
Tuesday - Cybersecurity Concepts
Quiz by Wesley Brashear
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Designing highly complicated information and security systems violates what cybersecurity concept?
Defense in Depth
Think Like an Adversary
Keep it Simple
Availability
30s - Q2
Your school’s Multi-Factor Authentication software isn’t very stable and frequently causes users to not be able to access the school’s online resources. While having MFA is a great example of Defense in Depth, the instability of this implementation causes an issue with what other cybersecurity concept?
Confidentiality
Integrity
Availability
Keep it Simple
30s - Q3
Your grades and school records are protected by law and are not publicly available. What cybersecurity concept does this resemble?
Confidentiality
Defense in Depth
Integrity
Availability
30s - Q4
An adversary has infiltrated the university registration system and changed their courses to have all of the easiest professors. What cybersecurity concept was violated in this scenario?
Integrity
Defense in Depth
Confidentiality
Availability
30s - Q5
Your GitHub account has not been set up to include dual authentication with your cell phone and only uses a username and password for logging in. What cybersecurity concept are you not applying?
Availability
Confidentiality
Keep it Simple
Defense in Depth
30s