placeholder image to represent content

Spring SCA 2024

Quiz by Wesley Brashear

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
8 questions
Show answers
  • Q1

    Companies will often hire cybersecurity professionals to try to break into their networks or systems. What cybersecurity concept does this practice exemplify?

    Defense in Depth

    Availability

    Think Like An Adversary

    Confidentiality

    30s
  • Q2

    A DDoS (distributed denial of service) attack is one in which an attacker floods a server with traffic to prevent users from gaining access to the system, information, or devices. This is an attempt to disrupt what cybersecurity concept?

    Integrity

    Confidentiality

    Defense in Depth

    Availability

    30s
  • Q3

    Many video games allow users make modifications of their code to allow players to do things the original creators did not intend. What cybersecurity concept does this practice potentially violate?

    Confidentiality

    Integrity

    Defense in Depth

    Keep it Simple

    30s
  • Q4

    Your friend showed you an app they created that helps them keep track of various stats in their favorite tower defense game. The code for the app is written in several languages and requires a long list of dependencies. You know that all of this could have been done in a single language with far fewer libraries. What cybersecurity concept would you try to get your friend to use?

    Availability

    Keep it Simple

    Integrity

    Defense in Depth

    30s
  • Q5

    Your teacher leaves their password for their work email that contains sensitive student information on a post-it note on their desk. What cybersecurity concept would they benefit from using?

    Confidentiality

    Keep it Simple

    Integrity

    Defense in Depth

    30s
  • Q6

    You are unable to access your Steam account because their servers are unexpectedly down. With what cybersecurity concept is the Steam team currently dealing?

    Think Like an Adversary

    Integrity

    Confidentiality

    Availability

    30s
  • Q7

    A checksum is a small block of data that is associated with a larger block of data that is used for detection of errors that occurred in the storage or transmission of the larger data block. The practice of using checksum functions is a good example of what cybersecurity concept?

    Integrity

    Availability

    Defense in Depth

    Confidentiality

    30s
  • Q8

    USB security keys (e.g. YubiKeys) provide users with a very strong method of two- or multi-factor authentication. Using one of these keys is a good example of what cybersecurity concept?

    Integrity

    Confidentiality

    Availability

    Defense in Depth

    30s

Teachers give this quiz to your class