Icon Créer jeu Créer jeu

Phishing Awareness Quiz

Test

Test your knowledge on phishing and learn how to stay safe online!

Téléchargez la version pour jouer sur papier

11 fois fait

Créé par

Saint Vincent and the Grenadines

Top 10 résultats

  1. 1
    Ezra Browne
    Ezra Browne
    02:09
    temps
    100
    but
  2. 2
    Za
    Za
    02:38
    temps
    87
    but
  3. 3
    Stephon C
    Stephon C
    03:39
    temps
    87
    but
  4. 4
    Jozel
    Jozel
    03:36
    temps
    73
    but
  5. 5
    Nelsia Samuel
    Nelsia Samuel
    02:31
    temps
    60
    but
  6. 6
    Kevis Pompey
    Kevis Pompey
    03:42
    temps
    53
    but
  7. 7
    Shonell Delplesche
    Shonell Delplesche
    03:07
    temps
    47
    but
  8. 8
    M
    M
    01:55
    temps
    33
    but
  9. 9
    Nalia Browne
    Nalia Browne
    03:07
    temps
    33
    but
  10. 10
    02:13
    temps
    20
    but
Voulez-vous apparaître dans le Top 10 de ce jeu? pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
 
game-icon

Phishing Awareness QuizVersion en ligne

Test your knowledge on phishing and learn how to stay safe online!

par tdowers@bosvg.com
1

If you receive a suspicious email claiming to be from your bank, what is the safest first step to take?

2

What sophisticated technique do attackers use in “whaling” attacks that specifically target high-level executives?

3

What is the purpose of a "phishing kit"?

4

Which type of phishing attack employs voice calls to deceive victims into providing sensitive information?

5

What is a key characteristic that differentiates “clone phishing” from standard phishing attacks?

6

Which of the following is a common feature of a phishing email?

7

What advanced method might attackers use to bypass email filters and reach their targets?

8

In phishing attacks, what role does “domain spoofing” play?

9

What should you check before clicking on a link in an email?

10

Which of the following is a common psychological tactic used in phishing emails to prompt immediate action?

11

What is the purpose of “URL shortening” in phishing attacks?

12

What does “smishing” refer to in the context of phishing attacks?

13

How can behavioral analysis be leveraged to detect phishing attempts?

14

Which of the following techniques is often used in “baiting” phishing attacks?

15

Which of the following might indicate a legitimate email, despite being cautious of phishing attempts?