Skip to content
Member Statement
Navigation Menu
Navigation Menu
Member Statement
Security Quiz
SecurityQuiz
Please enter your name and date.
Name
*
Date
*
1. What is email phishing?
*
A: A technique used by hackers to access social media accounts
B: A fraudulent attempt to obtain sensitive information via email
C: A legitimate marketing campaign
D: A method of protecting email accounts
2. Which of the following is a common sign that an email might be a phishing attempt?
*
A: The email comes from a familiar sender
B: The email contains a generic greeting like “Dear Customer”
C: The email has a clear subject line related to your recent purchase
D: The email asks for a confirmation of a legitimate request you made
3. What should you do if you receive an email that asks for personal or financial information?
*
A: Reply with the requested information immediately
B: Click the link to verify your details
C: Ignore the email and delete it
D: Call the sender using the contact details in the email
4. What is the best way to ensure that an email is legitimate before clicking on any links?
*
A: Always click the link to verify for yourself
B: Hover your mouse over the link to check the URL
C: Reply to the email asking if it’s legitimate
D: Ignore the email if it looks too good to be true
5. Which of the following is a red flag in an email that may indicate a phishing attempt?
*
A: The email is signed with your name
B: The email creates a sense of urgency, such as “Act Now!”
C: The email contains an official company logo
D: The email addresses you by your first name
6. Which of the following methods do phishers commonly use to make an email appear legitimate?
*
A: Using official logos and company branding
B: Sending emails from personal email addresses
C: Asking for verification of personal information through encrypted emails
D: Offering large monetary rewards for immediate responses
7. What is a “spoofed” email address in phishing?
*
A: An email address that is completely made up
B: An email address that looks similar to a legitimate address but has slight differences
C: A fake domain used by attackers to confuse the recipient
D: An email address used by IT support for legitimate purposes
8. Which of the following types of personal information should never be shared via email?
*
A: Your social media username
B: Your password or account number
C: Your favorite movie
D: Your work schedule
9. How can you verify if a suspicious email is really from your bank or another organization?
*
A: Contact them through official customer service phone numbers or websites
B: Reply to the email and ask for confirmation
C: Trust the email since it looks professional
D: Click on any link within the email to confirm the source
10. Why is it important to be cautious with email attachments?
*
A: They could contain viruses or malware
B: They always contain important information
C: They are usually too large to open on most devices
D: They are guaranteed to come from a trusted source
Submit
If you are human, leave this field blank.