Certified Ethical Hacker (CEH) Practice Question

During a red-team exercise you demonstrate to a client how stolen personally identifiable information (PII) could be abused. Using employees' names, Social Security numbers, and current addresses that you harvested from a résumé-leak site and their public social-media profiles, you successfully submit several fraudulent U.S. federal tax-refund claims in the victims' names. According to the Federal Trade Commission's identity-theft classifications, which specific category of identity theft does this activity illustrate?

  • Medical identity theft

  • New account (credit) fraud

  • Government documents or benefits fraud (tax-related identity theft)

  • Employment-related identity theft

Certified Ethical Hacker (CEH)
Network and Perimeter Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot