placeholder image to represent content

Thursday - Cybersecurity Concepts

Quiz by Wesley Brashear

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
6 questions
Show answers
  • Q1

    Your teacher leaves their password for their email that contains sensitive student information on a post-it note on their desk. What cybersecurity concept would they benefit from using?

    Integrity

    Availability

    Confidentiality

    Keep it Simple

    30s
  • Q2

    Your friend showed you an app they created that helps them keep track of various stats in their favorite tower defense game. The code for the app is written in several languages and requires a long list of dependencies. You know that all of this could have been done in a single language with far fewer libraries. What cybersecurity concept would you try to get your friend to use?

    Defense in Depth

    Think Like an Adversary

    Keep it Simple

    Availability

    30s
  • Q3

    Ethical hackers use their computational skills and hacking knowledge to identify any vulnerabilities in networks or software with the owner’s permission. What cybersecurity concept does this practice exemplify?

    Confidentiality

    Integrity

    Defense in Depth

    Think Like an Adversary

    30s
  • Q4

    USB security keys (e.g. YubiKeys) provide users with a very strong method of two- or multi-factor authentication. Using one of these keys is a good example of what cybersecurity concept?

    Keep it Simple

    Integrity

    Availability

    Defense in Depth

    30s
  • Q5

    A DDoS (distributed denial of service) attack is one in which an attacker floods a server with traffic to prevent users from gaining access to a system, information, or devices. A system that includes redundant pathways and actively monitors network traffic patterns to identify possible attacks is an attempt to maintain what cybersecurity concept?

    Integrity

    Defense in Depth

    Confidentiality

    Availability

    30s
  • Q6

    There are thousands of mods available for Minecraft and some are very popular. While these are allowed by the creators of Minecraft, what cybersecurity concept does this practice concern?

    Confidentiality

    Availability

    Defense in Depth

    Integrity

    30s

Teachers give this quiz to your class