Fraud Techniques

Contents

Results

-

#1. 1. What is phishing?

#2. 2. Which of the following is a common characteristic of phishing emails?

#3. 3. What is pretexting?

#4. 4. Which of the following is a social engineering technique involving creating a fake online presence to deceive individuals?

#5. 5. What is vishing?

#6. 6. What is ransomware?

#7. 7. Which type of fraud involves redirecting website traffic to a fraudulent site without the user's knowledge?

#8. 8. What is the purpose of a CAPTCHA?

#9. 9. What is a keylogger?

#10. 10. What is the primary goal of a man-in-the-middle (MitM) attack?

#11. 11. What is spear phishing?

#12. 12. What is the purpose of a firewall in the context of internet security?

#13. 13. What is two-factor authentication (2FA)?

#14. 14. What is the term for creating a fake website that imitates a legitimate one to deceive users?

#15. 15. What is the primary purpose of a VPN (Virtual Private Network)?

#16. 16. Which of the following is an example of a physical security measure to prevent fraud?

#17. 17. What is the term for a fraudulent email claiming to be from a trustworthy source in order to trick individuals into revealing personal information?

#18. 18. What is the purpose of end-to-end encryption?

#19. 19. What is social engineering?

#20. 21. What is a security token?

#21. 22. Which type of attack involves flooding a network with traffic to make it unavailable to users?

#22. 23. What is the term for creating a fake email address to deceive individuals?

#23. 24. What is the purpose of antivirus software?

#24. 25. What is the term for the unauthorized access and use of someone else's information or accounts?

#25. 26. What is the term for a security measure that requires users to prove their identity through unique biological characteristics?

#26. 27. What is the purpose of secure sockets layer (SSL) or transport layer security (TLS)?

#27. 28. What is the term for a fraudulent phone call that uses social engineering to manipulate individuals into providing sensitive information?

#28. 29. What is the term for a security measure that uses a combination of letters, numbers, and symbols to protect information?

#29. 30. What is the purpose of a security audit in the context of fraud prevention?

Finish