Page 1 of 2

Quiz: How to Spot a Phishing Email

1. You receive an e-mail from your bank in which you are asked to click on a link to share your internet banking login information - i.e. username, password, one-time password (OTP). The rationale given is : “We notice suspicious activity in your account and need to verify your identity. Else, your accounts will be frozen effective immediately.” What will you do?

1. You receive an e-mail from your bank in which you are asked to click on a link to share your internet banking login information - i.e. username, password, one-time password (OTP). The rationale given is : “We notice suspicious activity in your account and need to verify your identity. Else, your accounts will be frozen effective immediately.” What will you do?
A
B
C
D

2. On Monday morning, your manager emails you to open a pdf document containing information about your next performance appraisal. You have never received such an email before as your manager usually talks about it before scheduling a 1-1 conversation on performance. Should you open the pdf document?

2. On Monday morning, your manager emails you to open a pdf document containing information about your next performance appraisal. You have never received such an email before as your manager usually talks about it before scheduling a 1-1 conversation on performance. Should you open the pdf document?
A
B

3. You are tired of your current job. It’s been years that you are toiling away and feel like there is no prospect for growth. You have also been liking, re-posting content about career growth on LinkedIn. Today, you receive an email from LinkedIn about new career opportunities and roles that you are eligible for. All the roles are relevant and appear exciting. However, normally this kind of email is sent to your personal email address, but you got this one in your work inbox. What should you do?

3. You are tired of your current job. It’s been years that you are toiling away and feel like there is no prospect for growth. You have also been liking, re-posting content about career growth on LinkedIn. Today, you receive an email from LinkedIn about new career opportunities and roles that you are eligible for. All the roles are relevant and appear exciting. However, normally this kind of email is sent to your personal email address, but you got this one in your work inbox. What should you do?
A
B
C
D

4. An email arrives in your company inbox that seems to be from one of your team’s vendors. It asks you to click on a link to update your business account. Should you click?

4. An email arrives in your company inbox that seems to be from one of your team’s vendors. It asks you to click on a link to update your business account. Should you click?
A
B

5. Which one of these statements is correct?

5. Which one of these statements is correct?
A
B
C
D

6. Email authentication can help protect you against phishing attacks.

6. Email authentication can help protect you against phishing attacks.
A
B

7. You have clicked on a link from an email that you later realized is suspicious. What should you do?

7. You have clicked on a link from an email that you later realized is suspicious. What should you do?
A
B
C
D

8. You have decided to become a digital nomad and work from Bali for a quarter. The day after you have arrived in Ubud and settled into your favorite AirBnB location, you decide to login to your email account to check on work matters. As you enter the URL to navigate to your work email login address, you are directed to a page that looks very similar to your work account’s email login page, but the placement of the logo and some text appear off. What should you do?

8. You have decided to become a digital nomad and work from Bali for a quarter. The day after you have arrived in Ubud and settled into your favorite AirBnB location, you decide to login to your email account to check on work matters. As you enter the URL to navigate to your work email login address, you are directed to a page that looks very similar to your work account’s email login page, but the placement of the logo and some text appear off. What should you do?
A
B
C
D

9. Changing passwords frequently is important to safeguard my email account.

9. Changing passwords frequently is important to safeguard my email account.
A
B

10. Relying on my email provider’s advanced spam, phishing email filtering technologies is sufficient for the security of my email account. I do not need to take any further actions on my own.

10. Relying on my email provider’s advanced spam, phishing email filtering technologies is sufficient for the security of my email account. I do not need to take any further actions on my own.
A
B
Never submit passwords through Tally forms.
Report malicious form