
Cybersecurity Red Flags
Quiz by Cessa De Guzman
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1You receive an email from a known contact, but the email address seems slightly off (e.g., john.doe@company.com vs. john.doe@compnay.com). What should you do?Ignore the discrepancy and open the emailReport the email to your IT department and verify its authenticityForward the email to your personal email for safekeepingClick on any links provided to see if they are legitimate45s
- Q2You notice that your computer is running much slower than usual, and there are numerous pop-up ads. What might be the cause?Outdated operating systemMalware infectionHardware malfunctionToo many applications running at once45s
- Q3You receive a phone call from someone claiming to be from your bank, asking for your account details to verify a transaction. What is the appropriate action?Ask the caller to send you an email for verificationHang up and call your bank directly using the number on their official websiteProvide the information since it's for verification purposesIgnore the call and assume it's a mistake45s
- Q4Which of the following is a sign that a website might be a phishing site?The URL starts with "https://"Both B and CThe website has spelling and grammatical errorsThe website asks for sensitive information like passwords and credit card numbers45s
- Q5What should you do if you receive a suspicious link via email?Delete the email immediately without taking any actionHover over the link to check its URL before considering any further actionForward the link to all your contacts to see if they have received it tooClick on the link to see where it leads45s
- Q6What is a common red flag of a phishing email?The email asks you to click a link to update your account informationThe email contains your name and other personal informationThe email is about a meeting reminderThe email is from a colleague45s
- Q7You find a USB drive in the parking lot of your office building. What should you do?Plug it into your computer to see if it contains any important filesThrow it awayHand it over to your IT department for examinationUse it as your own45s
- Q8An email you received states that you have won a large sum of money and asks for your bank details to transfer the prize. What should you do?Delete the email immediatelyProvide your bank details to claim the prizeReply to the email asking for more informationForward the email to your friends to share the good news45s
- Q9You receive a password reset request for an account you did not initiate. What is the best course of action?Report it to your IT department and change your password immediatelyIgnore it since you did not request itClick the link to see which account it’s referring toReply to the email asking for more details45s
- Q10Which of the following practices can help protect against cybersecurity threats?Using the same password for all accountsSharing your passwords with trusted colleaguesClicking on links in emails to verify their authenticityRegularly updating your software and operating systems45s