Phishing
Quiz by HERON BAUTISTA
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1What is the goal of phishing?To obtain sensitive information, such as passwords, credit card numbers, or Social Security numbers, for fraudulent purposesTo spread malwareTo provide entertainmentTo promote a product or service30s
- Q2Which of the following is a common form of phishing?Physical phishingEmail phishingVisual phishingVerbal phishing30s
- Q3What is spear phishing?A highly targeted form of phishing in which hackers gather information about a specific person or organization and use that information to send personalized phishing messagesA type of huntingA type of fishingA type of team sport30s
- Q4What is smishing?A form of social media phishingA form of email phishingA form of smartphone phishingA form of phishing that uses text messages to trick victims into providing sensitive information30s
- Q5What is vishing?A form of virtual reality phishingA form of visual phishingA form of video phishingA form of phishing that uses voice messages or phone calls to trick victims into providing sensitive information30s
- Q6What is a red flag of a phishing email?A request for non-sensitive informationA sense of urgency or fear that something bad will happen if you don't act immediatelyA friendly tone and personalized greetingA clear and concise message30s
- Q7What is a common tactic used in phishing emails?Language manipulation, in which hackers use persuasive language to convince victims to take actionLink manipulation, in which hackers disguise links to look like legitimate ones but actually lead to fake websitesImage manipulation, in which hackers use fake images to deceive victimsAttachment manipulation, in which hackers attach malware to emails30s
- Q8What is the best way to protect yourself from phishing?Ignoring all messages from unknown sourcesBeing cautious and skeptical of unexpected or suspicious messages, not clicking on links or downloading attachments from unknown sources, and using antivirus softwareSharing all personal information freelyChanging your passwords frequently30s
- Q9What should you do if you think you've been phished?Respond to the phishing attempt and provide false informationChange your passwords immediately, notify your financial institutions if necessary, and report the phishing attempt to the appropriate authoritiesDo nothing, since the damage is already doneShare the phishing attempt on social media30s
- Q10What is phishing?A type of computer virusA type of fishA type of online scam in which criminals send messages or create websites that seem legitimate but are meant to trick victims into providing sensitive informationA type of dancing30s