Thursday - Cybersecurity Concepts
Quiz by Wesley Brashear
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Your teacher leaves their password for their email that contains sensitive student information on a post-it note on their desk. What cybersecurity concept would they benefit from using?
Integrity
Availability
Confidentiality
Keep it Simple
30s - Q2
Your friend showed you an app they created that helps them keep track of various stats in their favorite tower defense game. The code for the app is written in several languages and requires a long list of dependencies. You know that all of this could have been done in a single language with far fewer libraries. What cybersecurity concept would you try to get your friend to use?
Defense in Depth
Think Like an Adversary
Keep it Simple
Availability
30s - Q3
Ethical hackers use their computational skills and hacking knowledge to identify any vulnerabilities in networks or software with the owner’s permission. What cybersecurity concept does this practice exemplify?
Confidentiality
Integrity
Defense in Depth
Think Like an Adversary
30s - Q4
USB security keys (e.g. YubiKeys) provide users with a very strong method of two- or multi-factor authentication. Using one of these keys is a good example of what cybersecurity concept?
Keep it Simple
Integrity
Availability
Defense in Depth
30s - Q5
A DDoS (distributed denial of service) attack is one in which an attacker floods a server with traffic to prevent users from gaining access to a system, information, or devices. A system that includes redundant pathways and actively monitors network traffic patterns to identify possible attacks is an attempt to maintain what cybersecurity concept?
Integrity
Defense in Depth
Confidentiality
Availability
30s - Q6
There are thousands of mods available for Minecraft and some are very popular. While these are allowed by the creators of Minecraft, what cybersecurity concept does this practice concern?
Confidentiality
Availability
Defense in Depth
Integrity
30s