Quiz Background

Real or Fake? Detection Challenge

Test your ability to identify deepfakes, phishing attempts, and manipulated content. This comprehensive quiz will challenge your detection skills with real-world examples.

15:00

Time remaining

Question 1 of 10

Video Analysis
Examine this screenshot from a video of a political figure making a controversial statement. Based on visual analysis, is this content authentic or artificially generated?
Look for inconsistencies in facial features, unnatural eye movements, or mismatched lighting between the face and background.
Real - This appears to be authentic footage with natural facial expressions and consistent lighting
Fake - The facial mapping shows inconsistencies typical of deepfake generation
Uncertain - More analysis would be needed to make a definitive determination
Correct Answer: Fake
This is a deepfake video. Key indicators include subtle inconsistencies in facial mapping, unnatural eye movements, and slight misalignment between facial features and head movements. Modern deepfake detection often requires frame-by-frame analysis to identify these telltale signs.
Email Analysis
Analyze this email claiming to be from a major tech company. Is this a legitimate security notification or a phishing attempt?
Check the sender's email address, look for urgency tactics, and examine any links or attachments for suspicious patterns.
Legitimate - The email follows standard security notification formats
Phishing - Contains multiple red flags typical of social engineering attacks
Uncertain - Would need to verify the sender through official channels
Correct Answer: Phishing
This is a phishing email. Red flags include: generic greeting, urgent language designed to create panic, suspicious sender domain, and a request to click a link to "verify" account information. Legitimate companies rarely ask for sensitive information via email.
Deepfake Comparison
This image shows a comparison between original and processed content. Which techniques can help identify deepfake manipulation in videos?
Consider both technical analysis methods and visual cues that human observers can detect.
Analyzing facial landmarks and micro-expressions for inconsistencies
Checking file metadata alone is sufficient for detection
Audio quality is the most reliable indicator of deepfakes
Correct Answer: Analyzing facial landmarks and micro-expressions
Deepfake detection relies heavily on analyzing facial landmarks, micro-expressions, and temporal inconsistencies. While metadata and audio can provide clues, sophisticated deepfakes often maintain high technical quality, making facial analysis the most reliable detection method.
Advanced Phishing
This email appears to be from a financial institution requesting account verification. What makes this particularly dangerous?
Look for sophisticated elements that make this attack more convincing than typical phishing attempts.
It uses official branding and creates urgency with account suspension threats
It contains obvious spelling and grammar errors
It asks for payment information directly in the email
Correct Answer: Official branding and urgency tactics
This is a sophisticated phishing attempt that uses legitimate-looking branding, professional formatting, and psychological pressure (account suspension threat) to manipulate victims. The lack of obvious errors makes it more dangerous than typical phishing emails.
SMS Phishing
This SMS message claims to be from a delivery service. What are the key indicators that this is a smishing (SMS phishing) attack?
Consider the sender information, message content, and any links or actions requested.
Suspicious short URL and urgent action required
Professional formatting and company branding
Detailed tracking information provided
Correct Answer: Suspicious short URL and urgent action
This smishing attack uses a shortened URL to hide the real destination and creates urgency by claiming a delivery issue. Legitimate delivery services typically use official domains and provide detailed tracking information without requiring immediate action.
Deepfake Analysis
Examine this image for signs of AI-generated content. What visual cues might indicate this is a deepfake?
Look for inconsistencies in lighting, shadows, facial features, or background elements.
Inconsistent lighting and unnatural facial symmetry
High image resolution indicates authenticity
Clear facial features prove it's real
Correct Answer: Inconsistent lighting and unnatural facial symmetry
Deepfakes often struggle with consistent lighting across the face and may produce unnaturally perfect facial symmetry. High resolution and clear features don't guarantee authenticity, as modern AI can generate very high-quality synthetic content.
Business Email
This email appears to be from a company executive requesting an urgent wire transfer. What makes this a potential Business Email Compromise (BEC) attack?
Consider the request type, urgency level, and verification methods mentioned in the email.
Urgent financial request with limited verification options
Professional email signature and formatting
Request for standard business documentation
Correct Answer: Urgent financial request with limited verification
BEC attacks typically involve urgent financial requests that bypass normal verification procedures. The urgency and confidentiality claims are designed to prevent the recipient from verifying the request through normal channels.
Social Media Content
This image was shared on social media claiming to show a celebrity in a compromising situation. How can you verify its authenticity?
Think about verification methods beyond just visual analysis.
Reverse image search and cross-reference with reliable sources
Trust the social media platform's verification
Assume it's real if it looks convincing
Correct Answer: Reverse image search and cross-reference
The best approach is to use reverse image search tools and cross-reference with reliable news sources. Social media platforms don't verify content authenticity, and visual convincingness alone is not sufficient in the age of sophisticated deepfakes.
Photo Analysis
This photograph claims to show a historical event. What techniques can help identify if it has been digitally manipulated?
Consider both technical analysis tools and visual inspection methods.
Error Level Analysis (ELA) and examining shadows/lighting consistency
Checking the file size and format
Looking at the image resolution only
Correct Answer: Error Level Analysis and lighting consistency
ELA can reveal areas of different compression levels indicating manipulation, while examining shadows and lighting consistency helps identify composited elements. File size and resolution alone don't indicate manipulation.
Website Analysis
You receive this email with a link to what appears to be your bank's website. What should you check before entering any information?
Focus on URL verification and secure connection indicators.
Verify the URL matches the official domain and check for HTTPS
Trust the email if it looks professional
Check if the website loads quickly
Correct Answer: Verify URL and check HTTPS
Always verify the URL matches the official domain exactly and ensure the connection is secure (HTTPS). Professional appearance doesn't guarantee legitimacy, and loading speed is irrelevant to security. When in doubt, navigate to the official website directly rather than clicking email links.

Quiz Complete!

0/10

Your Detection Skills

Keep practicing to improve your ability to identify digital deception!

Question 1 of 10