(GUARANTEED SUCCESS)
According to the FTC, Texas was __________ in the nation in the instances of identity fraud reported in
2002.
A. first
B. fifth
C. tenth
D. twentieth - answer B. fifth
Identity Crime is the theft or misuse of personal or financial identifiers in order to gain
______________________________________.
A. something of value
B. a personal identification number
C. an access code
D. an access identification number - answer A. something of value
Which of the following is true about identity crime?
A. It is mostly limited to the Internet.
B. It frequently begins with a seemingly unrelated crime.
C. It is not related to violent crime or terrorism.
D. It has become a major cause of insurance rate increases. - answer B. It frequently begins with a
seemingly unrelated crime
such as robbery (e.g. purse snatching or mugging), computer intrusion, mail theft, theft of trash
("dumpster diving"), or theft of documents or information from businesses, medical facilities, hotels, etc.
, Which of the following is a financial identifier?
A. Billing address
B. Social security number
C. Passport numbers
D. PIN (Personal Identification Number) - answer D. PIN (Personal Identification Number)
Also, credit card numbers, bank account numbers, insurance account numbers, etc.
Current trends of identity theft involve the use of __________________________________.
A. medical and insurance records
B. technological devices
C. altered credit cards
D. elderly victims - answer B. technological devices
Which of the following is an example of business record theft?
A. Taking patient files from a hospital
B. Obtaining credit information by posing as a landlord
C. Filling out a false change of address form
D. Stealing a bank statement from someone's mailbox. - answer A. Taking patient files from a hospital
Identity thieves can get information from the workplace, in a practice known as "business record theft,"
by stealing files out of offices where you are a customer, employee, patient or student, by bribing an
employee who has access to your files, or by "hacking" into electronic files.
Which of the following would be easy for a criminal to find online or in a store?