Want to create interactive content? It’s easy in Genially!

Get started free

WiCyS Game Night

Angela Abbate

Created on October 21, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Corporate Escape Room: Operation Christmas

Secret Code

Reboot Protocol

Christmas Escape Room

Horror Escape Room

Witchcraft Escape Room

Desert Island Escape

Transcript

WiCYs game night

VIDEOgame

VIDEOgame

PRESS START
HI-SCORE

MENU

Introduction

characters

missions

© 20XX GENIALLY ESCAPE GAMES

232323
HI-SCORE

INTRODUCTION

Welcome to WiCyS Game Night! Get ready to put your cyber skills to the test with our Scavenger Hunt. You’ll be answering a series of cybersecurity questions that range from easy to challenging. Whether you’re a newbie or a pro, this is your chance to learn, compete, and have fun. Let the hunt begin!

© 20XX GENIALLY ESCAPE GAMES

CHARACTERS

hashbert

speedy

mr.meow

rufus

Choose Your Character!

MISSIONS

Complete the missions to obtain the password numbers

4 FROG

3 BARS

2 PUZZLE

1 SHIPS

PASSWORD

LEVEL 1/5

What does VPN stand for?

Virtual Private Network

very personal network

verified public network

LEVEL 2/5

What is phishing?

a type of fish in the ocean

An attack that tries to steal your money or identity by tricking you into giving personal info—like credit card numbers or passwords—on fake websites.

A type of software update

LEVEL 3/5

What does malware mean?

Malicious software designed to harm or exploit devices

A type pf hardware

good software

LEVEL 4/5

What is a firewall used for?

To start a fire

a way to cool down your computer

to protect your device from unauthroized access

LEVEL 5/5

What is a man-in-the-middle (MITM) attack?

A type of malware that deletes system files

An attack where a hacker intercepts communication between two parties

A denial-of-service attack that floods a server with traffic

CONGRATULATIONS!

THE NUMBER OF THIS MISSION IS 5

GAME OVER

CONTINUE?

yes

NO

MISSIONS

Complete the missions to obtain thepassword numbers

4 FROG

3 BARS

2 PUZZLE

1 SHIPS

PASSWORD

LEVEL 1/5

NEXT

What is the main purpose of a digital certificate?

To store encrypted passwords

To verify the identity of a website or user

To block access to unsecured websites

LEVEL 2/5

NEXT

Which type of malware locks a user’s files and demands payment to restore access?

Spyware

Ransomware

Worm

LEVEL 3/5

NEXT

What is a zero-day vulnerability?

A software flaw that is exploited before the developer knows or fixes it

A virus that lasts only 24 hours

A password that expires after one use

LEVEL 4/5

NEXT

What does HTTPS provide that HTTP does not?

Automatic data backup

Faster website loading speed

Encrypted communication between client and server

LEVEL 5/5

NEXT

Which of the following best describes social engineering?

Engineering secure software systems

Using social media to promote cybersecurity awareness

Tricking people into revealing confidential information

CONGRATULATIONS!

THE NUMBER OF THIS MISSION IS 3

GAME OVER

CONTINUE?

yes

NO

MISSIONs

Complete the missions to obtain the password numbers

4 FROG

3 BARS

2 PUZZLE

1 SHIPS

PASSWORD

LEVEL 1/5

What is the main purpose of penetration testing?

To simulate cyberattacks and find exploitable weaknesses

To recover deleted system files

To configure network firewalls automatically

LEVEL 2/5

Which of the following is an example of two-factor authentication (2FA)?

Logging in with two different passwords

Logging in with a password and a code sent to your phone

Logging in from two devices at once

LEVEL 3/5

What is the difference between a virus and a worm?

A virus needs a host program to spread, while a worm can self-replicate

A worm can only infect mobile devices

A virus only spreads through the internet

LEVEL 4/5

Which type of attack floods a system with traffic to make it unavailable to users?

Spoofing attack

Keylogging attack

Write the correct answer hereDistributed Denial of Service (DDoS) attack

LEVEL 5/5

What is the main purpose of intrusion detection systems (IDS)?

To store user credentials securely

To automatically block all incoming traffic

To monitor network traffic for suspicious or malicious activity

CONGRATULATIONS!

THE NUMBER OF THIS MISSION IS 9

GAME OVER

CONTINUE?

yes

NO

missions

Complete the missions to obtain thenumbers of the password

4 FROG

3 BARS

2 PUZZLE

1 SHIPS

PASSWORD

LEVEL 1/3

What is the purpose of a Security Information and Event Management (SIEM) system?

To block all suspicious IP addresses automatically

To manage encryption keys for secure communication

To collect, analyze, and correlate security logs in real time

LEVEL 2/3

Which type of malware disguises itself as legitimate software?

Worm

Trojan horse

Rootkit

LEVEL 3/3

What does SSL stand for in cybersecurity?

System Security Lock

Safe Session Login

Secure Socket Layer

CONGRATULATIONS!

THE NUMBER OF THIS MISSION IS 6

GAME OVER

CONTINUE?

yes

NO

missions

Complete the missions to obtain thepassword numbers

4 FROG

3 BARS

2 PUZZLE

1 SHIPS

PASSWORD

Password?

Enter the password

Are you sure you want to exit?

You will lose all the progress

NO

yes

rufus

A normal-looking dog with a secret: he can hack into any system he wants. Loyal, clever, and surprisingly sneaky.

Are you sure you want to exit?

You will lose all the progress

NO

yes

Are you sure you want to exit?

You will lose all the progress

NO

yes

Are you sure you want to exit?

You will lose all the progress

NO

yes

MIsSIONSHIPS

Put your cyber skills to the test—take down the enemies!

CONTINUE

Are you sure you want to exit?

You will lose all the progress

NO

yes

MISSIONpuzzle

Are you ready to put your skills to the test?

CONTINUE

Missionbars

Ready to challenge you cyber skills?

CONTINUE

Are you sure you want to exit?

You will lose all the progress

NO

yes

Are you sure you want to exit?

You will lose all the progress

NO

yes

Are you sure you want to exit?

You will lose all the progress

NO

yes

Are you sure you want to exit?

You will lose all the progress

NO

yes

Are you sure you want to exit?

You will lose all the progress

NO

yes

Are you sure you want to exit?

You will lose all the progress

NO

yes

speedy

Slow hands, fast mind. Speedy the cyber sloth moves at its own perfect pace.

mr.meow

A digital predator,Mr.Meow is built for stealth and hacking

hashbert

Hashbert.

Are you sure you want to exit?

You will lose all the progress

NO

yes

Are you sure you want to exit?

You will lose all the progress

NO

yes

MISSIONfrog

Last one! ALmost there you cyber pro!

CONTINUE

Are you sure you want to exit?

You will lose all the progress

NO

yes

Are you sure you want to exit?

You will lose all the progress

NO

yes

Are you sure you want to exit?

You will lose all the progress

NO

yes

Are you sure you want to exit?

You will lose all the progress

NO

yes

Are you sure you want to exit?

You will lose all the progress

NO

yes