placeholder image to represent content



Feel free to use or edit a copy

includes Teacher and Student dashboards

Measure skills
from any curriculum

Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.

With a free account, teachers can
  • edit the questions
  • save a copy for later
  • start a class game
  • view complete results in the Gradebook and Mastery Dashboards
  • automatically assign follow-up activities based on students’ scores
  • assign as homework
  • share a link with colleagues
  • print as a bubble sheet

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1
    What is the goal of phishing?
    To obtain sensitive information, such as passwords, credit card numbers, or Social Security numbers, for fraudulent purposes
    To spread malware
    To provide entertainment
    To promote a product or service
  • Q2
    Which of the following is a common form of phishing?
    Physical phishing
    Email phishing
    Visual phishing
    Verbal phishing
  • Q3
    What is spear phishing?
    A highly targeted form of phishing in which hackers gather information about a specific person or organization and use that information to send personalized phishing messages
    A type of hunting
    A type of fishing
    A type of team sport
  • Q4
    What is smishing?
    A form of social media phishing
    A form of email phishing
    A form of smartphone phishing
    A form of phishing that uses text messages to trick victims into providing sensitive information
  • Q5
    What is vishing?
    A form of virtual reality phishing
    A form of visual phishing
    A form of video phishing
    A form of phishing that uses voice messages or phone calls to trick victims into providing sensitive information
  • Q6
    What is a red flag of a phishing email?
    A request for non-sensitive information
    A sense of urgency or fear that something bad will happen if you don't act immediately
    A friendly tone and personalized greeting
    A clear and concise message
  • Q7
    What is a common tactic used in phishing emails?
    Language manipulation, in which hackers use persuasive language to convince victims to take action
    Link manipulation, in which hackers disguise links to look like legitimate ones but actually lead to fake websites
    Image manipulation, in which hackers use fake images to deceive victims
    Attachment manipulation, in which hackers attach malware to emails
  • Q8
    What is the best way to protect yourself from phishing?
    Ignoring all messages from unknown sources
    Being cautious and skeptical of unexpected or suspicious messages, not clicking on links or downloading attachments from unknown sources, and using antivirus software
    Sharing all personal information freely
    Changing your passwords frequently
  • Q9
    What should you do if you think you've been phished?
    Respond to the phishing attempt and provide false information
    Change your passwords immediately, notify your financial institutions if necessary, and report the phishing attempt to the appropriate authorities
    Do nothing, since the damage is already done
    Share the phishing attempt on social media
  • Q10
    What is phishing?
    A type of computer virus
    A type of fish
    A type of online scam in which criminals send messages or create websites that seem legitimate but are meant to trick victims into providing sensitive information
    A type of dancing

Teachers give this quiz to your class