This type of fraud involves criminals posing as legitimate institutions to trick individuals into providing sensitive information.
What is phishing?
Name the two-factor authentication methods that enhance the security of online banking?
What are SMS codes and Authenticator apps?
What is the most important element related to evidence in addition to the evidence itself?
What is a Chain of custody document?
What is subject to SQL injection attacks?
What is Database Servers?
Which security zone can serve as a buffer network between a private secured network and the untrusted internet?
What is DMZ?
How can social engineering tactics be used in identity theft, and how can you avoid falling victim to them?
What is manipulating individuals into divulging confidential information, and why should you verify requests for personal information?
What precautions should you take when using public Wi-Fi to access your banking accounts?
What is using a virtual private network (VPN) for added security?
What is an important aspect of evidence gathering?
What is Backing up all log files and audit trails?
What enters random data to the inputs of an application?
What is Fuzzing?
Which remote access authentication protocol allows for the use of smart cards for authentication?
What is EAP?
This term refers to the practice of obtaining someone's personal information with the intent to commit fraud.
What is identity theft?
How can regularly checking your credit report contribute to identity theft protection?
What is identifying and addressing any unauthorized or suspicious activity?
Which type of cipher changes the position of the characters in a plain text message?
What is Transposition?
What is the term for the process of validating a subject's identity?
What is Authentication?
What encryption method is used by WPA for wireless networks?
What is TKIP?
What precautions should be taken when sharing personal information over the phone to prevent identity theft?
What is confirming the identity of the caller and /or avoiding sharing sensitive information unless necessary?
This document, often containing personal details, should be stored securely to prevent identity theft.
What is your social security card?
Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims?
What is Spamming?
What is the single best rule to enforce when designing complex passwords?
What is Longer passwords
What networking devices or services prevents the use of IPSec in most cases?
What is NAT?
This type of identity theft involves using someone else's personal information to obtain medical services or prescriptions.
What is medical identity theft?
Why is it important to create strong and unique passwords for online banking accounts?
What is to help prevent unauthorized access?
Which is the cryptography mechanism that hides secret communications within various forms of data?
What is Steganography?
What type of attack is a form of software exploitation that transmits or submits a longer stream of data than the input variable is designed to handle?
What is Buffer overflow?
What is modified in the most common form of spoofing on a typical IP packet?
What is a source address?