Read the following passage about the Digital Personhood—A Modern Security Challenge and mark the letter A, B, C or D on your answer sheet to indicate the best answer to each of the following questions from 31 to 40.
In today's world, old ways of checking identity are like a ticking time bomb. For many years, companies have used simple information like names, birth dates, and ID numbers. But these methods have big problems. They provide only one type of protection. When hackers steal data, everyone becomes unsafe. Also, they cannot show the real complexity of people. [I] Now, criminals use deepfakes and AI to pretend to be others. Because of this, checking real identity has become harder than before. This makes proving someone is real and living very important for safety and privacy online.
To fix these issues, Incode created smart technology using artificial intelligence. Their system learned from more than one million fake identity attempts around the world. [II] It can also spot deepfakes with high accuracy and notice makeup changes or unusual facial movements. This technology checks videos in many different ways at the same time, making it very accurate and reliable. Many industries use it successfully: banks, gaming companies, hospitals, insurance firms, and online shops all benefit from this strong protection against fraud.
A famous thinker named Georg Simmel said that identity is unique and deeply connected to society and culture. Modern systems should let people prove who they are without sharing unnecessary private details about themselves. When verification spreads across many places instead of staying in one central location, it becomes much safer and stronger. [III] No single group or company can control everyone's personal information this way. This distributed approach protects against possible misuse and strengthens overall security for all users everywhere.
Ignoring these important ideas brings serious dangers to individuals and society. Deepfake fraud grows every single day, and people lose trust in digital services worldwide. [IV] As technology improves rapidly, criminals also find new tricks and methods to steal identities. Good identity systems must carefully check two essential things: that someone is truly alive and that they really are the person they claim to be online. This complete approach helps build a safer and more secure internet for everyone around the globe today.
https://incode.com/mk
Question 31: The phrase “ticking time bomb” in paragraph 1 has the closest meaning to _________.
A. break down B. carry out C. look into D. blow up
Question 32: According to the passage, which industry is NOT mentioned as using Incode's technology?
A. Gaming companies
B. Online shops
C. Education institutions
D. Banks
Question 33: Where in the paragraph does the following sentence best fit?
It can find physical tricks like photos, videos, and masks used by criminals.
A. [I]
B. [II]
C. [III]
D. [IV]
Question 34: The word “it” in paragraph 2 refers to _________.
A. deepfakes and AI
B. physical tricks like photos, videos, and masks
C. incode's smart technology using artificial intelligence
D. distributed verification systems
Question 35: Which of the following best summarises paragraph 3?
A. Identity systems must use centralized databases where single companies control all personal information to ensure maximum security and prevent unauthorized access effectively.
B. Distributed verification methods protect privacy and security by preventing any single organization from controlling personal data across multiple locations simultaneously and thoroughly.
C. Georg Simmel believed identity verification requires strict government oversight of centralized systems to effectively protect people's privacy and prevent all criminal identity theft attempts.
D. Modern systems should encourage people to share minimal details while maintaining traditional centralized approaches that allow trusted authorities to monitor all individual activities globally.
Question 36: The word “verification” in paragraph 3 is OPPOSITE in meaning to _________.
A. concealment B. confirmation C. recognition D. validation
Question 37: Which of the following best paraphrases the underlined sentence in paragraph 4?
A. Systems should confirm users have valid documentation and maintain legitimate banking records throughout their financial history.
B. Platforms must verify criminal backgrounds and ensure users have proper licenses before accessing digital financial transactions.
C. Reliable systems must verify two elements: liveness confirmation and authentic matching between claimed and genuine identity.
D. Systems should monitor user behavior and detect suspicious activities suggesting potential criminal intent or unauthorized access.
Question 38: Which of the following is TRUE according to the passage?
A. Incode's technology was designed to prevent banking fraud by monitoring transaction patterns and financial account activity for suspicious withdrawals.
B. Incode's system learned from millions of identity deception attempts worldwide and can recognize deepfakes and unusual facial expression patterns.
C. Georg Simmel believed modern verification must require individuals to disclose complete personal history before accessing any digital services.
D. Traditional centralized systems are more reliable than distributed alternatives because single organizations can control all personal information securely.
Question 39: Which of the following can be inferred from the passage?
A. Traditional identity methods failed because static information could not prevent criminals from using deepfakes and AI to deceive verification systems successfully.
B. Banks and hospitals chose Incode's system mainly to collect more personal data and increase their business revenue and customer profitability significantly.
C. Simmel believed distributed systems should eliminate all personal identification requirements entirely to ensure complete user privacy and anonymity online.
D. Deepfake fraud and identity theft will eventually disappear as technology continues advancing without requiring any additional security improvements or interventions.
Question 40: Which of the following best summarises the passage?
A. Incode's artificial intelligence technology was designed specifically to help governments collect and store personal identification data from citizens across multiple centralized databases for national security purposes.
B. Traditional identity verification methods failed because criminals gradually became more educated, so modern companies must eliminate all forms of digital verification to protect user privacy and prevent fraud effectively.
C. Georg Simmel's theory about distributed identity systems proves that deepfake fraud is impossible to commit because criminals cannot understand how complex social and cultural connections affect personal verification methods.
D. Modern identity verification must combine advanced AI technology to detect deepfakes and deception with distributed systems that protect privacy while ensuring people prove they are genuinely alive online.