Spring SCA 2024
Quiz by Wesley Brashear
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Companies will often hire cybersecurity professionals to try to break into their networks or systems. What cybersecurity concept does this practice exemplify?
Defense in Depth
Availability
Think Like An Adversary
Confidentiality
30s - Q2
A DDoS (distributed denial of service) attack is one in which an attacker floods a server with traffic to prevent users from gaining access to the system, information, or devices. This is an attempt to disrupt what cybersecurity concept?
Integrity
Confidentiality
Defense in Depth
Availability
30s - Q3
Many video games allow users make modifications of their code to allow players to do things the original creators did not intend. What cybersecurity concept does this practice potentially violate?
Confidentiality
Integrity
Defense in Depth
Keep it Simple
30s - Q4
Your friend showed you an app they created that helps them keep track of various stats in their favorite tower defense game. The code for the app is written in several languages and requires a long list of dependencies. You know that all of this could have been done in a single language with far fewer libraries. What cybersecurity concept would you try to get your friend to use?
Availability
Keep it Simple
Integrity
Defense in Depth
30s - Q5
Your teacher leaves their password for their work email that contains sensitive student information on a post-it note on their desk. What cybersecurity concept would they benefit from using?
Confidentiality
Keep it Simple
Integrity
Defense in Depth
30s - Q6
You are unable to access your Steam account because their servers are unexpectedly down. With what cybersecurity concept is the Steam team currently dealing?
Think Like an Adversary
Integrity
Confidentiality
Availability
30s - Q7
A checksum is a small block of data that is associated with a larger block of data that is used for detection of errors that occurred in the storage or transmission of the larger data block. The practice of using checksum functions is a good example of what cybersecurity concept?
Integrity
Availability
Defense in Depth
Confidentiality
30s - Q8
USB security keys (e.g. YubiKeys) provide users with a very strong method of two- or multi-factor authentication. Using one of these keys is a good example of what cybersecurity concept?
Integrity
Confidentiality
Availability
Defense in Depth
30s