Want to create interactive content? It’s easy in Genially!

Reuse this genially

VIBRANT BREAKOUT

Azmiya Cassim

Created on November 23, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Adventure Breakout

Team Building Mission Escape Game

Onboarding Escape Game

Christmas Escape Room

Flags Challenge

Museum Escape Room

Education Escape Room

Transcript

IT Escape Room Challenge

Solve an IT-related problem by using modal verbs appropriately to progress through each stage.

GO!

Introduction

Stage 01

Stage 02

Index

Collect all the numbers by completing each of the challenges, and enter them in order in the final section to finish the game.

Reward

Stage 03

Stage 04

INTRODUCTION

IT Department: Ransomware Recovery Challenge

Your company’s servers are locked by ransomware just hours before a big product launch. Your team must solve a series of challenges to restore the system before time runs out!

Stage 1

Complete the following quiz, and getthe first number towards your reward!

start

Stage 1: Understanding the Threat

question 1/5

Next Stage

next

Stage 2:Stage 2: Identifying the Source of the Attack

question 2/5

NEXT

Stage 2

ERROR!

Wrong!We must restore from the backup immediately without checking the issue. (This might lead to reinfection.)We should not investigate emails because they’re irrelevant. (Phishing is often the source.) We can just unplug the server and restart it. (This doesn’t address the root cause.)

TRY AGAIN

Stage 3: Restoring Operations

You’ve identified the source of the ransomware and removed it. Now, you need to restore operations. What should you prioritize?1. Test backups before restoring. 2. Restore critical services first. 3. Communicate with stakeholders.

QUESTION 3/5

Rightanswer

Wronganswer

stage 3

RIGHT!

Explanation:We must test the backups for corruption before restoring."We should prioritize restoring critical services like the company website. We might need to communicate with stakeholders about a delayed launch. We could implement temporary measures to ensure minimal downtime.

NEXT

stage 3

RIGHT!

Explanation:We must test the backups for corruption before restoring."We should prioritize restoring critical services like the company website. We might need to communicate with stakeholders about a delayed launch. We could implement temporary measures to ensure minimal downtime.

NEXT

stage 3

RIGHT!

Explanation:We must test the backups for corruption before restoring."We should prioritize restoring critical services like the company website. We might need to communicate with stakeholders about a delayed launch. We could implement temporary measures to ensure minimal downtime.

NEXT

Stage 3

ERROR!

Wrong!We must restore everything at once without testing backups.(Risky and careless approach.)We will delay stakeholder communication because it’s unnecessary. (Bad communication practice.) We might ignore the critical services and focus on minor tasks. (Poor prioritization.)

TRY AGAIN

Stage 4: Preventing Future Attacks

Now that you’ve restored the system, how will you prevent future attacks? Should you:Train staff on phishing awareness. Invest in better cybersecurity tools. Create a backup strategy.

QUESTION 4/5

Rightanswer

Wronganswer

Satge 4

RIGHT!

Explanation: We should conduct regular staff training on identifying phishing emails. We must invest in robust cybersecurity software to monitor threats. We could create an automated backup system for daily updates. We might need to audit our current infrastructure for vulnerabilities.

NEXT

Stage 4

ERROR!

Wrong!We can ignore training because staff are already knowledgeable.(This assumes too much.)We will not invest in new tools because they’re expensive. (Short-sighted approach.) We must only focus on backups and ignore other measures. (Single-layer protection is not enough.)

TRY AGAIN

Final Stage: Summary and Escape

To escape, summarize the best solution to prevent future ransomware attacks using at least two modal verbs.

QUESTION 5/5

Rightanswer

Wronganswer

Final Stage

RIGHT!

Explanation:We must invest in cybersecurity software and should conduct staff training on phishing awareness to minimize future risks.

NEXT

QUIZ

ERROR!

Wrong!We might ignore backups and hope this doesn’t happen again.(Neglectful approach.)

TRY AGAIN

serieS

Choose the correct shape in the series

START

WHAT SHAPE GOES NEXT?

Choose the correct shape:

Option 01

Option 02

Option 03

Option 04

Option 05

Option 06

WHAT SHAPE GOES NEXT?

RIGHT!

Choose the correct shape:

Option 01

Option 02

Option 03

Option 04

Option 05

Option 06

You have reached the last step... Enter the password!

Enter password