Question 20
Which practice provides the strongest ongoing protection against identity theft?

No single action fully protects against identity theft. Criminals use multiple methods (data breaches, phishing, physical theft, social engineering), so your defense needs multiple layers too. A credit freeze blocks new account fraud. Unique passwords with two-factor authentication protect existing accounts. Regular credit report reviews catch anything that slips through. Together, these layers create a defense-in-depth strategy where each layer catches what the others might miss. The combination is far stronger than any individual measure.

Checking your credit score once a year
Using the same secure password for all financial accounts
Only shopping at physical stores, never online
Combining credit freezes, unique passwords with 2FA, and regular credit report reviews
D
Correct - multiple layers provide the strongest protection.
Think about layered defense, not a single action.
idtheft
20

The strongest protection combines multiple layers: (1) Credit freezes at all three bureaus block new account fraud. (2) Unique passwords with 2FA for each account prevent account takeovers. (3) Regular credit report reviews (stagger requests across bureaus quarterly) catch anything that slips through. Add to this: shredding sensitive documents, being cautious with SSN sharing, and monitoring financial statements. No single measure is sufficient - layered defense is the principle.

Question 19
If you suspect tax-related identity theft (someone filed a return using your SSN), what is the primary step with the IRS?

Tax-related identity theft typically becomes apparent when your legitimate tax return is rejected because someone already filed using your Social Security number, or when you receive an IRS notice about income you did not earn. The IRS has a dedicated process for handling these cases. The key steps involve formally notifying the IRS, protecting future filings, and documenting everything. Tax identity theft can take months to resolve fully, but starting the formal process immediately is critical to protecting your legitimate refund and preventing future occurrences.

Call 911 to report a federal crime
File IRS Form 14039 (Identity Theft Affidavit) and request an Identity Protection PIN
Close all your bank accounts and open new ones
C
Correct - Form 14039 starts the IRS identity theft process.
The IRS has a specific process for this.
idtheft
19

For tax-related identity theft: (1) File IRS Form 14039 (Identity Theft Affidavit) to alert the IRS. (2) Request an Identity Protection PIN (IP PIN) - a six-digit number that prevents anyone else from filing a return with your SSN. (3) Continue filing your legitimate return by paper if e-filing is rejected. (4) File a report at IdentityTheft.gov. The IRS Identity Theft Victim Assistance line (1-800-908-4490) can guide you through the process.

Question 18
Which is more secure for online account protection?

Not all two-factor authentication methods provide equal protection. SMS codes can be intercepted through SIM-swapping attacks, where criminals convince your carrier to transfer your number to their device. Security questions based on personal facts (mother's maiden name, first pet) can often be found through social media or public records. The hierarchy of security roughly follows: hardware keys (strongest), authenticator apps (strong), SMS codes (moderate), security questions (weakest). For your most important accounts, the strongest available option is worth the minor inconvenience.

SMS text message verification codes
Hardware security keys or authenticator app codes
Security questions based on personal information
Using the same strong password across all accounts
B
Correct - hardware keys and authenticator apps are most secure.
Think about which method is hardest for attackers to intercept.
idtheft
18

Hardware security keys (like YubiKey) and authenticator apps (like Google Authenticator or Authy) are significantly more secure than SMS verification. SMS codes can be intercepted via SIM-swapping attacks. Security questions are the weakest because answers can often be found through social media or public records. For maximum protection, use hardware keys for your most critical accounts (email, banking, investments).

Question 17
Under federal law, what is your maximum liability for unauthorized credit card charges if you report within 60 days of your statement?

Consumer protection laws provide important limits on your financial exposure when fraud occurs. The rules differ between credit cards and debit cards, and the timing of your report matters. For credit cards, federal law (the Fair Credit Billing Act) sets a specific maximum, and most issuers go further by offering zero-liability policies. Understanding these protections helps you prioritize which accounts to monitor most closely and why credit cards generally carry less fraud risk than debit cards for consumers.

$50
$250
$500
The full amount charged
A
Correct - the legal cap is $50 for credit cards.
Federal law caps this at a specific low amount.
idtheft
17

Under the Fair Credit Billing Act, your maximum liability for unauthorized credit card charges is $50 if reported within 60 days of the statement date. In practice, most major credit card issuers offer $0 fraud liability policies, meaning you pay nothing for unauthorized charges. Note: debit cards have different, less favorable rules - liability can reach $500 if not reported within 2 business days, making credit cards generally safer for fraud protection.

Question 16
What is "synthetic identity theft"?

Traditional identity theft involves a thief pretending to be you. But a newer, harder-to-detect form works differently. Instead of fully impersonating an existing person, criminals combine a real piece of information (often a Social Security number, frequently from a child or elderly person) with fabricated details to create an entirely new fake identity. This "person" then builds credit over time, eventually runs up large debts, and disappears. It is particularly hard to detect because the victim may not be actively monitoring credit.

When a thief steals only your email address
When someone impersonates you in person at a bank
When a company accidentally sends your statement to the wrong address
When criminals combine real and fake information to create a new identity for fraud
D
Correct - synthetic theft blends real and fabricated data.
Think about creating a fake identity from mixed pieces.
idtheft
16

Synthetic identity theft combines real personal information (often a legitimate SSN) with fabricated details (fake name, address) to create a new fictitious identity. Criminals build credit history for this fake identity over months, then "bust out" by maxing out credit lines and disappearing. It is the fastest-growing type of financial fraud and is especially dangerous for children and elderly people whose SSNs are less likely to be monitored.

Question 15
Which action should you take immediately after discovering your Social Security number has been compromised?

When your Social Security number is compromised, the threat is not just immediate - it can persist for years because your SSN does not change. Unlike a credit card that can be cancelled and reissued, you carry the same SSN for life. This means the stolen number could be used weeks, months, or even years later. The protective steps you take now create a persistent barrier. Waiting to see if fraud occurs is the riskiest approach because by the time you notice, multiple accounts may already be opened and significant damage may be done.

Post a warning on all your social media accounts
Change your email password only
Place a credit freeze at all three bureaus and monitor your accounts
Wait to see if any fraudulent activity actually occurs before acting
C
Correct - freeze your credit immediately and start monitoring.
Act proactively - do not wait for damage to appear.
idtheft
15

If your SSN is compromised: (1) Place a credit freeze at all three bureaus immediately (Equifax, Experian, TransUnion). (2) File a report at IdentityTheft.gov. (3) Monitor all financial accounts for unauthorized activity. (4) Consider an IRS Identity Protection PIN to prevent tax fraud. (5) Review your credit reports frequently for at least a year. Acting immediately limits the window for thieves to cause damage.

Question 14
What is the safest way to dispose of documents containing personal financial information?

Physical document theft remains a real identity theft vector despite the digital age. Bank statements, tax forms, pre-approved credit offers, medical records, and insurance documents all contain information useful to criminals. Simply tearing paper or using a strip-cut shredder may leave enough intact for someone to piece together. The type of shredder matters: cross-cut models create small confetti-like pieces that are virtually impossible to reassemble. For the most sensitive documents, some people choose even finer micro-cut shredders.

Throwing them in the regular trash
Shredding them with a cross-cut shredder
Recycling them in the paper bin
Storing them indefinitely in a filing cabinet
B
Correct - cross-cut shredding destroys sensitive documents.
Think about preventing someone from reconstructing the documents.
idtheft
14

Cross-cut shredding is the safest disposal method for sensitive documents. Strip-cut shredders leave pieces that can potentially be reassembled. Documents to shred include: bank and credit card statements, tax returns and W-2s, pre-approved credit offers, medical records, insurance forms, and any document with your SSN, account numbers, or signatures.

Question 12
A strong password typically has which characteristics?

Password strength directly affects your vulnerability to identity theft. Short, simple, or commonly used passwords can be cracked in seconds by automated tools. Personal information like names, birthdays, or pet names are among the first things attackers try. The math is straightforward: each additional character and each additional character type (uppercase, lowercase, number, symbol) exponentially increases the number of possible combinations an attacker must try. Length is actually more important than complexity, but combining both is ideal.

Your pet's name followed by your birth year
The word "password" with a number at the end
A single common dictionary word in all lowercase
At least 12 characters combining uppercase, lowercase, numbers, and symbols
D
Correct - length and complexity make passwords stronger.
Think about what makes a password hard to guess or crack.
idtheft
12

Strong passwords are at least 12 characters long and combine uppercase letters, lowercase letters, numbers, and symbols. Avoid dictionary words, personal information (names, birthdays), and common patterns (123456, qwerty). Better yet, use a passphrase - a string of random words like "correct-horse-battery-staple" - which is both long and memorable. Use a unique password for each account and consider a password manager.

Question 13
What is a data breach?

Companies store vast amounts of personal information - names, addresses, Social Security numbers, credit card details, passwords, and more. When their security is compromised and that data is exposed or stolen, every affected person becomes a potential identity theft victim. Major breaches have affected hundreds of millions of records. The information often ends up for sale on dark web marketplaces. Because you cannot control how well companies protect your data, monitoring your own accounts and credit becomes essential regardless of your personal security habits.

An incident where an organization's stored personal data is accessed by unauthorized parties
A routine software update that changes your login credentials
When you voluntarily share your data with a new service
A method banks use to test their security systems
A
Correct - a data breach exposes stored personal data.
Think about unauthorized access to stored information.
idtheft
13

A data breach occurs when an organization's stored data is accessed, copied, or stolen by unauthorized parties. This can expose names, SSNs, credit card numbers, passwords, and other personal information. After a breach, affected companies typically offer free credit monitoring. You should also change passwords for any accounts that used the same credentials, enable 2FA, and monitor your credit reports closely.

Question 11
Which type of identity theft involves someone using your information to obtain medical services?

Identity theft extends beyond financial accounts. When someone uses your personal information to receive medical treatment, fill prescriptions, or file insurance claims, it creates a particularly dangerous form of fraud. Beyond the financial impact, it can corrupt your medical records with someone else's diagnoses, allergies, blood type, and medication history. This could lead to dangerous treatment errors if your records show conditions or medications that are not yours. Reviewing your medical records and insurance Explanation of Benefits statements regularly is important.

Financial identity theft
Criminal identity theft
Medical identity theft
Synthetic identity theft
C
Correct - medical identity theft involves fraudulent healthcare use.
The name matches the type of service obtained fraudulently.
idtheft
11

Medical identity theft occurs when someone uses your identity to obtain healthcare services, prescriptions, or insurance benefits. It is especially dangerous because it can corrupt your medical records with incorrect information (wrong blood type, allergies, diagnoses), potentially leading to harmful treatment errors. Review your insurance EOB statements for unfamiliar charges and request copies of your medical records periodically.

Question 10
If you receive an unexpected email from your bank asking you to verify your account by clicking a link, what should you do?

This scenario is one of the most common phishing setups. The email may look identical to legitimate bank communications - same logos, same formatting, even similar sender addresses. But the link leads to a fake website designed to capture your login credentials. The safe response is simple: never interact with the message itself. Instead, go directly to your bank's website by typing the address yourself, or call the number on the back of your card. If there is a real issue, the bank will know about it when you contact them directly.

Click the link immediately to protect your account
Do not click - instead, contact your bank directly through their official website or phone number
Reply to the email with your account number for verification
Forward the email to all your contacts as a warning
B
Correct - always verify through official channels.
Never click links in unexpected messages claiming to be from your bank.
idtheft
10

Never click links in unexpected messages claiming to be from financial institutions. Instead, contact your bank directly through their official website (type the URL yourself) or the phone number on the back of your card. Legitimate banks will never ask you to verify sensitive information through email links. If you do click by mistake, do not enter any information and immediately change your password through the official site.

Question 9
What is the difference between a credit freeze and a fraud alert?

Two of the most common tools for protecting against new-account fraud work differently and serve different situations. One is a hard stop that prevents most new credit applications from being processed at all. The other is a flag on your credit file that asks (but does not require) lenders to take extra steps to verify your identity before opening an account. Understanding the difference helps you choose the right level of protection for your situation. In most cases, the stronger option is advisable.

A freeze blocks new credit inquiries; a fraud alert asks lenders to verify your identity before approving
A fraud alert is permanent; a freeze lasts only 30 days
A freeze costs $50 per bureau; a fraud alert is always $25
They are the same thing with different names
A
Correct - freeze blocks inquiries, fraud alert adds verification.
One blocks access; the other adds a verification step.
idtheft
9

A credit freeze blocks access to your credit report entirely, preventing most new account openings. A fraud alert places a note on your file asking lenders to verify your identity before approving credit, but it does not block access. A freeze is stronger protection. Fraud alerts are free, last one year (or seven with an identity theft report), and can be placed with one bureau which notifies the others.

Question 8
What is two-factor authentication (2FA)?

Passwords alone are increasingly insufficient for protecting accounts. They can be guessed, stolen in data breaches, or obtained through phishing. Adding a second layer of verification dramatically reduces the risk of unauthorized access. Even if someone steals your password, they still need the second factor - typically something you physically possess (like your phone) or something you are (like a fingerprint). Enabling this feature on your most important accounts is one of the highest-impact security steps you can take.

Using two different passwords for the same account
Having two people approve every financial transaction
Backing up your data to two separate cloud services
Requiring a second verification step beyond your password to log in
D
Correct - 2FA adds a second verification step.
Think about adding an extra layer beyond just a password.
idtheft
8

Two-factor authentication requires two different types of verification to access an account: something you know (password) plus something you have (phone, security key) or something you are (fingerprint, face). Even if your password is compromised, the attacker cannot access your account without the second factor. Enable 2FA on all financial accounts, email, and any account with sensitive personal information.

Question 7
What should you do first if you discover unauthorized charges on your credit card?

Speed matters when you discover fraud. Federal law limits your liability for unauthorized credit card charges to $50 if you report promptly, and most issuers offer zero-liability policies. But the longer you wait, the more complicated recovery becomes. The card issuer can freeze the account, issue a new card number, initiate a chargeback investigation, and document the fraud. This first call triggers the formal dispute process and protects your legal rights under the Fair Credit Billing Act.

Delete your email account
Wait 30 days to see if the charges reverse themselves
Contact your card issuer immediately to report the fraud
Post about it on social media to warn others
C
Correct - contact your card issuer right away.
Act quickly to limit damage.
idtheft
7

Contact your card issuer immediately to report unauthorized charges. They will freeze your account to prevent further fraud, issue a new card number, and initiate a dispute investigation. Under federal law (Fair Credit Billing Act), your liability for unauthorized credit card charges is capped at $50, and most issuers offer $0 fraud liability. Time matters - report as soon as you notice.

Question 5
How often can you get a free credit report from each of the three major bureaus?

Federal law guarantees consumers access to their credit reports at no cost. This is one of the most underused financial tools available. Reviewing your reports regularly is the primary way to catch identity theft early, spot errors that could hurt your credit score, and verify that your payment history is being reported accurately. The official source is a single website authorized by the three major bureaus. Be cautious of lookalike sites that may try to upsell paid services.

At least once per year from each bureau through AnnualCreditReport.com
Only when you are denied credit
Once in your lifetime per bureau
Monthly, but only if you pay a subscription fee
A
Correct - you can get free annual reports from each bureau.
There is a federally mandated free option.
idtheft
5

Under federal law (FCRA), you are entitled to at least one free credit report per year from each of the three major bureaus - Equifax, Experian, and TransUnion - through AnnualCreditReport.com. This is the only federally authorized source. Stagger your requests (one bureau every four months) for year-round monitoring at no cost.

Question 6
Which piece of personal information is most valuable to identity thieves?

Not all personal information carries equal risk. Some data points are mildly useful to criminals, while one specific number is essentially the master key to your financial identity. With this number, a thief can open credit accounts, file tax returns, apply for government benefits, and more - all in your name. Protecting this number is the single highest priority in identity theft prevention. Never carry the physical card unless absolutely necessary, and never share it unless you initiated the contact and verified the recipient.

Your favorite color
Your Social Security number
Your email newsletter subscriptions
Your public social media profile picture
B
Correct - your SSN is the master key for identity theft.
Think about what unlocks the most financial access.
idtheft
6

Your Social Security number is the most valuable piece of information for identity thieves because it is used to open credit accounts, file tax returns, apply for benefits, and verify identity across many systems. Unlike a credit card number (which can be easily replaced), your SSN is permanent. Guard it carefully: never share it via email, verify who is requesting it and why, and do not carry the card in your wallet.

Question 4
What is phishing?

One of the most common methods criminals use to steal personal information does not require any technical hacking skills. Instead, it relies on social engineering - tricking people into voluntarily handing over their data. These attacks typically arrive as emails, text messages, or phone calls that impersonate legitimate organizations like banks, government agencies, or popular services. They create urgency ("Your account has been compromised!") to push you into clicking a link or providing information without thinking critically.

A legal method banks use to verify your identity by phone
A government program that monitors credit card transactions
A type of insurance that covers online purchases
A scam that uses fake messages to trick you into revealing personal information
D
Correct - phishing uses fake communications to steal information.
Think about deceptive messages designed to steal your data.
idtheft
4

Phishing is a social engineering attack where criminals send fraudulent messages (email, text, phone) that impersonate legitimate organizations to trick you into revealing sensitive information like passwords, account numbers, or Social Security numbers. Red flags include urgent language, unfamiliar sender addresses, generic greetings, and links that do not match the organization's real domain.

Question 2
What does a credit freeze do?

One of the most powerful tools against identity theft costs nothing and takes minutes to set up. It works by restricting who can access your credit report. Since most lenders check your credit before approving a new account, blocking that check effectively prevents a thief from opening accounts in your name. Your existing accounts continue to work normally. You can temporarily lift the restriction when you legitimately need to apply for credit. It is one of the highest-value, lowest-effort protective steps available.

Closes all your existing credit card accounts permanently
Prevents new accounts from being opened in your name by restricting access to your credit report
Stops all interest from accruing on current debts
Deletes negative information from your credit history
B
Correct - a freeze blocks new credit inquiries.
Think about blocking access, not closing accounts.
idtheft
2

A credit freeze (also called a security freeze) restricts access to your credit report, making it difficult for identity thieves to open new accounts in your name. It is free to place and lift at all three major bureaus (Equifax, Experian, TransUnion). Your existing accounts are not affected. When you need to apply for new credit, you temporarily lift the freeze using a PIN or password.

Question 3
Which is a common sign that your identity may have been stolen?

Identity theft often goes undetected for weeks or months because victims are not regularly checking for warning signs. By the time they notice, the damage may be extensive. Common early indicators include unfamiliar charges on existing accounts, calls from debt collectors about debts you do not recognize, unexpected credit denials, medical bills for services you did not receive, or missing mail. Regularly reviewing your credit report and account statements is the most reliable way to catch problems early.

Receiving your regular monthly bank statement on time
Getting a credit card offer in the mail
Finding unfamiliar accounts or charges on your credit report
Your credit score increasing after paying off a debt
C
Correct - unfamiliar accounts or charges are a red flag.
Think about things appearing that you did not authorize.
idtheft
3

Common warning signs of identity theft include: unfamiliar accounts or inquiries on your credit report, charges you do not recognize on bank or credit card statements, calls from debt collectors about unknown debts, denial of credit for no apparent reason, IRS notices about unreported income, or medical bills for services you never received. Check your credit reports regularly at AnnualCreditReport.com.

Question 1
What is identity theft?

Identity theft is one of the most common financial crimes and affects millions of people each year. It happens when someone obtains your personal information - like your Social Security number, credit card details, or login credentials - and uses that information for their own benefit. The consequences can range from unauthorized charges on your card to someone opening new accounts, filing tax returns, or even obtaining medical care in your name. Understanding what identity theft actually is helps you recognize the warning signs early.

Someone using your personal information without permission to commit fraud
Forgetting your own password to an online account
A bank closing your account for inactivity
Changing your legal name through the court system
A
Correct - identity theft is unauthorized use of your personal info.
Think about someone pretending to be you.
idtheft
1

Identity theft occurs when someone uses your personal identifying information - such as your name, Social Security number, or credit card number - without your permission to commit fraud or other crimes. This can include opening new credit accounts, making unauthorized purchases, filing fraudulent tax returns, or obtaining medical services. Early detection is key to limiting damage.