
Cybersecurity Awareness: Phishing
Quiz by Mariana Mambo
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
29 questions
Show answers
- Q11.What is Phishing?Phishing is a type of fishing done with a special kind of net.Phishing is a type of gardening technique used to grow fish.Phishing is a type of cyber attack where scammers send fraudulent emails or messages to trick individuals into providing sensitive information such as passwords, credit card numbers, or personal details.Phishing is a type of exercise involving swimming like a fish in water.30s
- Q22. Which of these is a common sign of a phishing email?No spelling or grammar mistakesA personalized greetingUrgent language demanding immediate actionThe email is from a known colleague30s
- Q33. What should you do if you receive a suspicious email?Click on any links in the email to see what they lead to.Do not click on any links or download any attachments in the email.Forward the email to all of your contacts.Reply to the email with all of your personal information.30s
- Q44. Which of the following should NOT be shared over email?Your favorite colorYour weekend plansA funny memeYour password30s
- Q56. Which type of information is phishing most likely trying to steal?General knowledge answersYour favorite moviePersonal and financial informationYour opinions on music30s
- Q67. True or False: All emails from known contacts are safe.FalseTrue30s
- Q78. What is the safest action to take if you receive an unexpected attachment?Forward it to your friends for adviceContact the sender through a different medium to confirm its legitimacyDownload it, then decide whether to open itOpen it immediately to see what it is30s
- Q89. Which feature is a red flag in an email claiming to be from your bank?The official bank logoA request to confirm your account numberInformation about the bank’s new offerA greeting with your first name30s
- Q910.True or False: Phishing can only occur via email.TrueFalse30s
- Q101. How can you verify the legitimacy of a website?Ensure the website has a minimalist designCheck for the HTTPS prefix and the padlock symbol in the browserLook for a high number of visitors on the siteMake sure the website has a lot of pop-up ads30s
- Q112.Which technique do phishers use to make links look legitimate?Misspelling URLs to resemble the actual company's websiteProviding detailed contact informationUsing official company logos onlyOnly linking to secure websites30s
- Q123. What is a 'Pharming' attack?Creating a farm-themed online game to collect user dataRedirecting users from a legitimate website to a malicious oneSelling fake pharmaceuticals onlineSending emails from a company's human resources department30s
- Q134. Analyze this scenario for phishing indicators:LegitimatePhishing30s
- Q145. Which action should raise suspicion when browsing online?A blog asks for your email to subscribe to newslettersAn e-commerce site offers multiple payment methodsA website asks you to verify your identity by entering your social security numberA news website provides today's weather report30s
- Q156. What's a red flag for a website URL in a phishing email?The inclusion of the company’s nameA .com domainA misspelling of a legitimate website’s nameHTTPS at the start of the URL30s