a- Give three examples of pieces of personal information that would be valuable to an identity thief.
This response will be reviewed and graded after submission.
Grading can be reviewed and adjusted.
Grading can be reviewed and adjusted.
Question 2 of 3
2. Question
b- What are some ways that identity thieves can obtain such information?
This response will be reviewed and graded after submission.
Grading can be reviewed and adjusted.
Grading can be reviewed and adjusted.
Question 3 of 3
3. Question
c- Pick one of the examples you mentioned above (in section “a”) and list three potential consequences of an identity thief getting hold of that information:
This response will be reviewed and graded after submission.
Grading can be reviewed and adjusted.
Grading can be reviewed and adjusted.
Login
Accessing this curriculum requires a login. Please enter your credentials below!