Baviro
HomeCategoriesLeaderboard
Baviro

© 2026 Baviro. All rights reserved.

AboutPrivacy Policy
  1. Home
  2. →True Crime
  3. →Cybercrime
  4. →Phishing methods: email, SMS, and voice

Phishing methods: email, SMS, and voice

Spot the tactics behind phishing across email, SMS (smishing), and voice calls (vishing). This mixed-difficulty quiz helps you recognize red flags, verify senders, and choose safer next steps. Build p...

110 Questions
4,104 plays

Start Quiz

Pick a difficulty and question count to begin.

Select difficulty
Select number of questions
Auto-switch after

About this quiz

What this quiz covers

Phishing isn’t just suspicious emails—smishing texts and vishing calls use urgency, authority, and fake verification steps to push risky actions. These questions focus on how attackers craft messages, what clues reveal them, and what a safe response looks like.

Each question has 4 options and there’s no timer, so you can slow down and reason through details like sender identity, links, attachments, and social engineering cues.

Skills you’ll practice

You’ll practice distinguishing legitimate notifications from spoofed ones, identifying pretexting and urgency traps, and choosing the best next action (verify via trusted channels, report, or ignore). The quiz also reinforces how attackers pivot between channels—email to SMS, SMS to phone calls—to increase credibility.

Common pitfalls to avoid

Many people over-trust familiar brands, panic at “account locked” warnings, or assume a local phone number means legitimacy. Another frequent mistake is focusing only on spelling errors while missing stronger signals like mismatched domains, unusual payment methods, or requests for one-time codes.

Difficulty and question settings

Difficulty is mixed: easier items cover obvious red flags, while harder ones test subtle impersonation, multi-step scams, and realistic message wording. You can choose your preferred question count and difficulty before starting to tailor the session for quick practice or deeper review.

Quick tips for better scores

  • Check the sender domain/number and compare it to official contact info
  • Treat urgent requests for passwords, OTPs, or remote access as high-risk
  • Hover or inspect links (where possible) and watch for lookalike domains
  • Verify through a separate trusted channel, not by replying to the message
  • Be cautious with attachments, QR codes, and “secure document” prompts
  • When unsure, report and delete rather than “testing” the link

Sample questions

What is a common indicator of a phishing email?

  • A.Generic greetings like 'Dear Customer'
  • B.Personalized message with your name
  • C.Clear contact information
  • D.Professional design and layout

Which of the following is NOT a type of phishing?

  • A.Social media phishing
  • B.Voice phishing
  • C.Email phishing
  • D.SMS phishing

What is 'spear phishing'?

  • A.Targeted phishing aimed at a specific individual or organization
  • B.Phishing aimed at a group of people
  • C.Phishing via social media
  • D.Random attacks on multiple users

Quiz FAQ

How many questions are in this quiz?

This quiz has 110 questions covering email phishing, smishing, and vishing tactics.

Is the quiz timed?

No. There’s no timer, so you can take your time on each question.

What answer format does the quiz use?

Each question is multiple choice with 4 options.

Can I choose the number of questions and difficulty?

Yes. Pick your preferred question count and difficulty before you start to match your practice goals.

What topics are included besides email scams?

It includes SMS smishing and voice-call vishing, including urgency tricks, spoofing cues, and safe verification steps.

Play this quiz in another language(2)

sk
Metódy phishingu: email, SMS a hlasSlovenčina
cs
Metody phishingu: e-mail, SMS a hlasČeština

Related Quizzes

Anatomy of a ransomware attack

Anatomy of a ransomware attack

Trace how ransomware campaigns unfold—from initial access and privilege escalation to encryption, extortion, and recovery. This mixed-difficulty quiz helps you spot attacker tactics, common weak points, and the controls that break the chain. Choose how many questions to answer and the difficulty level to match your goal.

995
Play Now →
Botnets and DDoS: how they work

Botnets and DDoS: how they work

Unpack how botnets are built, controlled, and used to launch DDoS attacks. This mixed-difficulty quiz walks you through infection chains, C2 infrastructure, amplification tactics, and real-world defenses. Pick your preferred question count and difficulty, then test your understanding with clear, scenario-based prompts.

1,374
Play Now →
Cabinet and vice presidents: who served whom

Cabinet and vice presidents: who served whom

Match the names behind the titles in this U.S. Presidents quiz focused on cabinet officers and vice presidents. You’ll identify which administration each figure served in, from well-known pairings to trickier historical overlaps. Great for sharpening your timeline sense and avoiding common name-and-era mix-ups.

2,856
Play Now →
Which fantasy quest role are you

Which fantasy quest role are you

Step into a classic fantasy party and discover the quest role that fits you best. Your choices reveal whether you lead the charge, solve the mysteries, keep the team alive, or shape the story from the shadows. Pick your preferred question count and difficulty, then answer at your own pace.

2,925
Play Now →
Tree traversals and heap properties

Tree traversals and heap properties

Strengthen your understanding of tree traversals and heap properties with a focused set of Data Structures questions. You’ll work through traversal orders, heap invariants, and typical edge cases found in interviews and coursework. Pick your preferred question count and difficulty, then learn from each explanation as you go.

4,326
Play Now →
Home fronts: rationing, labor, and propaganda

Home fronts: rationing, labor, and propaganda

Step onto the World War I home front and see how nations kept armies supplied and morale intact. This quiz explores rationing systems, wartime labor shifts, and propaganda campaigns across different countries. Expect a mix of straightforward facts and source-style interpretation questions.

2,796
Play Now →