Technology & IT Skills

Phishing Quiz with Answers: Spot Email Scams and Stay Safe

Moderate27 Questions14 min

This quiz targets cybersecurity security-awareness skills for identifying email phishing tactics (spoofed senders, deceptive links, credential harvest pages, and BEC-style payment requests) at the depth expected in an intro information assurance course and CompTIA Security+ social engineering objectives. If you’re compiling a phishing quiz with answers pdf, comparing a phishing email quiz to real inbox risk, drafting phishing survey questions, or searching quiz phishing and phishing quiz with answers, the scenarios focus on decisions you must make before clicking, replying, or paying.

27Questions
InstantResults
FreeAlways
DetailedExplanations
Take the Quiz
Choose quiz length
1Which detail is most reliable for verifying who an email is really from?
2Seeing HTTPS (a lock icon) on a login page guarantees the site is legitimate.

True / False

3If you entered your password on a suspicious page, you should change the password promptly and enable multi-factor authentication if available.

True / False

4An email says, “Your account will be suspended in 30 minutes—click to verify.” What is the safest first action?
5Which is a common sign of sender spoofing in an email?
6You receive an unexpected email with an attachment named “invoice.zip.” What is the safest action?
7Spear phishing is typically targeted and uses personal or organizational details to seem credible.

True / False

8Which subject line most strongly suggests an urgency-based phishing attempt?
9Which is a safer habit when you receive an email from a familiar name asking for an unusual task?
10After reporting a suspected phishing email at work, what should you generally avoid doing?
11A link in an email appears to be a brand portal. Select all that apply. Which URL patterns are especially suspicious?

Select all that apply

12Arrange the best response steps after you clicked a suspicious link but did NOT enter any credentials.

Put in order

1Report the email using your organization’s process
2Run an approved malware scan if instructed
3Close the tab/window
4Document what you clicked (time/URL)
13An email appears to be from your university IT team, but the sender is it-support@university-helpdesk.com. What is the best interpretation?
14You hover over a “View document” button and the URL looks plausible, but it uses a shortened redirect (e.g., a tracking link). What is the safest next step for a sensitive action like signing in?
15An email’s From field shows “Registrar Office,” but the Reply-To address is registrar.help@outlook.com. What is the most likely risk?
16Which URL is an example of “subdomain bait” (trusted brand name placed before an untrusted domain)?
17A message from your ‘department chair’ asks you to buy gift cards for a student event and send the codes immediately. What phishing category best fits?
18Which approach is safest for checking a suspicious link destination?
19A colleague emails you unexpectedly: “Can you review this document?” with a Word file attached. What is the best safe action?
20You receive an unexpected ‘shared file’ email. Select all that apply. Which attachment types or containers are higher risk and deserve extra verification?

Select all that apply

21Arrange the best steps after you realize you entered your work credentials into a fake login page.

Put in order

1Notify IT/security immediately
2Review and remove suspicious mailbox rules if instructed
3Enable multi-factor authentication (MFA)
4Change your password using the official portal
5Stop using the suspicious page and close it
22You get an invoice email from a known vendor, but the bank details are different and the message says the ‘finance portal is down’ so you must wire today. What is the best action?
23Select all that apply. Which features are more typical of business email compromise (BEC) than mass phishing?

Select all that apply

24Arrange the steps to safely verify a payment-change request that arrived by email.

Put in order

1Escalate to finance/security per policy if anything is off
2Confirm the request using a previously known phone number or portal
3Check the sender domain and Reply-To details
4Do not use the email’s provided link or phone number
25Select all that apply. You suspect a link may use a redirect chain to hide the final destination. Which actions reduce risk?

Select all that apply

26Arrange the incident-response actions for a suspected account compromise where you notice unfamiliar email forwarding rules were created.

Put in order

1Notify IT/security and follow incident procedures
2Check for additional changes (recovery email, devices, app passwords)
3Enable or re-enroll MFA
4Reset password via the official portal
5Remove/disable suspicious forwarding rules (as directed)
27Arrange the safest actions after you opened a suspicious attachment and it asked you to ‘Enable Content’ (macros).

Put in order

1Disconnect from the network if you suspect execution (per policy)
2Follow IT instructions for scanning or reimaging
3Do not enable content/macros
4Notify IT/security immediately
5Preserve the email/attachment for analysis (do not forward broadly)

Disclaimer

This quiz is for educational purposes only. It does not constitute professional advice. Consult a qualified professional for specific guidance.

Watch Out

High-Frequency Phishing Misreads That Still Lead to Real Breaches

Most misses in a phishing email quiz come from fast pattern-matching under time pressure, not from ignoring “obvious” typos. These are the errors that repeatedly cause credential theft and business email compromise (BEC) outcomes.

Trusting the display name instead of the real sender

Avoid it: Expand the sender details and verify the domain matches the organization’s real domain (not a free mail domain, a misspelling, or an unrelated vendor domain). Treat “external” banners as a signal, not proof of safety.

Reading the link text, not the destination

Avoid it: Hover to preview, but also evaluate who controls the domain and whether the path makes sense (login pages on strange subdomains, URL shorteners, and tracking/redirect chains). When stakes are high (passwords, payments), open a new tab and navigate via a trusted bookmark or known URL.

Assuming HTTPS or a lock icon means legitimacy

Avoid it: Encryption protects transport, not identity. A phishing site can use HTTPS; legitimacy comes from the correct domain and expected workflow.

Ignoring reply-to, “on behalf of,” and header cues

Avoid it: If “From” looks right but replies route elsewhere (or the message is “on behalf of” an unexpected sender), treat it as suspicious until verified via a separate channel.

Normalizing urgent “action required” demands

Avoid it: Deadlines, threats, or secrecy requests are designed to bypass controls. Slow down and verify the request using known contacts—especially for payroll changes, wire transfers, gift cards, and MFA resets.

Opening unexpected attachments as if they were inert documents

Avoid it: Office files, PDFs, and archives can deliver malware or credential prompts. If you weren’t expecting it, confirm the context first and use approved secure-sharing methods.

Highlights

Email Phishing Detection: 5 Actions That Raise Your Accuracy Immediately

Use these takeaways as a checklist for what the quiz is really measuring: your ability to validate identity, intent, and destination before you interact with a message.

  1. Validate the sender’s domain and the reply path before content. Expand the sender details, confirm the organizational domain, and check for reply-to mismatches; treat “looks internal” as untrusted until verified.
  2. Judge links by registrable domain ownership, not by familiar words. A brand name in the subdomain (e.g., brand.login.example) can still point to an attacker-controlled domain; when uncertain, navigate independently rather than using the email’s button.
  3. Translate urgency into a verification step. If an email imposes a deadline (account lock, payment failure, delivery issue), switch channels: call a known number, use your company directory, or open the vendor portal from a saved bookmark.
  4. Treat credential prompts as high-risk events. Password resets, MFA re-enrollment, “secure document” viewers, and shared file notifications are common lures; use your organization’s official sign-in entry point and consider phishing-resistant MFA where available.
  5. Assume attachments can execute outcomes, not just display content. Unexpected invoices, “scanned documents,” HR forms, and compressed files should be handled as potential malware delivery or credential capture; confirm with the supposed sender and use scanning/preview tools approved by IT.

Skill goal: build the habit of pausing at the decision points the attacker needs—click, reply, open, or pay—and forcing a quick identity/destination check first.

Links

Authoritative Phishing Guidance for Deeper Study (Gov + Standards)

FAQ

Phishing Email Quiz FAQ: Interpreting Red Flags and Choosing Safe Next Steps

Which parts of an email should I inspect first to spot spoofing quickly?

Start with the From address (expand it), then check reply-to and any “sent on behalf of” indicator. Next, evaluate the call to action (reset password, open attachment, approve payment) and only then read the narrative. This order prevents a believable story from biasing your technical checks.

If the URL preview looks normal when I hover, is it safe to click?

It’s safer, not guaranteed. Lookalike domains can appear legitimate at a glance, and redirect chains can begin on a reputable domain and end on a credential-harvesting page. For logins, payroll, or payments, the safer workflow is: open a new tab and navigate via a trusted bookmark or your organization’s official portal.

How do I handle emails requesting wire transfers, gift cards, or payroll changes?

Treat them as potential business email compromise even if the sender appears internal. Use an out-of-band verification step (call a known number from your directory, not the email). Require a second approver for payment changes, and confirm the request details (beneficiary, routing, timing) verbally.

What should I do immediately if I clicked a suspicious link or opened an attachment?

Stop the interaction (close the tab/document), do not enter credentials, and report it to your IT/security team using your organization’s preferred method. If you entered a password, change it right away and enable MFA; if it was a work account, follow incident-response instructions from IT. For broader practice on workplace reporting and safe handling, see the Information Security Quiz for Employees.

Why do some phishing emails look “perfect” now, and what should I rely on instead of spelling mistakes?

Attackers increasingly use polished templates and AI-assisted writing, so grammar is no longer a reliable filter. Use stronger signals: context mismatch (unexpected invoice/reset), identity mismatch (sender domain, reply-to), and destination mismatch (where the link actually goes). Also, prepare for account recovery by maintaining secure backups of important data; the Data Backup Assessment Questionnaire complements this quiz by reinforcing resilience if an incident escalates.

AI-DraftedHuman-Reviewed
Reviewed by
Michael HodgeEdTech Product Lead & Assessment Design SpecialistQuiz Maker
Updated Feb 24, 2026