WiCYs game night
VIDEOgame
VIDEOgame
PRESS START
HI-SCORE
MENU
Introduction
characters
missions
© 20XX GENIALLY ESCAPE GAMES
232323
HI-SCORE
INTRODUCTION
Welcome to WiCyS Game Night! Get ready to put your cyber skills to the test with our Scavenger Hunt. You’ll be answering a series of cybersecurity questions that range from easy to challenging. Whether you’re a newbie or a pro, this is your chance to learn, compete, and have fun. Let the hunt begin!
© 20XX GENIALLY ESCAPE GAMES
CHARACTERS
hashbert
speedy
mr.meow
rufus
Choose Your Character!
MISSIONS
Complete the missions to obtain the password numbers
4 FROG
3 BARS
2 PUZZLE
1
SHIPS
PASSWORD
LEVEL 1/5
What does VPN stand for?
Virtual Private Network
very personal network
verified public network
LEVEL 2/5
What is phishing?
a type of fish in the ocean
An attack that tries to steal your money or identity by tricking you into giving personal info—like credit card numbers or passwords—on fake websites.
A type of software update
LEVEL 3/5
What does malware mean?
Malicious software designed to harm or exploit devices
A type pf hardware
good software
LEVEL 4/5
What is a firewall used for?
To start a fire
a way to cool down your computer
to protect your device from unauthroized access
LEVEL 5/5
What is a man-in-the-middle (MITM) attack?
A type of malware that deletes system files
An attack where a hacker intercepts communication between two parties
A denial-of-service attack that floods a server with traffic
CONGRATULATIONS!
THE NUMBER OF THIS MISSION IS 5
GAME OVER
CONTINUE?
yes
NO
MISSIONS
Complete the missions to obtain thepassword numbers
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
PASSWORD
LEVEL 1/5
NEXT
What is the main purpose of a digital certificate?
To store encrypted passwords
To verify the identity of a website or user
To block access to unsecured websites
LEVEL 2/5
NEXT
Which type of malware locks a user’s files and demands payment to restore access?
Spyware
Ransomware
Worm
LEVEL 3/5
NEXT
What is a zero-day vulnerability?
A software flaw that is exploited before the developer knows or fixes it
A virus that lasts only 24 hours
A password that expires after one use
LEVEL 4/5
NEXT
What does HTTPS provide that HTTP does not?
Automatic data backup
Faster website loading speed
Encrypted communication between client and server
LEVEL 5/5
NEXT
Which of the following best describes social engineering?
Engineering secure software systems
Using social media to promote cybersecurity awareness
Tricking people into revealing confidential information
CONGRATULATIONS!
THE NUMBER OF THIS MISSION IS 3
GAME OVER
CONTINUE?
yes
NO
MISSIONs
Complete the missions to obtain the password numbers
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
PASSWORD
LEVEL 1/5
What is the main purpose of penetration testing?
To simulate cyberattacks and find exploitable weaknesses
To recover deleted system files
To configure network firewalls automatically
LEVEL 2/5
Which of the following is an example of two-factor authentication (2FA)?
Logging in with two different passwords
Logging in with a password and a code sent to your phone
Logging in from two devices at once
LEVEL 3/5
What is the difference between a virus and a worm?
A virus needs a host program to spread, while a worm can self-replicate
A worm can only infect mobile devices
A virus only spreads through the internet
LEVEL 4/5
Which type of attack floods a system with traffic to make it unavailable to users?
Spoofing attack
Keylogging attack
Write the correct answer hereDistributed Denial of Service (DDoS) attack
LEVEL 5/5
What is the main purpose of intrusion detection systems (IDS)?
To store user credentials securely
To automatically block all incoming traffic
To monitor network traffic for suspicious or malicious activity
CONGRATULATIONS!
THE NUMBER OF THIS MISSION IS 9
GAME OVER
CONTINUE?
yes
NO
missions
Complete the missions to obtain thenumbers of the password
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
PASSWORD
LEVEL 1/3
What is the purpose of a Security Information and Event Management (SIEM) system?
To block all suspicious IP addresses automatically
To manage encryption keys for secure communication
To collect, analyze, and correlate security logs in real time
LEVEL 2/3
Which type of malware disguises itself as legitimate software?
Worm
Trojan horse
Rootkit
LEVEL 3/3
What does SSL stand for in cybersecurity?
System Security Lock
Safe Session Login
Secure Socket Layer
CONGRATULATIONS!
THE NUMBER OF THIS MISSION IS 6
GAME OVER
CONTINUE?
yes
NO
missions
Complete the missions to obtain thepassword numbers
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
PASSWORD
Password?
Enter the password
Are you sure you want to exit?
You will lose all the progress
NO
yes
rufus
A normal-looking dog with a secret: he can hack into any system he wants. Loyal, clever, and surprisingly sneaky.
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
MIsSIONSHIPS
Put your cyber skills to the test—take down the enemies!
CONTINUE
Are you sure you want to exit?
You will lose all the progress
NO
yes
MISSIONpuzzle
Are you ready to put your skills to the test?
CONTINUE
Missionbars
Ready to challenge you cyber skills?
CONTINUE
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
speedy
Slow hands, fast mind. Speedy the cyber sloth moves at its own perfect pace.
mr.meow
A digital predator,Mr.Meow is built for stealth and hacking
hashbert
Hashbert.
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
MISSIONfrog
Last one! ALmost there you cyber pro!
CONTINUE
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
WiCyS Game Night
Angela Abbate
Created on October 21, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Farm escape room
View
Christmas Escape Room
View
Horror Escape Room
View
Desert Island Escape
View
Halloween escape
View
Adventure Breakout
View
Team Building Mission Escape Game
Explore all templates
Transcript
WiCYs game night
VIDEOgame
VIDEOgame
PRESS START
HI-SCORE
MENU
Introduction
characters
missions
© 20XX GENIALLY ESCAPE GAMES
232323
HI-SCORE
INTRODUCTION
Welcome to WiCyS Game Night! Get ready to put your cyber skills to the test with our Scavenger Hunt. You’ll be answering a series of cybersecurity questions that range from easy to challenging. Whether you’re a newbie or a pro, this is your chance to learn, compete, and have fun. Let the hunt begin!
© 20XX GENIALLY ESCAPE GAMES
CHARACTERS
hashbert
speedy
mr.meow
rufus
Choose Your Character!
MISSIONS
Complete the missions to obtain the password numbers
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
PASSWORD
LEVEL 1/5
What does VPN stand for?
Virtual Private Network
very personal network
verified public network
LEVEL 2/5
What is phishing?
a type of fish in the ocean
An attack that tries to steal your money or identity by tricking you into giving personal info—like credit card numbers or passwords—on fake websites.
A type of software update
LEVEL 3/5
What does malware mean?
Malicious software designed to harm or exploit devices
A type pf hardware
good software
LEVEL 4/5
What is a firewall used for?
To start a fire
a way to cool down your computer
to protect your device from unauthroized access
LEVEL 5/5
What is a man-in-the-middle (MITM) attack?
A type of malware that deletes system files
An attack where a hacker intercepts communication between two parties
A denial-of-service attack that floods a server with traffic
CONGRATULATIONS!
THE NUMBER OF THIS MISSION IS 5
GAME OVER
CONTINUE?
yes
NO
MISSIONS
Complete the missions to obtain thepassword numbers
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
PASSWORD
LEVEL 1/5
NEXT
What is the main purpose of a digital certificate?
To store encrypted passwords
To verify the identity of a website or user
To block access to unsecured websites
LEVEL 2/5
NEXT
Which type of malware locks a user’s files and demands payment to restore access?
Spyware
Ransomware
Worm
LEVEL 3/5
NEXT
What is a zero-day vulnerability?
A software flaw that is exploited before the developer knows or fixes it
A virus that lasts only 24 hours
A password that expires after one use
LEVEL 4/5
NEXT
What does HTTPS provide that HTTP does not?
Automatic data backup
Faster website loading speed
Encrypted communication between client and server
LEVEL 5/5
NEXT
Which of the following best describes social engineering?
Engineering secure software systems
Using social media to promote cybersecurity awareness
Tricking people into revealing confidential information
CONGRATULATIONS!
THE NUMBER OF THIS MISSION IS 3
GAME OVER
CONTINUE?
yes
NO
MISSIONs
Complete the missions to obtain the password numbers
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
PASSWORD
LEVEL 1/5
What is the main purpose of penetration testing?
To simulate cyberattacks and find exploitable weaknesses
To recover deleted system files
To configure network firewalls automatically
LEVEL 2/5
Which of the following is an example of two-factor authentication (2FA)?
Logging in with two different passwords
Logging in with a password and a code sent to your phone
Logging in from two devices at once
LEVEL 3/5
What is the difference between a virus and a worm?
A virus needs a host program to spread, while a worm can self-replicate
A worm can only infect mobile devices
A virus only spreads through the internet
LEVEL 4/5
Which type of attack floods a system with traffic to make it unavailable to users?
Spoofing attack
Keylogging attack
Write the correct answer hereDistributed Denial of Service (DDoS) attack
LEVEL 5/5
What is the main purpose of intrusion detection systems (IDS)?
To store user credentials securely
To automatically block all incoming traffic
To monitor network traffic for suspicious or malicious activity
CONGRATULATIONS!
THE NUMBER OF THIS MISSION IS 9
GAME OVER
CONTINUE?
yes
NO
missions
Complete the missions to obtain thenumbers of the password
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
PASSWORD
LEVEL 1/3
What is the purpose of a Security Information and Event Management (SIEM) system?
To block all suspicious IP addresses automatically
To manage encryption keys for secure communication
To collect, analyze, and correlate security logs in real time
LEVEL 2/3
Which type of malware disguises itself as legitimate software?
Worm
Trojan horse
Rootkit
LEVEL 3/3
What does SSL stand for in cybersecurity?
System Security Lock
Safe Session Login
Secure Socket Layer
CONGRATULATIONS!
THE NUMBER OF THIS MISSION IS 6
GAME OVER
CONTINUE?
yes
NO
missions
Complete the missions to obtain thepassword numbers
4 FROG
3 BARS
2 PUZZLE
1 SHIPS
PASSWORD
Password?
Enter the password
Are you sure you want to exit?
You will lose all the progress
NO
yes
rufus
A normal-looking dog with a secret: he can hack into any system he wants. Loyal, clever, and surprisingly sneaky.
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
MIsSIONSHIPS
Put your cyber skills to the test—take down the enemies!
CONTINUE
Are you sure you want to exit?
You will lose all the progress
NO
yes
MISSIONpuzzle
Are you ready to put your skills to the test?
CONTINUE
Missionbars
Ready to challenge you cyber skills?
CONTINUE
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
speedy
Slow hands, fast mind. Speedy the cyber sloth moves at its own perfect pace.
mr.meow
A digital predator,Mr.Meow is built for stealth and hacking
hashbert
Hashbert.
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
MISSIONfrog
Last one! ALmost there you cyber pro!
CONTINUE
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes
Are you sure you want to exit?
You will lose all the progress
NO
yes