![placeholder image to represent content](/_next/image?url=%2Fassets%2Fquiz_default_logo.jpg&w=256&q=75)
SCA: October 2023
Quiz by Wesley Brashear
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Companies will often hire cybersecurity professionals to try to break into their networks or systems. What cybersecurity concept does this practice exemplify?
Think Like An Adversary
Confidentiality
Defense In Depth
Availability
30s - Q2
A DDoS (distributed denial of service) attack is one in which an attacker floods a server with traffic to prevent users from gaining access to the system, information, or devices. This is an attempt to disrupt what cybersecurity concept
Confidentiality
Integrity
Defense in Depth
Availability
30s - Q3
Many video games allow users make modifications of their code to allow players to do things the original creators did not intend. What cybersecurity concept does this practice potentially violate?
Keep it Simple
Integrity
Defense in Depth
Confidentiality
30s - Q4
One of your friends lets you use their school login information. What cybersecurity concept does this violate?
Think Like an Adversary
Integrity
Availability
Confidentiality
30s - Q5
Oops! You forgot to set up your GitHub account with two factor authentication. What cybersecurity concept are you not following?
Confidentiality
Defense in Depth
Integrity
Availability
30s - Q6
Your school's Multi-Factor Authentication software isn't very stable and frequently causes students to not be able to access the school's online services. The instability of this software is an issue with what cybersecurity concept?
Integrity
Availability
Confidentiality
Defense in Depth
30s - Q7
An adversarial student has hacked your school's attendance database and erased all of their unexcused absences. What cybersecurity concept was violated in this scenario?
Confidentiality
Integrity
Defense in Depth
Availability
30s