Want to create interactive content? It’s easy in Genially!

Get started free

Cybersecurity

Maria Aranda

Created on September 27, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

start

Knowledge check

Cybersecurity

Protecting our information online is more crucial than ever in today's digital age. This quiz will test your knowledge on various aspects of cybersecurity, from identifying phishing scams to understanding malware and social engineering tactics. This quiz is designed to test your knowledge on how to prevent and mitigate cyber attacks. Get ready to dive into the world of cyber threats and defenses. Remember, every question is an opportunity to learn something new and enhance your cyber-safety skills. Good luck, and may the best cyber defender win!

Welcome to the Cybersecurity Challenge

Complete each test to beat the game: there is no other way to escape!

Tests

Final Test

Test 5

Test 4

Test 3

Test 2

Test 1

Test 1

TRUE

FALSE

Icebreaker question: A cyber security threat is any malicious attempt or act that can harm your computer or network, steal information, or disrupt operations.

1/3

Test 1

Let's check the link to see if this is a legitimate website. We can ask the office if the link does not work.

Ask the school office first before you click the link, to verify if they sent thes link for donations.

Yes. We do have an upcoming Fun Run. It is okay to click the link to donate.

2/3

You're doing great. Next question:Your parent received an email from the school with the SUBJECT: link for Fun Run donations What advice will you give your parent?

Test 1

TROJANS

BUGS

WORMS

VIRUS

3/3

You're almost there.All of these are examples of malware EXCEPT?

Complete each test to beat the game: there is no other way to escape!

Tests

Final test

Test 5

Test 4

Test 3

Test 2

Test 1

Test 2

A payment request from Venmo for your recent Amazon purchase. You do not remember buying anything.

You installed a software from a website. The software gained access to your files.

An email from paypal was received letting you know that your password needs to be changed because it is compromised.

Watch this video and answer the question below:Which one of these examples is NOT a form of phishing?

1/3

Test 2

2/3

Now play this video and answer:

Test 2

To disrupt the normal traffic of a targeted server, service, or network

To steal sensitive data

To gain unauthorized access to a computer system.

3/3

Last video of the test:What is the primary goal of a DDoS attack?

Complete each test to beat the game: there is no other way to escape!

Tests

Final Test

Test 5

Test 4

Test 3

Test 2

Test 1

Test 3

False

True

1/3

Take a good look at this image:Is this a phishing email?

IG Pictures
Test 3

Yes. USB only contains pictures.

No. USB might contain a computer virus.

2/3

You found a USB drive at Starbucks and are tempted to check the picture files to identify the owner on Instagram. Is it okay to do this?

False

True

Test 3

3/3

You are about to get it:Is this an example of a phishing email?

Complete each test to beat the game: there is no other way to escape!

Tests

Final Test

Test 5

Test 4

Test 3

Test 2

Test 1

Test 4

6. Fake Wifi network

SOLUTION

5. Fraudulent social media account

4. Spyware

Solución

3. Email hacking

2. Adware

1. Worm

Phishing

Malware

Drag concepts to the corresponding group

continuE

2/3

Complete each test to beat the game: there is no other way to escape!

Tests

Final Test

Test 5

Test 4

Test 3

Test 2

Test 1

I won't remember the password.

Great idea!

Test 5

A strong password should include a combination of uppercase and lowercase letters, numbers, and special characters.

1/2

Test 5

2/3

Complete each test to beat the game: there is no other way to escape!

Tests

Final Test

Test 5

Test 4

Test 3

Test 2

Test 1

DDoS

WORMS

TROJANS

ANGLER PHISHING

Test 6

EMAIL PHISHING

In Google docs or a sheet of paper, describe the following cyber attacks and write one prevention or mitigation strategy.

Start over?

Congratulations, you have successfully completed your assessment!!

Completed

Oh oh!

But don't lose your balance, continue on your way and try again!

That answer is not correct...

back

3. email hacking 5. fraudulent social media account 6. Fake Wifi network

Phishing

1. Worm 2. Adware 4. Spyware

Malware