Remote access fraud Quiz
1. What is a common method fraudsters use to gain control of a victim's device?
A. Sending a legitimate email
B. Asking for remote access under the guise of tech support
C. Offering free software updates
2. What should you do if you receive a call from someone claiming to be tech support?
A. Provide them with your credit card information
B. Hang up and call the company using a known genuine number
C. Allow them remote access to fix the issue
3. Which of the following is NOT a recommended action if you suspect your computer is compromised?
A. Disconnect from the internet and restart in safe mode
B. Call the scammer back to ask for a refund
C. Update and run legitimate security software
4. What is a sign that an email or pop-up might be fraudulent?
A. It contains spelling and grammar mistakes
B. It offers a discount on a popular product
C. It uses bright colors and large fonts
5. What should you never provide over the phone to someone claiming to be from tech support?
A. Your phone number
B. Your password
C. Your email address
Submit Answers