Explore the world of cybercrime, from phishing and ransomware to data breaches and digital forensics. These quizzes help you recognize common attack methods, understand how investigations work, and learn key terms used in real cases.

Spot the tactics behind phishing across email, SMS (smishing), and voice calls (vishing). This mixed-difficulty quiz helps you recognize red flags, verify senders, and choose safer next steps. Build practical instincts for real-world scams without needing technical tools.

Unpack how botnets are built, controlled, and used to launch DDoS attacks. This mixed-difficulty quiz walks you through infection chains, C2 infrastructure, amplification tactics, and real-world defenses. Pick your preferred question count and difficulty, then test your understanding with clear, scenario-based prompts.

Trace how ransomware campaigns unfold—from initial access and privilege escalation to encryption, extortion, and recovery. This mixed-difficulty quiz helps you spot attacker tactics, common weak points, and the controls that break the chain. Choose how many questions to answer and the difficulty level to match your goal.
There are 3 quizzes with 326 questions total.
No. Each quiz is untimed, so you can take your time on every question.
Each question is multiple-choice with 4 answer options.
Expect questions on phishing, malware, ransomware, data breaches, social engineering, and investigation basics.
Yes. The set includes a mix of shorter and longer quizzes, ranging from basic concepts to more detailed scenarios.
These Cybercrime quizzes focus on how online offenses happen, how attackers hide their tracks, and how investigators connect evidence to suspects.
You’ll practice identifying tactics like social engineering, malware delivery, credential theft, and common investigation and security concepts.
Each question has 4 answer options and there’s no timer, so you can read carefully and learn as you go.
Quiz length and difficulty vary across the set, so you can start with quick refreshers and move up to more detailed scenario-style questions.
Cybercrime often blends technical steps with human manipulation, which is why many incidents begin with a believable message rather than a complex exploit.
Digital evidence can be fragile and distributed across devices, cloud services, and jurisdictions, making documentation and legal process central to real investigations.