Phishing is the method of:
A. Using e-mail or other Internet applications to deceive people into disclosing valuable personal information.
B. Convincing a person to divulge personal information over the telephone.
C. Hacking into another's computer files to access personal information.
D. Hiring a con artist to steal personal information from a person.
Answer: A
Learn More :
Fraud Chapter 15
- Those most susceptible to consumer fraud are often:
- What is one way to determine if a Web site is secure or not?
- Which of the following institutions would not be very helpful to call in the event of identity theft?
- Which of the following is not listed in the chapter as a common characteristic of Nigerian scam letters?
- Which federal statute requires that credit reports can only be obtained for legitimate business needs?
- What does "https" stand for?
- What is the best defense against consumer fraud?
- Consumers should provide credit card numbers or bank account information over the telephone only when:
- The major reason that elderly people are so susceptible to telemarketing fraud is that they:
- Which of the following is a common characteristic of fraudulent money offer letters?
- If you become a victim of identity theft, you should first:
- The Gramm-Leach-Bliley Act gives you the right to:
- In order to protect yourself from identity theft, you should:
- Multilevel marketing companies: