Suspicious Senders
Malicious Links
Urgent & Threatening Language
Attachments & Malware
Real vs. Fake Emails
100

What is a common red flag in a sender’s email address?

Misspellings

 extra characters 

unknown domains (e.g., @paypall.com instead of @paypal.com).

100

What should you do before clicking an email link?

Hover over the link to see the actual URL before clicking.

100

What phrase is commonly used to pressure recipients into acting quickly?

"Your account will be suspended unless you act now!" 

Urgent, Important.

100

Why should you be cautious about unexpected email attachments?

They may contain malware, viruses, or ransomware.

100

What should you check in the email header to detect phishing?

The "Reply-To" and "Return-Path" addresses for mismatched domains.

200

How can you verify an unknown sender?

Check the domain, search for the email address online, and contact the company directly using official contact details.

200

How can you hover over a link to inspect it?

Place your mouse over the link without clicking, and the real URL will appear in the bottom corner of your browser or email client.

200

How does a phishing email create a sense of urgency?

By using fear-based language, such as threats of account closure, fines, or legal action.

200

What are the most common malicious file types?

.exe, .zip, .pdf, .docm, .xlsm, .js (JavaScript files).

200

What’s a common grammar or spelling mistake in phishing emails?

Poor spelling, awkward phrasing, or inconsistent capitalization.

300

What type of email spoofing tricks do attackers use?

They forge the "From" address to make the email appear from a trusted source (domain spoofing).

300

What does a lookalike URL (typosquatting) look like?

A URL that closely resembles a legitimate one but contains slight misspellings (e.g., www.bank0famerica.com instead of www.bankofamerica.com).

300

Why do scammers use scare tactics in emails?

To make recipients panic and act without verifying the request.

300

How does an attacker use macros in phishing emails?

Malicious macros in Word or Excel documents execute harmful scripts when enabled.

300

Why do fake emails often contain poor formatting?

Scammers may use automated translation tools or lack professional design skills.

400

Why should you avoid responding to unexpected urgent requests?

Attackers use urgency to manipulate victims into acting without thinking (e.g., fake boss or HR requests).

400

Why should you avoid shortened URLs in emails?

They can hide the actual destination, making it harder to spot malicious links.

400

How can you verify a threatening email demanding action?

Call the company or sender directly using official contact information from their website.

400

What is a business email compromise (BEC) scam?

Attackers impersonate executives or vendors to trick employees into sending money or confidential data.

400

How do attackers impersonate legitimate brands?

They copy logos, branding colors, and signatures but use fake email domains.

500

How can you check if an email domain is legitimate?

Look up the domain on WHOIS, compare it with the company’s official website, or check SPF/DKIM/DMARC records.

500

What’s a common trick used in fake login pages?

Attackers create nearly identical login pages to steal credentials (e.g., fake Microsoft 365 or PayPal login screens).

500

Give an example of a social engineering email using urgency.

"We've detected unauthorized activity on your bank account. Click here immediately to verify your identity!"

500

How can you safely inspect an email attachment?

Use an online virus scanner (e.g., VirusTotal) or open it in a sandboxed environment.

500

Give an example of a real phishing attempt and how to spot it.

An email claiming to be from "Amazon Support" asking for payment details, but the sender’s domain is support@amzon-secure.com instead of @amazon.com.