Identity Theft

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If an individual suspects their identity has been stolen they should report their concerns to the Federal Trade Commission.

True

A password is 4 characters long and must consist of 3 letters and 1 of 10 special characters. If letters can be repeated and the special character is at the end of the password, how many possibilities are there? a. 175,760 b. 456,976 c. 703,040 d. 1,679,616

a. 175,760

How many four-digit personal identification numbers (PIN) are possible if the PIN cannot begin or end with a 0 and the PIN must be an even number? a. 3,600 b. 4,000 c. 4,500 d. 8,100

a. 3,600

Koshi creates a password as follows: number, special character, letter, letter, number If there are 12 special characters and Koshi does not repeat a letter or number, how many possibilities are there for his password? a. 702,000 b. 730,080 c. 780,000 d. 811,200

a. 702,000

What does the Fair and Accurate Credit Transactions Act provide for consumers? a. It entitles consumers to get one free credit report per year from the big three reporting agencies. b. It entitles consumers to notify credit reporting agencies if their identity is stolen. c. It entitles consumers to file a complaint with the Federal Trade Commission if their identity is stolen. d. It entitles consumers to find out about who has access to personal information and if it is being handled securely.

a. It entitles consumers to get one free credit report per year from the big three reporting agencies.

A three-character password is to be created by choosing characters from the digits 0 through 5 inclusive, vowels (a, e, i, o, u), or 5 special keyboard characters. If only one character category can be used at a time, rank the following from smallest to largest based on the number of possibilities for a password. 1. digit, digit, vowel 2. vowel, special character, vowel 3. special character, vowel, digit a. 1, 3, 2 b. 2, 3, 1 c. 3, 2, 1 d. They are all equal.

b. 2, 3, 1

How many four-digit personal identification numbers (PIN) are possible if the PIN cannot begin with a 0 and the PIN must be an odd number? a. 5,000 b. 4,500 c. 3,600 d. 500

b. 4,500

How many different 4-digit personal identification numbers are possible if no digit can be used twice? a. 1,000 b. 5,040 c. 9,000 d. 10,000

b. 5,040

How many 4-digit personal identification numbers are possible if the number cannot contain a zero? a. 5,040 b. 6,561 c. 9,000 d. 10,000

b. 6,561

Malaya creates a password as follows: letter, number, letter, special character, number Assuming that there are 12 special characters, if you were trying to guess Malaya's password, what is the most guesses that you would have to make? a. 702,000 b. 811,200 c. 205,476,480 d. 254,803,968

b. 811,200

Which of the following steps is most effective in protecting yourself from identity theft? a. Throw away credit card applications in the garbage. b. Shred all mail with personal information before discarding it. c. Place your old bank statements in the recycle bin. d. Carry all your passwords in your wallet or purse.

b. Shred all mail with personal information before discarding it.

When creating passwords for secure accounts, which of the following rules should you apply? a. use personal information that is easy to remember b. use a variety of letters, numbers and characters c. use a sequence or pattern of numbers d. use the same password for all accounts

b. use a variety of letters, numbers and characters

A password is 4 characters long and must consist of 3 letters and one number. If letters cannot be repeated and the password must end with a number, how many possibilities are there? a. 175,760 b. 158,184 c. 156,000 d. 140,400

c. 156,000

A 7 character computer password is made up of 4 letters followed by 3 numbers. How many different passwords are possible? a. 333,135,504 b. 358,800,000 c. 456,976,000 d. 78,364,164,096

c. 456,976,000

Which of the following best describes a way of safeguarding personal information? a. Allison removes one check to pay her electric bill and then locks her checkbook in the car when she goes in to pay it. b. Byron gives his credit card number to a telephone solicitor, but only after getting the person's name. c. Jenika has the cashier run her debit card as a credit purchase, rather than debit, to avoid having to enter her PIN. d. Lydell reads and signs the privacy policy at his doctor's office that says they only share information with pharmaceutical companies.

c. Jenika has the cashier run her debit card as a credit purchase, rather than debit, to avoid having to enter her PIN.

An identity thief watches someone enter a four-digit PIN and manages to see that the first digit is 3. They also know that the second digit is either 4 or 7. If the thief tries guessing the PIN, how many possibilities would there be? a. 100 b. 162 c. 180 d. 200

d. 200

How can thieves steal an identity? I. dumpster diving II. phishing III. changing others' addresses IV. skimming a. I & II only b. II & III only c. I, II, and III only d. I, II, III, and IV

d. I, II, III, and IV

In the wrong hands, which of the following pieces of personal information would present the greatest risk for identity theft? a. address b. date of birth c. mother's maiden name d. social security number

d. social security number


Set pelajaran terkait

Ch 2 LS - Advanced Financial Accounting

View Set

Chapter 2 - Mendal's Laws (part II)

View Set

English IV: Early British History - Celts, Romans, Anglo-Saxons, Vikings

View Set

Solar System, Galaxies & Universe

View Set

IS Arab-Israeli Conflict and The Middle East Map Quiz

View Set