Icon Crear Crear

Phishing Awareness Quiz

Test

Test your knowledge on phishing and learn how to stay safe online!

Descarga la versión para jugar en papel

11 veces realizada

Creada por

San Vicente y las Granadinas

Top 10 resultados

  1. 1
    Ezra Browne
    Ezra Browne
    02:09
    tiempo
    100
    puntuacion
  2. 2
    Za
    Za
    02:38
    tiempo
    87
    puntuacion
  3. 3
    Stephon C
    Stephon C
    03:39
    tiempo
    87
    puntuacion
  4. 4
    Jozel
    Jozel
    03:36
    tiempo
    73
    puntuacion
  5. 5
    Nelsia Samuel
    Nelsia Samuel
    02:31
    tiempo
    60
    puntuacion
  6. 6
    Kevis Pompey
    Kevis Pompey
    03:42
    tiempo
    53
    puntuacion
  7. 7
    Shonell Delplesche
    Shonell Delplesche
    03:07
    tiempo
    47
    puntuacion
  8. 8
    M
    M
    01:55
    tiempo
    33
    puntuacion
  9. 9
    Nalia Browne
    Nalia Browne
    03:07
    tiempo
    33
    puntuacion
  10. 10
    02:13
    tiempo
    20
    puntuacion
¿Quieres aparecer en el Top 10 de este juego? para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Phishing Awareness QuizVersión en línea

Test your knowledge on phishing and learn how to stay safe online!

por tdowers@bosvg.com
1

If you receive a suspicious email claiming to be from your bank, what is the safest first step to take?

2

What sophisticated technique do attackers use in “whaling” attacks that specifically target high-level executives?

3

What is the purpose of a "phishing kit"?

4

Which type of phishing attack employs voice calls to deceive victims into providing sensitive information?

5

What is a key characteristic that differentiates “clone phishing” from standard phishing attacks?

6

Which of the following is a common feature of a phishing email?

7

What advanced method might attackers use to bypass email filters and reach their targets?

8

In phishing attacks, what role does “domain spoofing” play?

9

What should you check before clicking on a link in an email?

10

Which of the following is a common psychological tactic used in phishing emails to prompt immediate action?

11

What is the purpose of “URL shortening” in phishing attacks?

12

What does “smishing” refer to in the context of phishing attacks?

13

How can behavioral analysis be leveraged to detect phishing attempts?

14

Which of the following techniques is often used in “baiting” phishing attacks?

15

Which of the following might indicate a legitimate email, despite being cautious of phishing attempts?