Email & Identity Security

This quiz is designed to test and strengthen your understanding of the email and identity security risks you may encounter in your daily work. Each question presents a realistic scenario, including suspicious emails, unexpected authentication prompts, potential phishing attempts, account‑related warnings, and situations where your identity or login details could be targeted. You will be asked to choose the safest and most appropriate response in each case.


The goal of this exercise is to help you recognise modern email threats, protect your identity, and apply the best practices that keep both you and the organisation safe. By working through these examples, you will build stronger awareness of how attackers attempt to gain access and reinforce the habits that support a secure working environment.

Make your attempt count, there’s only one chance to pass this quiz.

By continuing, you agree that System Force can use your details to send you your quiz results by email.

What is "Consent Phishing"?

Why are spoofed/compromised business email attacks effective?

What is the best method to keep your passwords secure?

What is the biggest benefit of Multi‑Factor Authentication (MFA)?

You realise you have clicked a suspicious link, what should you do?

You receive an email relating to your login. What could be a sign that it is fraudulent?

What is the most important detail to check when inspecting a potentially suspicious link?

What could be an indication of credential stuffing?

How might you tell that an email is a phishing attempt?

You have received an email you believe is suspicious, how should it be handled?

How could you tell that an email attachment may be malicious?

Which of the following would be a good habit to keep your accounts secure?

Why should you avoid using your personal email for work related communications?

How confident do you feel in your ability to identify and respond to cyber threats after attending this webinar?

Any additional feedback you would like to make us aware of?

Which part of the training did you find most valuable for improving your cyber resiliency skills, and why?

What additional topics would you like to see covered in future cyber resiliency sessions?