Search Header Logo
Cybersecurity: CC CS #31

Cybersecurity: CC CS #31

Assessment

Presentation

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Jacob Kolosey

Used 31+ times

FREE Resource

3 Slides • 12 Questions

1

media

​CYBERSECURITY: Crash Course CS #31

CYBERSECURITY:

Crash Course CS #31

2

Take notes on the video and amend them in a different color using the questions that follow.

Crash Course Computer Science #31: Cybersecurity

3

4

Multiple Choice

Which is not listed as a feature of computer systems and their data protected by cybersecurity?

1

Availability

2

Connectivity

3

Secrecy

4

Integrity

5

Multiple Choice

Hackers overloading a website with requests in order to attack its availability to other users is called:

1

Denial of Network Attack

2

Denial of Availability Attack

3

Denial of Service Attack

4

Computer Overload Attack

6

Multiple Choice

Why are threat models important?

1

To keep your nosy roommate AND your little brother away from your computer

2

To best guard your computer against the most likely attack

3

To develop a broad computer security program that will guard against every possible attack

4

To guard against any threat no matter how unlikely

7

Multiple Choice

Which is NOT one of the three factors of authentication?

1

what you know

2

what you have

3

what you are

4

what you do

8

Multiple Choice

How many possible combinations are there for a 4-digit decimal pin number?

1

100

2

1,000

3

10,000

4

100,000

9

Multiple Choice

Which would be the best password?

1

Likety rake life

2

P@$$word123

3

6547

4

password123

10

Multiple Choice

Which is an example of what-you-are authentication?

1

a password

2

a physical key

3

a digital key

4

a thumb print

11

Multiple Choice

What are the permission options for access control?

1

view, write, analyze

2

execute, write, read

3

run program, read, edit

4

yes or no

12

Multiple Choice

Which is false in a system with three different levels of access control?

1

If you have lowest access, you can only read that level

2

with lowest access, you can't write all levels of file

3

with highest access, you can write all levels of files

4

if you have highest access, you can read any level of file

13

Multiple Choice

Why are security kernels so reliable?

1

their shifting nature is too complex for hackers

2

they have so little code

3

they are stored in internet backdoors

4

they are so inefficient

14

Multiple Choice

What is independent verification and validation?

1

reviewing your own work

2

multi-person auditing

3

using a bot to check your work

4

testing your own code

15

Multiple Choice

What approach should good developers take to prepare for when, not if, their programs are compromised?

1

the pig pen approach

2

the cloud approach

3

The railroad approach

4

the sandbox approach

media

​CYBERSECURITY: Crash Course CS #31

CYBERSECURITY:

Crash Course CS #31

Show answer

Auto Play

Slide 1 / 15

SLIDE