Want to create interactive content? It’s easy in Genially!
VIBRANT BREAKOUT
Azmiya Cassim
Created on November 23, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Adventure Breakout
View
Team Building Mission Escape Game
View
Onboarding Escape Game
View
Christmas Escape Room
View
Flags Challenge
View
Museum Escape Room
View
Education Escape Room
Transcript
IT Escape Room Challenge
Solve an IT-related problem by using modal verbs appropriately to progress through each stage.
GO!
Introduction
Stage 01
Stage 02
Index
Collect all the numbers by completing each of the challenges, and enter them in order in the final section to finish the game.
Reward
Stage 03
Stage 04
INTRODUCTION
IT Department: Ransomware Recovery Challenge
Your company’s servers are locked by ransomware just hours before a big product launch. Your team must solve a series of challenges to restore the system before time runs out!
Stage 1
Complete the following quiz, and getthe first number towards your reward!
start
Stage 1: Understanding the Threat
question 1/5
Next Stage
next
Stage 2:Stage 2: Identifying the Source of the Attack
question 2/5
NEXT
Stage 2
ERROR!
Wrong!We must restore from the backup immediately without checking the issue. (This might lead to reinfection.)We should not investigate emails because they’re irrelevant. (Phishing is often the source.) We can just unplug the server and restart it. (This doesn’t address the root cause.)
TRY AGAIN
Stage 3: Restoring Operations
You’ve identified the source of the ransomware and removed it. Now, you need to restore operations. What should you prioritize?1. Test backups before restoring. 2. Restore critical services first. 3. Communicate with stakeholders.
QUESTION 3/5
Rightanswer
Wronganswer
stage 3
RIGHT!
Explanation:We must test the backups for corruption before restoring."We should prioritize restoring critical services like the company website. We might need to communicate with stakeholders about a delayed launch. We could implement temporary measures to ensure minimal downtime.
NEXT
stage 3
RIGHT!
Explanation:We must test the backups for corruption before restoring."We should prioritize restoring critical services like the company website. We might need to communicate with stakeholders about a delayed launch. We could implement temporary measures to ensure minimal downtime.
NEXT
stage 3
RIGHT!
Explanation:We must test the backups for corruption before restoring."We should prioritize restoring critical services like the company website. We might need to communicate with stakeholders about a delayed launch. We could implement temporary measures to ensure minimal downtime.
NEXT
Stage 3
ERROR!
Wrong!We must restore everything at once without testing backups.(Risky and careless approach.)We will delay stakeholder communication because it’s unnecessary. (Bad communication practice.) We might ignore the critical services and focus on minor tasks. (Poor prioritization.)
TRY AGAIN
Stage 4: Preventing Future Attacks
Now that you’ve restored the system, how will you prevent future attacks? Should you:Train staff on phishing awareness. Invest in better cybersecurity tools. Create a backup strategy.
QUESTION 4/5
Rightanswer
Wronganswer
Satge 4
RIGHT!
Explanation: We should conduct regular staff training on identifying phishing emails. We must invest in robust cybersecurity software to monitor threats. We could create an automated backup system for daily updates. We might need to audit our current infrastructure for vulnerabilities.
NEXT
Stage 4
ERROR!
Wrong!We can ignore training because staff are already knowledgeable.(This assumes too much.)We will not invest in new tools because they’re expensive. (Short-sighted approach.) We must only focus on backups and ignore other measures. (Single-layer protection is not enough.)
TRY AGAIN
Final Stage: Summary and Escape
To escape, summarize the best solution to prevent future ransomware attacks using at least two modal verbs.
QUESTION 5/5
Rightanswer
Wronganswer
Final Stage
RIGHT!
Explanation:We must invest in cybersecurity software and should conduct staff training on phishing awareness to minimize future risks.
NEXT
QUIZ
ERROR!
Wrong!We might ignore backups and hope this doesn’t happen again.(Neglectful approach.)
TRY AGAIN
serieS
Choose the correct shape in the series
START
WHAT SHAPE GOES NEXT?
Choose the correct shape:
Option 01
Option 02
Option 03
Option 04
Option 05
Option 06
WHAT SHAPE GOES NEXT?
RIGHT!
Choose the correct shape:
Option 01
Option 02
Option 03
Option 04
Option 05
Option 06
You have reached the last step... Enter the password!
Enter password