Want to create interactive content? It’s easy in Genially!
Cybersecurity
Maria Aranda
Created on September 27, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
start
Knowledge check
Cybersecurity
Protecting our information online is more crucial than ever in today's digital age. This quiz will test your knowledge on various aspects of cybersecurity, from identifying phishing scams to understanding malware and social engineering tactics. This quiz is designed to test your knowledge on how to prevent and mitigate cyber attacks. Get ready to dive into the world of cyber threats and defenses. Remember, every question is an opportunity to learn something new and enhance your cyber-safety skills. Good luck, and may the best cyber defender win!
Welcome to the Cybersecurity Challenge
Complete each test to beat the game: there is no other way to escape!
Tests
Final Test
Test 5
Test 4
Test 3
Test 2
Test 1
Test 1
TRUE
FALSE
Icebreaker question: A cyber security threat is any malicious attempt or act that can harm your computer or network, steal information, or disrupt operations.
1/3
Test 1
Let's check the link to see if this is a legitimate website. We can ask the office if the link does not work.
Ask the school office first before you click the link, to verify if they sent thes link for donations.
Yes. We do have an upcoming Fun Run. It is okay to click the link to donate.
2/3
You're doing great. Next question:Your parent received an email from the school with the SUBJECT: link for Fun Run donations What advice will you give your parent?
Test 1
TROJANS
BUGS
WORMS
VIRUS
3/3
You're almost there.All of these are examples of malware EXCEPT?
Complete each test to beat the game: there is no other way to escape!
Tests
Final test
Test 5
Test 4
Test 3
Test 2
Test 1
Test 2
A payment request from Venmo for your recent Amazon purchase. You do not remember buying anything.
You installed a software from a website. The software gained access to your files.
An email from paypal was received letting you know that your password needs to be changed because it is compromised.
Watch this video and answer the question below:Which one of these examples is NOT a form of phishing?
1/3
Test 2
2/3
Now play this video and answer:
Test 2
To disrupt the normal traffic of a targeted server, service, or network
To steal sensitive data
To gain unauthorized access to a computer system.
3/3
Last video of the test:What is the primary goal of a DDoS attack?
Complete each test to beat the game: there is no other way to escape!
Tests
Final Test
Test 5
Test 4
Test 3
Test 2
Test 1
Test 3
False
True
1/3
Take a good look at this image:Is this a phishing email?
IG Pictures
Test 3
Yes. USB only contains pictures.
No. USB might contain a computer virus.
2/3
You found a USB drive at Starbucks and are tempted to check the picture files to identify the owner on Instagram. Is it okay to do this?
False
True
Test 3
3/3
You are about to get it:Is this an example of a phishing email?
Complete each test to beat the game: there is no other way to escape!
Tests
Final Test
Test 5
Test 4
Test 3
Test 2
Test 1
Test 4
6. Fake Wifi network
SOLUTION
5. Fraudulent social media account
4. Spyware
Solución
3. Email hacking
2. Adware
1. Worm
Phishing
Malware
Drag concepts to the corresponding group
continuE
2/3
Complete each test to beat the game: there is no other way to escape!
Tests
Final Test
Test 5
Test 4
Test 3
Test 2
Test 1
I won't remember the password.
Great idea!
Test 5
A strong password should include a combination of uppercase and lowercase letters, numbers, and special characters.
1/2
Test 5
2/3
Complete each test to beat the game: there is no other way to escape!
Tests
Final Test
Test 5
Test 4
Test 3
Test 2
Test 1
DDoS
WORMS
TROJANS
ANGLER PHISHING
Test 6
EMAIL PHISHING
In Google docs or a sheet of paper, describe the following cyber attacks and write one prevention or mitigation strategy.
Start over?
Congratulations, you have successfully completed your assessment!!
Completed
Oh oh!
But don't lose your balance, continue on your way and try again!
That answer is not correct...
back
3. email hacking 5. fraudulent social media account 6. Fake Wifi network
Phishing
1. Worm 2. Adware 4. Spyware
Malware