Email & Identity Security

Email & Identity Security

This quiz is designed to test and strengthen your understanding of the email and identity security risks you may encounter in your daily work. Each question presents a realistic scenario, including suspicious emails, unexpected authentication prompts, potential phishing attempts, account‑related warnings, and situations where your identity or login details could be targeted. You will be asked to choose the safest and most appropriate response in each case.


The goal of this exercise is to help you recognise modern email threats, protect your identity, and apply the best practices that keep both you and the organisation safe. By working through these examples, you will build stronger awareness of how attackers attempt to gain access and reinforce the habits that support a secure working environment.

Make your attempt count, there’s only one chance to pass this quiz.

By continuing, you agree that System Force can use your details to send you your quiz results by email.

What additional topics would you like to see covered in future cyber resiliency sessions?

How confident do you feel in your ability to identify and respond to cyber threats after attending this webinar?

Which part of the training did you find most valuable for improving your cyber resiliency skills, and why?

Any additional feedback you would like to make us aware of?

What could be an indication of credential stuffing?

Why are spoofed/compromised business email attacks effective?

What is "Consent Phishing"?

What is the best method to keep your passwords secure?

How might you tell that an email is a phishing attempt?

You receive an email relating to your login. What could be a sign that it is fraudulent?

Which of the following would be a good habit to keep your accounts secure?

You realise you have clicked a suspicious link, what should you do?

Why should you avoid using your personal email for work related communications?

What is the biggest benefit of Multi‑Factor Authentication (MFA)?

How could you tell that an email attachment may be malicious?

You have received an email you believe is suspicious, how should it be handled?

What is the most important detail to check when inspecting a potentially suspicious link?