An individual has their personal information stolen. They discover that someone is using that information to impersonate them and commit fraud. What does this scenario describe?

Foundations of Cybersecurity | Weekly challenge 1 Quiz

An individual has their personal information stolen. They discover that someone is using that information to impersonate them and commit fraud. What does this scenario describe?

  • Secured customer data
  • Data breach
  • Network infiltration
  • Identity theft

 

Leave a Comment