Want to create interactive content? It’s easy in Genially!
cim l2
niki perkins
Created on March 10, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
start
FACTORY ESCAPE GAME
Write a subtitle here
You are a group of digital marketing experts who have been hired by a well-known marketing agency to investigate an alarming series of mysterious events surrounding a client’s brand. This client has recently faced massive data breaches and suspicious activities that threaten not only their reputation but the integrity of their entire digital presence.After digging deeper, you uncover that someone has been using the dark web to target the brand through illegal tactics, including stealing personal data, engaging in black-hat SEO, and manipulating social media campaigns. The situation is dire, and the clock is ticking. The agency's reputation is on the line, and if the dark web threat isn't eliminated, the brand could face irreparable damage.You must find the hidden codes, unlock the cyber clues, and expose the criminal responsible for sabotaging the marketing efforts before it's too late.
THE MISSION
THE base
Find the clue you need to keep moving forward
QUESTION 1/3
A type of cyberattack where attackers send unsolicited phone calls to individuals, asking them to confirm their email address and password for a "security check."
An e-mail pretending to be from a legitimate company that attempts to deceive individuals into revealing sensitive information, such as usernames, passwords, credit card numbers
Which explanation below describes Phishing accurately?
QUESTION 2/3
$3.41m
$4.45m
In 2023 the average cost of identity theft breaches accounted for how much money?
QUESTION 3/3
Deepfake technology
Spyware Technology
Which cybercrime below uses AI with fraudulent content?
THE base
Find the clue you need to keep moving forward
QUESTION 1/3
Which software is used for this type of crime ?
EncryptionAI
DEEPAI
PASSGAN
QUESTION 2/3
What cybercrime is a type of malware that encrypts the businesses data until a fee is paid.?
Spyware
Ransomware
Malware
QUESTION 3/3
Which term on the right describes any software intentionally designed to cause damage to a computer, server, or computer network. Normally transmitted via email attachments, fake websites, software downloads, and infected USB drives
Card No Present
Phishing
malware
the base
Find the clue you need to keep moving forward
QUESTION 1/3
ASA stands for what
Advertising Security Authority
Advertising Standards Authority
Advertising Standards Agency
QUESTION 2/3
Google Chrome Adblocker blocks which type of annoying content?
Pop Up Ads
Static ad banner
Text Ads
QUESTION 3/3
Which law on the right affects email marketing?
Consumer Protection from Unfair Trading Regulations (2008
GDPR
The Competition Act 1998
the base
Find the clue you need to keep moving forward
QUESTION 1/3
The digital marketing term CTR stands for?
Click through rate
Cost to Revenue
Cost Through Rate
Clever Typing Robot
QUESTION 2/3
Which game uses location tracking?
Angry Birds
Clash of Clans
Candy Crush Saga
Harry Potter: Wizards Unite
QUESTION 3/3
Registering misspelled versions of popular domain names is known as?
~Spyware
Phishing
Typosquatting
Cybersquatting
the base
Find the clue you need to keep moving forward
QUESTION 1/3
Which compensation methods pay is known otherwise as Cost Per 1000
Fixed Cost
Cost Per View
Cost Per Click
Cost Per Mile
QUESTION 2/3
These are small pieces of data stored on a user's device that track their behaviour?
Batch software
Secure Socket Layers
Cookies
Browser Cache
QUESTION 3/3
Due to the Cookie Law 2011 what do digital marketers need to offer its customers?
Free Products
Clear and explicit consent for cookie use
A pop up that has pre ticked cookie boxes
The right for data to be deleted
START OVER?
You've saved the base
Mission Complete
exit
back
You will lose progress
Are you sure you want to go out?
try again