Return to course: CyberAI Academy
Cyber AI
Previous Lesson
Previous
Next
Next Lesson
CyberAI Academy
Grades
Videos
Video Lessons Intro
Baseline Survey
Video Lesson 1
Video Lesson 2
Video Lesson 3
Video Lesson 4
Video Lesson 5
Video Lesson 6
Video Lesson 7
Video Lesson 8
Video Lesson 9
Video Lesson 10
Video Lesson 11
Video Lesson 12
Video Lesson 13
Video Lesson 14
Video Lesson 15
Final Quiz
Post Training Survey
Baseline Survey
1. Which of the following is a red flag in a phishing email? (Select all that apply)
*
Urgent requests to act immediately
Unusual sender address with subtle typos
Personal message from a known friend
Invoice with unchanged vendor details
2. On a scale from 1 to 5, rate your agreement: “I can confidently spot suspicious email links.”
*
1 – Strongly Disagree
2 – Disagree
3 – Neutral
4 – Agree
5 – Strongly Agree
3. You receive a text message claiming to be from your bank with a link to “verify your account.” What should you do?
*
Click the link to resolve the issue quickly
Forward the text to a friend for advice
Contact the bank directly using official channels
Ignore the message and delete it
4. What should you check before clicking a shortened URL (e.g., bit.ly link)? (Select all that apply)
*
The source of the message
Preview the link if possible
Trust it because it looks simple
Context and relevance of the link
5. You see a social media giveaway offering free cryptocurrency for a retweet. What should you do? (Select all that apply)
*
Join immediately to not miss out
Check if the account is verified
Report the post if it seems fake
Share the post to confirm authenticity
6. On a scale from 1 to 5, rate your agreement: “I usually recognize scam messages on social media.”
*
1 – Strongly Disagree
2 – Disagree
3 – Neutral
4 – Agree
5 – Strongly Agree
7. Business Email Compromise (BEC) scams typically include: (Select all that apply)
*
Requests for gift cards or urgent wire transfers
Emails from addresses with subtle misspellings
Promises of personal rewards
Pressure to bypass normal protocols
8. You receive an invoice with updated payment details from a known vendor. What’s the safest response?
*
Approve the payment to maintain a good relationship
Double-check the bank info by calling a verified contact
Ask your team to approve it urgently
Email the sender for clarification
9. Which of the following is commonly used in deepfake-enabled hybrid scams? (Select all that apply)
*
AI-generated video/audio of executives
Social media impersonation profiles
Verified business credentials
Obvious language errors in messaging
10. You’re asked to urgently send company info to someone claiming to be the CEO. What should you do first?
*
Verify using a second communication method
Assume it’s real and respond quickly
CC another executive to show awareness
Forward it to your team for group handling
11. On a scale from 1 to 5, how aware are you of fake profiles on LinkedIn or Facebook?
*
1 – Not at all aware
2 – Slightly aware
3 – Neutral
4 – Aware
5 – Very aware
12. Which actions can help verify a suspicious crypto giveaway? (Select all that apply)
*
Check for grammatical errors or inconsistencies
Validate the user account history and profile age
Click the link just to see what happens
Look for urgency tactics and too-good-to-be-true offers
13. A CEO’s video appears on social media promoting a fake investment. What tactic is being used?
*
Impersonation fraud
Malware distribution
Spoofed browser phishing
Ransomware baiting
14. On a scale from 1 to 5, how confident are you in spotting spoofed emails?
*
1 – Not confident at all
2 – Slightly confident
3 – Neutral
4 – Confident
5 – Very confident
15. Which of the following might suggest a hybrid AI-enabled scam? (Select all that apply)
*
A familiar voice asks for unusual financial info
Instructions arrive via SMS and email together
Requests include biometric or voice approval steps
Direct message from your verified CFO account
16. A deepfake voicemail asks you to reset a payment method urgently. What’s your response?
*
Contact the person via another method to verify
Follow instructions because the voice is familiar
Email them to confirm the voicemail details
Approve payment changes without delay
17. What combination increases scam credibility? (Select all that apply)
*
Familiar names or logos
Use of urgency and authority
Casual language and emoji
Matching corporate tone and terminology
18. On a scale from 1 to 5, how likely are you to verify unexpected payment requests?
*
1 – Very unlikely
2 – Unlikely
3 – Neutral
4 – Likely
5 – Very likely
19. Which of these responses help stop fraud in its early stages? (Select all that apply)
*
Reporting suspicious activity to IT
Verifying requests through trusted channels
Responding first, verifying later
Keeping others informed if unsure
20. Which of the following are signs of a cryptocurrency investment scam? (Select all that apply)
*
Guaranteed returns with zero risk
Celebrities promoting crypto giveaways
Contact from unknown accounts offering quick gains
Transparent project roadmaps and disclosures