Spot the Scam
Social Engineering
Safe Online Habits
Respond & Report
Cyber Terms
100

A text that says “You’ve won a free iPhone, click here!” is an example of what type of scam?

Spam/Phishing

100

Scammers often create a sense of urgency by saying you must act when?

Immediately / right now

100

True or False: It’s safe to reuse the same password for multiple accounts.

False

100

What should you do first if you get a suspicious email?

Don’t click links or download attachments.

100

Unwanted, mass-sent messages are called what?

Spam

200

True or False: A government agency will ask for payments in gift cards.

False

200

Flattering a victim or pretending to be a friend online is an example of what tactic?

Sympathy
200

What’s a stronger password: “dog123” or “L!f3isC00l#2025”?

L!f3isC00l#2025

200

Where can you forward phishing emails for investigation?

reportphishing@apwg.org or IT department

200

What is “phishing”?

Tricking someone into revealing personal information via fake messages.

300

You get an email saying your bank account is locked, but the link goes to banksecure-login.net. What’s the red flag?

Suspicious/incorrect URL

300

If a scammer says “If you don’t pay, something bad will happen,” what tactic is that?

Threats / Fear

300

Why should you avoid posting your birthday online?

It can be used to guess passwords or steal your identity.

300

If you receive a scam text, should you reply “STOP”? Why or why not?

No, replying confirms your number is active.

300

Messages that trick people into giving money are called what?

Scams

400

What is it called when scammers pretend to be a trusted company to steal info?

Phishing

400

Asking for small bits of info first (like birthday), then bigger details later, is called what?

Pretexting / gradual information gathering

400

What is two-factor authentication (2FA)

An extra security step requiring a code, app, or device in addition to a password.

400

Who should you tell if you accidentally share personal info with a scammer?

A trusted adult, teacher, IT, or the police depending on severity.

400

A trick that uses human psychology instead of hacking software is called what?

Social Engineering

500

A phone call says your computer has a virus and you must download software. What scam tactic is being used?

Tech support scam

500

Scammers who trick people into wiring money by impersonating bosses or relatives are using what tactic?

Authority

500

Which of these is safest: Public Wi-Fi, Personal Hotspot, or Home Network with WPA2 security?

Home Network with WPA2 security

500

What is the benefit of reporting instead of just deleting?

Reporting helps authorities track and stop scammers

500

Stealing someone’s personal details to pretend to be them is called what?

Identity Theft

M
e
n
u