Instructions
Answer each question by choosing the correct option (A–D) or selecting True/False. After each question, the correct answer and a brief explanation are provided so you can learn as you go.
Key Concepts
- Social engineering manipulates people into revealing confidential information.
- Phishing uses deceptive emails, messages, or websites to steal data.
- Warning signs include urgent language, unexpected attachments, spoofed addresses, and requests for sensitive info.
- Best defenses: verify sources, hover over links, use MFA, and report suspicious messages.





