Spot the red flags that separate real messages from scams across email, SMS, and phone calls. This mixed-difficulty quiz helps you practice quick, practical decisions using realistic scenarios. Build ...
Pick a difficulty and question count to begin.
Phishing isn’t just “bad links”—it’s pressure, impersonation, and tiny inconsistencies across email, texts, and calls. You’ll practice spotting social engineering tactics, suspicious requests, and risky click paths in everyday situations.
Each question uses 4 options and there’s no timer, so you can slow down and reason through clues like sender details, wording, urgency, and verification steps.
Difficulty is mixed on purpose: some items are obvious “too good to be true,” while others mimic convincing business messages and support calls. Choose your question count and difficulty before starting to tailor a quick refresher or a longer skills session.
Many people focus only on the link, but attackers often win with context and emotion. Watch for subtle mismatches, unusual payment or login requests, and “helpful” callers who try to keep you from verifying independently.
Treat every scenario like a mini playbook: pause, verify through a known channel, and report when appropriate. Over time you’ll recognize patterns—pretexting, credential harvesting, and “invoice” traps—across all three channels.
What is a common sign of a phishing email?
Which of the following is a typical phishing attempt via SMS?
What should you do if you receive a suspicious phone call asking for personal information?
This quiz has 107 questions covering phishing via email, SMS, and phone calls.
No. The quiz has no timer, so you can take your time to evaluate each scenario.
Every question is multiple-choice with 4 options, focused on practical phishing detection decisions.
Use the start panel to set how many questions you want and select a difficulty level that matches your goal.
You’ll see impersonation, urgency tactics, credential and OTP theft, invoice scams, and caller verification techniques.

Test your knowledge of vulnerability management—from CVE basics and CVSS scoring to patching workflows and risk-based prioritization. Questions mix practical scenarios with key concepts so you can spot what matters most in real environments. Choose your preferred question count and difficulty, then learn from each explanation as you go.

Test your incident-handling instincts for ransomware events, from the first alert to final reporting. You’ll work through containment choices, recovery trade-offs, and communication steps that reduce impact. Expect a mix of quick wins and scenario-based decisions grounded in real-world response playbooks.
Identify common cyber threats and the best defensive practices used to reduce risk. Covers phishing, malware, passwords, MFA, encryption basics, and safe browsing habits.
Check your understanding of how cloud services are delivered and used. Covers IaaS, PaaS, SaaS, containers vs VMs, regions/availability zones, and shared responsibility basics.
Test your knowledge of common programming syntax across popular languages. Questions focus on variables, loops, functions, and basic data structures without requiring deep computer science theory.
Match key PC components to what they do and how they affect performance. Covers CPU, GPU, RAM, storage types, motherboards, power supplies, and ports.