system security
knowledge check
knowledge check
PRESS START
232323
HI-SCORE
MENU
overview
skills
missions
© 20XX GENIALLY ESCAPE GAMES
232323
HI-SCORE
overview
How well do you know the information presented in Lesson 1?
Answer these questions to find out. If you do well, you may be ready to move on. If you are unable to answer the questions, you may want to go back to the lesson and engage with the content.
© 20XX GENIALLY ESCAPE GAMES
skills
assets
security
client
compliance
Complete the missons to demontrate your mastery of these skills.
MISSIONS
Complete the missions to demonstrate your skills.
4 FROG
3 BARS
2 PUZZLE
1
SHIPS
LEVEL 1/3
Which law requires a company to provide clients with a privacy notice before they enter into an agreement to do business?
Gramm-Leach-Bliley Act (GLBA)
Sarbanes-Oxley Act (SOX)
Federal Information Security Management Act (FISMA)
LEVEL 2/3
Which law does a company have to comply with to ensure that they are adequately protecting customers' personal data?
Gramm-Leach-Bliley Act (GLBA)
Health Insurance Portability and Accountability Act (HIPAA)
General Data Protection Regulation (GDPR)
LEVEL 3/3
Which analysis should you conduct to assess the difference between existing security controls and controls needed to address all system vulnerabilities?
Business impact analysis
Gap analysis
Threat analysis
CONGRATULATIONS!
PROCEED TO THE NEXT MISSION WHEN READY
GAME OVER
CONTINUE?
yes
NO
MISSIONS
Complete the missions to demonstrate your skills.
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
LEVEL 1/3
NEXT
A security auditor has discovered that customers' shipping information is stored as plain text in a relational database. How should this asset be classified for future audits?
Personally identifiable information (PII)
Classified data
Protected health information (PHI)
LEVEL 2/3
NEXT
A security operations center (SOC) team needs to establish a formal contract with a third-party vendor in an effort to safeguard the organization's cloud-based infrastructure. Which contract type should be used?
Operating agreement
Compliance report
Service level agreement
LEVEL 3/3
NEXT
A company completed its latest risk assessment exercise, and management has decided not to renew its advanced firewall licenses. Which type of risk treatment is the company using for this scenario?
Avoid
Assign
Accept
CONGRATULATIONS!
PROCEED TO THE NEXT MISSION WHEN READY
GAME OVER
CONTINUE?
yes
NO
MIsSIONS
Complete the missions to demonstrate your skills.
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
LEVEL 1/3
Which type of risk assessment should an organization conduct in order to determine the likelihood and impact of a potential disruption or disaster, and to produce a numerical risk rating to prioritize response efforts?
Quantitative assessment
Gap assessment
Qualitative assessment
LEVEL 2/3
What is the term used to describe the risk that remains within an industry or organization after deploying security controls?
Inherent
Transitional
Residual
LEVEL 3/3
A company has just experienced a data breach and has decided to purchase cyber liability insurance to move the financial risk associated with cyberattacks to the insurance company. Which type of risk response does this exemplify?
Avoid
Mitigate
Transfer
CONGRATULATIONS!
PROCEED TO THE NEXT MISSION WHEN READY
GAME OVER
CONTINUE?
yes
NO
MISsIONS
Complete the missions to demonstrate your skills.
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
LEVEL 1/3
How would a risk manager describe the planning objective used when restoring a critical service that also requires data restoration?
Security restoration objective
Recovery time objective
Recovery point objective
LEVEL 2/3
How would a risk manager describe the planning objective used to ensure that a critical service will be operational within a specified duration?
Security restoration objective
Recovery time objective
Network restoration objective
LEVEL 3/3
If an organization stores, transmits, or processes data that contains customer information, which type of assessment should it conduct?
Business assessment
Risk assessment
Privacy assessment
CONGRATULATIONS!
YOU WON!
GAME OVER
CONTINUE?
yes
NO
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
MISsIONSHIPS
Answer the questions correctly to destroy the ships!
CONTINUE
security
Develop information security policies, standards, procedures, and guidelines.
client
Determine which security measures are required based on client requirements.
MISsIONpuzzle
Answer the questions correctly to complete the puzzle!
CONTINUE
MISsIONbars
Answer the questions correctly to destroy the bars!
CONTINUE
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
MISsIONfrog
Answer the questions correctly to move the frog!
CONTINUE
assets
Classify the information assets to be protected.
compliance
Identify regional, national, and industrial compliance requirements.
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
System Security Knowledge Check
Kyle Whitaker
Created on April 26, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Math Mission
View
Secret Code
View
Museum Escape Room
View
Simple corporate escape room
View
Chaotic Kitchen Escape Room
View
Vibrant Breakout
View
Reboot Protocol
Explore all templates
Transcript
system security
knowledge check
knowledge check
PRESS START
232323
HI-SCORE
MENU
overview
skills
missions
© 20XX GENIALLY ESCAPE GAMES
232323
HI-SCORE
overview
How well do you know the information presented in Lesson 1? Answer these questions to find out. If you do well, you may be ready to move on. If you are unable to answer the questions, you may want to go back to the lesson and engage with the content.
© 20XX GENIALLY ESCAPE GAMES
skills
assets
security
client
compliance
Complete the missons to demontrate your mastery of these skills.
MISSIONS
Complete the missions to demonstrate your skills.
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
LEVEL 1/3
Which law requires a company to provide clients with a privacy notice before they enter into an agreement to do business?
Gramm-Leach-Bliley Act (GLBA)
Sarbanes-Oxley Act (SOX)
Federal Information Security Management Act (FISMA)
LEVEL 2/3
Which law does a company have to comply with to ensure that they are adequately protecting customers' personal data?
Gramm-Leach-Bliley Act (GLBA)
Health Insurance Portability and Accountability Act (HIPAA)
General Data Protection Regulation (GDPR)
LEVEL 3/3
Which analysis should you conduct to assess the difference between existing security controls and controls needed to address all system vulnerabilities?
Business impact analysis
Gap analysis
Threat analysis
CONGRATULATIONS!
PROCEED TO THE NEXT MISSION WHEN READY
GAME OVER
CONTINUE?
yes
NO
MISSIONS
Complete the missions to demonstrate your skills.
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
LEVEL 1/3
NEXT
A security auditor has discovered that customers' shipping information is stored as plain text in a relational database. How should this asset be classified for future audits?
Personally identifiable information (PII)
Classified data
Protected health information (PHI)
LEVEL 2/3
NEXT
A security operations center (SOC) team needs to establish a formal contract with a third-party vendor in an effort to safeguard the organization's cloud-based infrastructure. Which contract type should be used?
Operating agreement
Compliance report
Service level agreement
LEVEL 3/3
NEXT
A company completed its latest risk assessment exercise, and management has decided not to renew its advanced firewall licenses. Which type of risk treatment is the company using for this scenario?
Avoid
Assign
Accept
CONGRATULATIONS!
PROCEED TO THE NEXT MISSION WHEN READY
GAME OVER
CONTINUE?
yes
NO
MIsSIONS
Complete the missions to demonstrate your skills.
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
LEVEL 1/3
Which type of risk assessment should an organization conduct in order to determine the likelihood and impact of a potential disruption or disaster, and to produce a numerical risk rating to prioritize response efforts?
Quantitative assessment
Gap assessment
Qualitative assessment
LEVEL 2/3
What is the term used to describe the risk that remains within an industry or organization after deploying security controls?
Inherent
Transitional
Residual
LEVEL 3/3
A company has just experienced a data breach and has decided to purchase cyber liability insurance to move the financial risk associated with cyberattacks to the insurance company. Which type of risk response does this exemplify?
Avoid
Mitigate
Transfer
CONGRATULATIONS!
PROCEED TO THE NEXT MISSION WHEN READY
GAME OVER
CONTINUE?
yes
NO
MISsIONS
Complete the missions to demonstrate your skills.
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
LEVEL 1/3
How would a risk manager describe the planning objective used when restoring a critical service that also requires data restoration?
Security restoration objective
Recovery time objective
Recovery point objective
LEVEL 2/3
How would a risk manager describe the planning objective used to ensure that a critical service will be operational within a specified duration?
Security restoration objective
Recovery time objective
Network restoration objective
LEVEL 3/3
If an organization stores, transmits, or processes data that contains customer information, which type of assessment should it conduct?
Business assessment
Risk assessment
Privacy assessment
CONGRATULATIONS!
YOU WON!
GAME OVER
CONTINUE?
yes
NO
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
MISsIONSHIPS
Answer the questions correctly to destroy the ships!
CONTINUE
security
Develop information security policies, standards, procedures, and guidelines.
client
Determine which security measures are required based on client requirements.
MISsIONpuzzle
Answer the questions correctly to complete the puzzle!
CONTINUE
MISsIONbars
Answer the questions correctly to destroy the bars!
CONTINUE
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
MISsIONfrog
Answer the questions correctly to move the frog!
CONTINUE
assets
Classify the information assets to be protected.
compliance
Identify regional, national, and industrial compliance requirements.
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes