placeholder image to represent content


Quiz by Ms. Lauber

Feel free to use or edit a copy

includes Teacher and Student dashboards

Measure skills
from any curriculum

Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.

With a free account, teachers can
  • edit the questions
  • save a copy for later
  • start a class game
  • automatically assign follow-up activities based on students’ scores
  • assign as homework
  • share a link with colleagues
  • print as a bubble sheet

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
3 questions
Show answers
  • Q1
    The avenue or path a hacker uses to commit the attack is a(n) ____.
    B. attack vector
    D. social engineering attack
    C. phreaking
    A. black hat email
  • Q2
    Which of the following cyberattacks involves manipulating people to obtain information to hack computer systems?
    Social Engineering
    Dumpster Diving
  • Q3
    Which of the following is not a typical reason for using the darknet?
    B. Accessing blocked information
    D. Criminal activity, such as selling credit card numbers
    A. Traditional web searching
    C. Political and social activists promoting their cause

Teachers give this quiz to your class