We used a final hotspot with a unique interaction to reset the quiz. To accomplish this we have an interaction to show all of the "Content" layers, and hide all of the "Correct" and "Wrong" layers.
Each question is made up of 3 different layer groups - 1 for content, 1 for if they answer the question correctly, and 1 for if they get the question wrong. Simply set up the hotspots to show the "wrong" layer group for the incorrect answers, and the "correct" layer group for the right answers.
To achieve the cascading text effect in this section, we created four different text boxes and then used a "Fade in Up" animation with a small delay difference between the objects.
Pro tip: Easily copy and paste animations by right clicking on the animated object and selecting "Copy Animation".
1024px x 5820px
Templates - Tech Quiz
This quiz template is a great way to get your customers interacting with your content in a fun and interesting way. You can serve up different pieces of information based on their answers all without needing to know a line of code.
Share This
Monitor endpoints
for the earliest possible warnings of an attack.
1
Get started
Secureworks counter tHreat unit™ presents
TEAMS IN 2022
YOUR SECURITY
22 TIPS FOR
Know the location
of your critical assets and who has access.
2
3
Understand your
identity management ecosystem.
4
Remote work isn’t
going anywhere.
Check controls for
a borderless world.
Phishing attacks
are still common.
Train users annually.
6
Rotate passwords
less while requiring stronger passwords.
5
7
Manage privileged accounts and don’t let users run as admin.
8
Apply least privilege
to both users and applications.
9
Limit supply chain’s ability to access your environment.
10
Remove unnecessary third-party apps from your environment.
11
Harden and segregate critical authentication systems.
12
Use automation to
speed vulnerability management maturity.
13
Patch promptly to minimize exposure to threat actors.
14
Segment your network to impede adversaries from moving laterally if a breach does occur.
15
Rotate private keys especially if there’s a suspicion of exposure.
16
Have an
incident response
plan and test it.
17
Subscribe to
curated threat
intelligence.
18
Know under what
circumstances, how,
and to whom you’d report a breach.
19
Detect intrusions earlier in the infection process before critical assets
are compromised.
20
Add offensive strategy
to MFA to anticipate adversary’s moves.
21
Combine threat intelligence with local context to prioritize vulnerabilities.
22
Review your holistic cybersecurity strategy and engage with Secureworks to reduce risk, maximize your security investment ROI, and fill your talent gaps.
Secureworks’ Counter Threat Unit analyzed a combination of 1,400+ incident response engagements, trillions of event logs from customer telemetry, and monitors 300+ threat groups to bring you the "2021 State of the Threat" report.
DOWNLOAD 2021 State of the threat REPORT