Remote access fraud Quiz

1. What is a common method fraudsters use to gain control of a victim's device?

2. What should you do if you receive a call from someone claiming to be tech support?

3. Which of the following is NOT a recommended action if you suspect your computer is compromised?

4. What is a sign that an email or pop-up might be fraudulent?

5. What should you never provide over the phone to someone claiming to be from tech support?