placeholder image to represent content

SCA: October 2023

Quiz by Wesley Brashear

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
7 questions
Show answers
  • Q1

    Companies will often hire cybersecurity professionals to try to break into their networks or systems. What cybersecurity concept does this practice exemplify?

    Think Like An Adversary

    Confidentiality

    Defense In Depth

    Availability

    30s
  • Q2

    A DDoS (distributed denial of service) attack is one in which an attacker floods a server with traffic to prevent users from gaining access to the system, information, or devices. This is an attempt to disrupt what cybersecurity concept

    Confidentiality

    Integrity

    Defense in Depth

    Availability

    30s
  • Q3

    Many video games allow users make modifications of their code to allow players to do things the original creators did not intend. What cybersecurity concept does this practice potentially violate?

    Keep it Simple

    Integrity

    Defense in Depth

    Confidentiality

    30s
  • Q4

    One of your friends lets you use their school login information. What cybersecurity concept does this violate?

    Think Like an Adversary

    Integrity

    Availability

    Confidentiality

    30s
  • Q5

    Oops! You forgot to set up your GitHub account with two factor authentication. What cybersecurity concept are you not following?

    Confidentiality

    Defense in Depth

    Integrity

    Availability

    30s
  • Q6

    Your school's Multi-Factor Authentication software isn't very stable and frequently causes students to not be able to access the school's online services. The instability of this software is an issue with what cybersecurity concept?

    Integrity

    Availability

    Confidentiality

    Defense in Depth

    30s
  • Q7

    An adversarial student has hacked your school's attendance database and erased all of their unexcused absences. What cybersecurity concept was violated in this scenario?

    Confidentiality

    Integrity

    Defense in Depth

    Availability

    30s

Teachers give this quiz to your class