Unlock hundreds more features
Save your Quiz to the Dashboard
View and Export Results
Use AI to Create Quizzes and Analyse Results

Sign inSign in with Facebook
Sign inSign in with Google

Scam Awareness Quiz: Are You Protected?

Test Your Scam Smarts and Stay Secure

Difficulty: Moderate
Questions: 20
Learning OutcomesStudy Material
Colorful paper art illustrating a quiz on scam awareness

Ready to sharpen your fraud detection and online safety skills? This Scam Awareness Quiz challenges you with practical questions to evaluate your understanding of common scam tactics. Ideal for individuals, teams, or educators wanting to improve scam prevention strategies, it's easily customizable in our editor. Try the Phishing and Scam Awareness Quiz for a focused challenge or explore cybersecurity with the Cybersecurity Awareness Quiz. Discover more quizzes and get started for free!

What is phishing?
A software update notification
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
An antivirus scan report
A legitimate bank communication asking about transactions
Phishing involves sending deceptive messages that appear to come from reputable sources to trick individuals into revealing personal data. It is a common scam tactic used to harvest passwords, credit card numbers, and other sensitive information.
Which of the following is a common red flag of an email scam?
Use of your full name in the greeting
A generic greeting such as 'Dear customer'
Correct grammar throughout the message
An official company domain in the sender address
Scam emails often use generic greetings because the sender does not know the recipient's real name. Legitimate organizations typically personalize communications with specific customer details.
An email promises you $1,000 for completing a short survey with no strings attached. What principle is being exploited?
Too-good-to-be-true tactic
Scarcity principle
Authority principle
Reciprocity principle
Offers that seem too good to be true often signal a scam designed to lure victims into providing personal information or fees. Legitimate surveys rarely promise large sums without any clear source of funding.
What is the safest initial action if you suspect a link in an email is malicious?
Reply to the sender asking why they sent it
Forward the email to all your contacts
Click the link immediately to investigate
Hover over the link to view its actual URL
Hovering over a link reveals the actual destination URL without executing it, allowing you to detect suspicious or mismatched domains. This prevents accidental navigation to malicious sites.
Which practice best protects your passwords?
Writing them down on paper and keeping it next to your computer
Sharing them with a trusted friend
Using the same password for all accounts
Using strong, unique passwords stored in a reputable password manager
A password manager can generate and store complex, unique passwords for each account, reducing the risk if one credential is compromised. It also helps avoid the reuse of passwords across multiple services.
You receive an email from your bank asking you to reset your password via a provided link and emphasizing urgency. What is the primary red flag?
The email is sent during business hours
The use of your bank's name
The inclusion of a password reset link
The urgent, threatening language
Scammers often use urgent or threatening language to pressure recipients into acting without thinking. Legitimate institutions typically provide information calmly and allow time to verify.
A website URL begins with HTTP instead of HTTPS. What does this indicate?
The site is blocked by browsers
Data exchanged may not be encrypted
The site is faster
The site uses advanced security
HTTPS indicates encryption of data between the user and the site. HTTP lacks this encryption, making information transferred potentially visible to third parties.
You receive a text message with a shortened link to claim a prize. What is the safest way to assess the link?
Forward it to friends for verification
Reply to the sender asking for details
Click it immediately to see where it goes
Use a URL unshortening service or preview function
URL unshortening services reveal the full destination address without visiting the site, helping to detect malicious or spoofed domains. This prevents accidental exposure to harmful content.
A caller claiming to be tech support wants to install remote access software on your computer. What should you do?
Ask them to email you their credentials first
Allow the installation temporarily
Hang up and contact the official support number independently
Provide your credentials as requested
Scammers use unsolicited tech support calls to gain control of your computer. Always hang up and use a verified support number to confirm legitimacy.
What security benefit does two-factor authentication (2FA) provide?
Adds a second layer of verification beyond just a password
Blocks all phishing emails
Removes the need for passwords entirely
Encrypts all your files automatically
Two-factor authentication requires an additional verification method, such as a code sent to your phone, making unauthorized access much more difficult. It compensates for weak or compromised passwords.
You visit a website and see a certificate error warning. What does this most likely indicate?
Your browser is out of memory
The site uses HTTP instead of HTTPS
The certificate is expired or invalid, which could indicate a spoofed site
The site will load faster without the certificate
Certificate errors often mean the SSL/TLS certificate is expired, mismatched, or untrusted, suggesting potential security risks or a spoofed domain. You should not proceed without verifying the site's legitimacy.
A random pop-up claims you've won a gift card and prompts you to click to claim. This tactic is best described as:
Smishing
Vishing
Clickbait
Typosquatting
Clickbait uses sensational or enticing messages to lure users into clicking links or pop-ups. It often leads to scam sites or malware downloads.
A scammer demands payment in gift cards or cryptocurrency. Why is this a warning sign?
They are untraceable and irreversible
They are recommended by legitimate businesses
Those forms of payment are more expensive
They provide the best exchange rates
Gift cards and cryptocurrency transactions are difficult to trace and cannot be reversed, making them ideal for scammers. Legitimate organizations typically use standard banking or credit methods.
Before opening an unexpected email attachment, you should:
Scan it with updated antivirus software
Open it immediately to see what it contains
Forward it to a colleague for fun
Reply asking the sender for their email password
Scanning attachments with up-to-date antivirus software helps detect malware before it can execute. This safe practice reduces the risk of infection from malicious files.
Which sign indicates a spear phishing attack rather than a generic phishing attempt?
No request for personal information
Inclusion of personalized details about the target
Generic greeting like 'Dear user'
Use of urgent language
Spear phishing targets specific individuals and often includes personal or organizational details to appear credible. Generic phishing lacks this personalization.
You receive a PDF invoice with a digital signature, but the signature validation fails. What should you do?
Pay the invoice immediately to avoid delays
Contact the vendor directly using a trusted channel to verify the document
Delete the invoice without further action
Forward it to colleagues to crowdsource verification
An invalid digital signature can indicate tampering or a spoofed document. Verifying directly with the vendor through an independent contact method ensures authenticity before you take action.
A website's SSL certificate is valid but the domain name is a close misspelling of a well-known brand. What tactic is this and how do you avoid it?
This is brute-force attack; change your passwords frequently
This is pharming; clear your DNS cache to avoid it
This is typo-squatting; always verify the exact domain spelling before entering any data
This is IP spoofing; update your firewall rules
Typo-squatting exploits user typos by registering similar-looking domains. Checking the URL carefully and bookmarking trusted sites helps prevent this type of scam.
How can you verify the authenticity of a suspicious phone call claiming to be from the IRS?
Email them your personal information to confirm
Google the caller's phone number and call the official IRS number listed on the official website
Provide your Social Security number for validation
Ask them to send a follow-up text message
The IRS does not initiate contact via unsolicited calls demanding immediate payment. Verifying by calling back a publicly listed official number ensures you reach the real organization.
A payment portal instructs you to disable your firewall before proceeding. What does this request imply and how should you respond?
The portal needs higher performance; comply immediately
Your firewall is outdated; update and then disable it
It is likely malicious; do not disable your firewall and verify through official support channels
It is a standard security check; follow the instructions
Disabling your firewall exposes your system to attacks and is never a standard requirement for legitimate payment portals. Always verify such requests through official and secure channels.
When assessing the credibility of an online offer, which combination of checks provides the most thorough evaluation?
Reviewing user feedback, confirming a secure HTTPS connection, and verifying domain age
Evaluating the color scheme of the website
Comparing prices with competitors only
Checking grammar and spelling only
User feedback helps identify real experiences, HTTPS ensures secure data transfer, and domain age can reveal recently created scam sites. Combining these checks gives a reliable picture of legitimacy.
0
{"name":"What is phishing?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is phishing?, Which of the following is a common red flag of an email scam?, An email promises you $1,000 for completing a short survey with no strings attached. What principle is being exploited?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}

Learning Outcomes

  1. Identify common scam tactics and red flags
  2. Analyse real-world scam scenarios to recognise warning signs
  3. Evaluate credibility of communications and online offers
  4. Demonstrate safe practices to avoid phishing and fraud
  5. Apply critical reasoning to verify sources and claims
  6. Master strategies for protecting personal and financial information

Cheat Sheet

  1. Recognize Common Scam Tactics - Scammers love to stir up panic by creating urgency, fear, or irresistible deals. Spotting these emotional triggers early helps you take a step back and think clearly. Practice pausing before you click or commit. Read more
  2. Identify Red Flags in Communications - Unexpected requests, demands for personal data, or a ticking clock are classic scam signals. When your inbox or phone suddenly feels urgent, that's your cue to double-check. Taking even a minute to verify can save you a world of trouble. Read more
  3. Understand Psychological Manipulation - Con artists love to hijack your emotions - fear, excitement, or guilt - to short-circuit your common sense. By learning how they wield these tactics, you can spot the invisibility cloak lifting. A quick reality check helps you regain control. Read more
  4. Evaluate Investment Opportunities Critically - Promises of "guaranteed" returns and high-pressure pitches often spell trouble. Always confirm credentials, compare with unbiased reviews, and ask tough questions. If it sounds too easy, it probably is. Read more
  5. Protect Personal Information - Legit organizations won't cold-call you for your Social Security or bank details. Whenever someone asks, pause and verify through an official website or customer service line. Guarding your data is your first line of defense. Read more
  6. Recognize Phishing Attempts - Watch out for generic greetings, awkward spelling, and mismatched URLs in emails or texts. Hover over links to preview where they lead before you click. When in doubt, go directly to the official site instead. Read more
  7. Be Cautious with Unsolicited Offers - If an unexpected deal or job offer seems too good to be true, it probably is. Scammers rely on surprise and excitement to make you drop your guard. Always research and validate before engaging. Read more
  8. Understand Social Engineering Tactics - Impersonating authority or creating a false shortage are favorite tricks of fraudsters. Learning these ploys lets you question suspicious scenarios. A healthy dose of skepticism keeps you safe. Read more
  9. Verify Sources and Claims - Never take unsolicited facts at face value - cross-check with trusted resources or contact the organization directly. Misinformation spreads fast, but so does the truth when you hunt for it. Read more
  10. Stay Informed and Educated - Scammers evolve, so your knowledge should too. Regularly reading news updates and expert tips sharpens your scam radar. The best shield against fraud is a curious mind. Read more
Powered by: Quiz Maker