Quiz Taker AI
Question JSON:
{ "questions": "[{\"id\":\"question-1755875192546-q4m7kv23d\",\"qtype\":\"statement\",\"sTitle\":\"Video For Referrance\",\"sContent\":\"Video For Referrance\",\"videoUrl\":\"https://simuphish.hel1.your-objectstorage.com/media/video/2025-08-16 13-10-56.mp4\"},{\"id\":\"question-1755875010773-gpsp7q2zx\",\"qtype\":\"image\",\"sTitle\":\"Phishing image\",\"sContent\":\"Phishing Image\",\"imageUrl\":\"https://simuphish.hel1.your-objectstorage.com/media/image/ai-generated-1755875042900.png\",\"questionText\":\"What is the color of bag from you\",\"options\":[\"Red\",\"Blue\",\"Yellow\",\"Green\"],\"correctAnswer\":2},{\"id\":\"question-1755875123873-5my6ead0t\",\"qtype\":\"document\",\"sTitle\":\"Referrance Document\",\"sContent\":\"Reference document for phishing\",\"documentUrl\":\"https://simuphish.hel1.your-objectstorage.com/media/pdf/📦 4-Week Live Workshop –Details.pdf\"},{\"id\":\"1\",\"qtype\":\"multiple-choice\",\"sTitle\":\"What is a common sign of a phishing email?\",\"sContent\":\"What is a common sign of a phishing email?\",\"options\":[\"A generic greeting\",\"An unexpected attachment\",\"A request for personal information\",\"All of the above\"],\"correctAnswer\":3,\"explanation\":\"Phishing emails often include generic greetings, unexpected attachments, or ask for personal information.\",\"difficulty\":\"medium\",\"category\":\"Compliance\",\"estimatedTime\":60,\"points\":1,\"videoUrl\":\"\",\"imageUrl\":\"\",\"documentUrl\":\"\"},{\"id\":\"2\",\"qtype\":\"multiple-choice\",\"sTitle\":\"As a developer, which measure would be most effective to help prevent phishing attacks on an e-commerce website?\",\"sContent\":\"As a developer, which measure would be most effective to help prevent phishing attacks on an e-commerce website?\",\"options\":[\"Use SSL certificates\",\"Implement CAPTCHA\",\"Regularly update security patches\",\"Conduct user awareness training\"],\"correctAnswer\":2,\"explanation\":\"Regularly updating security patches on the web platform prevents vulnerabilities that could be exploited through phishing.\",\"difficulty\":\"hard\",\"category\":\"Compliance\",\"estimatedTime\":90,\"points\":2,\"videoUrl\":\"\",\"imageUrl\":\"\",\"documentUrl\":\"\"},{\"id\":\"3\",\"qtype\":\"true-false\",\"sTitle\":\"Phishing only targets financial information.\",\"sContent\":\"Phishing only targets financial information.\",\"options\":[\"True\",\"False\"],\"correctAnswer\":\"False\",\"explanation\":\"Phishing can target various types of information, including credentials, personal information, and more.\",\"difficulty\":\"medium\",\"category\":\"Compliance\",\"estimatedTime\":30,\"points\":1,\"videoUrl\":\"\",\"imageUrl\":\"\",\"documentUrl\":\"\"},{\"id\":\"4\",\"qtype\":\"short-answer\",\"sTitle\":\"Explain how a developer can identify a potential phishing URL on a retail platform.\",\"sContent\":\"Explain how a developer can identify a potential phishing URL on a retail platform.\",\"options\":[],\"correctAnswer\":\"By examining the URL structure for any suspicious elements, such as typos, unexpected subdomains, or mismatched domain names, and using URL verification tools.\",\"explanation\":\"Phishing URLs often attempt to mimic legitimate ones but may contain subtle differences that can be caught by detailed inspection.\",\"difficulty\":\"hard\",\"category\":\"Compliance\",\"estimatedTime\":120,\"points\":2,\"videoUrl\":\"\",\"imageUrl\":\"\",\"documentUrl\":\"\"},{\"id\":\"5\",\"qtype\":\"scenario\",\"sTitle\":\"You receive an email claiming to be from your retail company's IT department, asking you to confirm your password by clicking a link. What steps should you take to verify the legitimacy of this email?\",\"sContent\":\"You receive an email claiming to be from your retail company's IT department, asking you to confirm your password by clicking a link. What steps should you take to verify the legitimacy of this email?\",\"options\":[],\"correctAnswer\":\"Firstly, do not click on the link. Verify the sender's email address for any anomalies. Contact the IT department directly using verified contact information from the company's directory. Report the email if it appears suspicious.\",\"explanation\":\"Phishing emails often have subtle signs of being malicious. It's important to verify the request through official channels and avoid interacting directly with suspicious emails.\",\"difficulty\":\"medium\",\"category\":\"Compliance\",\"estimatedTime\":180,\"points\":2,\"videoUrl\":\"\",\"imageUrl\":\"\",\"documentUrl\":\"\"},{\"id\":\"6\",\"qtype\":\"scenario\",\"sTitle\":\"Describe the process of implementing a secure email filter to prevent phishing scams in a retail company's email system.\",\"sContent\":\"Describe the process of implementing a secure email filter to prevent phishing scams in a retail company's email system.\",\"options\":[],\"correctAnswer\":\"Implementing a secure email filter involves configuring spam filters to detect and quarantine suspected phishing emails, setting rules for identifying suspicious email patterns, ensuring email authentication protocols like SPF and DKIM are enabled, and regularly updating blacklist databases.\",\"explanation\":\"A secure email filter helps automatically detect and block potential phishing attempts by applying various security protocols and filtering rules.\",\"difficulty\":\"hard\",\"category\":\"Compliance\",\"estimatedTime\":240,\"points\":3,\"videoUrl\":\"\",\"imageUrl\":\"\",\"documentUrl\":\"\"},{\"id\":\"7\",\"qtype\":\"multiple-choice\",\"sTitle\":\"Which of the following is a good practice to verify email senders within a retail environment?\",\"sContent\":\"Which of the following is a good practice to verify email senders within a retail environment?\",\"options\":[\"Reply to the email asking for confirmation\",\"Check the sender's email against official company contact lists\",\"Trust the domain if it looks similar\",\"Open any attachments to verify content\"],\"correctAnswer\":1,\"explanation\":\"Verifying the sender's email against a known contact list ensures that the communication is legitimate.\",\"difficulty\":\"medium\",\"category\":\"Compliance\",\"estimatedTime\":60,\"points\":1,\"videoUrl\":\"\",\"imageUrl\":\"\",\"documentUrl\":\"\"},{\"id\":\"8\",\"qtype\":\"scenario\",\"sTitle\":\"You are tasked with developing a website feature that alerts users about potential phishing threats when entering sensitive information. Outline the approach you would take to implement this feature.\",\"sContent\":\"You are tasked with developing a website feature that alerts users about potential phishing threats when entering sensitive information. Outline the approach you would take to implement this feature.\",\"options\":[],\"correctAnswer\":\"The feature should include real-time analysis of the webpage's URLs and contents to detect known phishing indicators. It could utilize machine learning algorithms to assess risk levels and provide warnings. Ensure integration with updated phishing databases and provide users guidance on verifying the legitimacy of requests for information.\",\"explanation\":\"Effective phishing warnings require a combination of real-time analysis, data integration, and user-friendly guidance to prevent data compromises.\",\"difficulty\":\"hard\",\"category\":\"Compliance\",\"estimatedTime\":300,\"points\":3,\"videoUrl\":\"\",\"imageUrl\":\"\",\"documentUrl\":\"\"},{\"id\":\"9\",\"qtype\":\"multiple-choice\",\"sTitle\":\"Which of these tools can be used to identify phishing sites?\",\"sContent\":\"Which of these tools can be used to identify phishing sites?\",\"options\":[\"Google Safe Browsing\",\"Task Scheduler\",\"Disk Cleanup\",\"Microsoft Excel\"],\"correctAnswer\":0,\"explanation\":\"Google Safe Browsing helps identify and warn users about potential phishing sites.\",\"difficulty\":\"easy\",\"category\":\"Compliance\",\"estimatedTime\":45,\"points\":1,\"videoUrl\":\"\",\"imageUrl\":\"\",\"documentUrl\":\"\"},{\"id\":\"10\",\"qtype\":\"true-false\",\"sTitle\":\"Phishing links can appear as part of legitimate domains.\",\"sContent\":\"Phishing links can appear as part of legitimate domains.\",\"options\":[\"True\",\"False\"],\"correctAnswer\":\"True\",\"explanation\":\"Phishers often create URLs within legitimate-looking domains to deceive users.\",\"difficulty\":\"easy\",\"category\":\"Compliance\",\"estimatedTime\":30,\"points\":1,\"videoUrl\":\"\",\"imageUrl\":\"\",\"documentUrl\":\"\"},{\"id\":\"11\",\"qtype\":\"short-answer\",\"sTitle\":\"What is spear phishing, and how does it differ from regular phishing?\",\"sContent\":\"What is spear phishing, and how does it differ from regular phishing?\",\"options\":[],\"correctAnswer\":\"Spear phishing is a targeted phishing attack aimed at specific individuals or organizations, often using personalized information to increase credibility, unlike regular phishing which is more generic.\",\"explanation\":\"Spear phishing targets specific individuals by leveraging personal information to appear legitimate, increasing the chances of success.\",\"difficulty\":\"medium\",\"category\":\"Compliance\",\"estimatedTime\":90,\"points\":1,\"videoUrl\":\"\",\"imageUrl\":\"\",\"documentUrl\":\"\"}]", "module_language": "en" }
Your response:
Send Answer
Log