
  2. 098765432
  3. His birthday
  4. Hl&76mN46
  5. WillHelms310
  1. The thief hunted for discarded personal information by digging through garbage cans. What is this an example of?
  2. Diverting mail
  3. Dumpster diving
  4. Skimming
  5. Spyware
  1. Martin attached a device to the ATM machine that copies and store the debit and credit card information after it is read. Martin uses the info to purchase goods using the victim’s credit cards. What type of identity theft does this illustrate?
  2. Diverting mail
  3. Dumpster diving
  4. Skimming
  5. Spyware
  1. Emma received a phone call from a representative at her bank asking her to provide the bank account and PIN. What should she do?
  2. Contact the bank to confirm the caller was a bank employee
  3. Contact the EEOC
  4. Provide the caller with the information requested
  5. Refuse to provide the info and hang up
  1. Bumstead Corporation has a website for online customers. Their webmaster uses specific safeguards so that customers can be comfortable with the safety of doing business online. What does this represent?
  2. Card readers.
  3. Cookies
  4. Phishing
  5. Secure site
  6. What are thieves looking for when they hack into your computer?
  7. bank info
  8. credit card #
  9. social security #
  10. all of the above
  1. A mortgage company “representative” called Pete and asked questions about his loan and refinancing options. Pete realized it might be a scam when the representative asked for his social security #s and bank account #s. What was the “representative” doing?
  2. Card reading
  3. On line profiling
  4. Phishing
  5. Skimming
  1. Warren’s identity was stolen. He reported the fraud to Experian, Equifax and TransUnion. What type of organizations are these?
  2. Federal government agencies enforcing FTC laws
  3. Independent Credit Bureaus gathering credit data
  4. Justice department organizations headed by the attorney general
  5. State Consumer Organizations
  1. Which ones have legitimate reasons for requesting personal information?
  2. Health care providers, marketing companies, insurance companies
  3. Health care providers, online service providers, marketing companies
  4. Marketing companies, payroll clerks, insurance companies
  5. Payroll clerks, insurance companies, health care providers
  1. Anthony wants to make it difficult for someone to steal his identity. What should he do?
  2. Avoid mailing letters and packages at a U. S. Post Office
  3. Get a new Social Security number every year
  4. Never use cash to make purchases
  5. Tear or shred documents containing personal information before throwing them away