
GenCyber 10 Principles of Cybersecurity
Computers
6th - 8th Grade
Used 47+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Any attempt to prevent people from being able to see information.
Information/Data Hiding
Least Privilege
Resource Encapsulation
Layering
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
The goal is to simplify and decrease the number of ways the software can be exploited.
Abstraction
Domain Separation
Modularity
Minimization
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A fancy word for summarizing or explaining in a way that can be easily understood.
Process Isolation
Abstraction
Minimization
Least Privilege
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Keeping processes separate prevents the failure of one process from negatively impacting another.
Information/Data Hiding
Resource Encapsulation
Process Isolation
Simplicity of Design
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Limits what access people have to your resources and what they can do with them.
Least Privilege
Layering
Process Isolation
Abstraction
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Separating areas where resources are located prevents accidents and loss data, keeping information worlds from colliding.
Layering
Modularity
Simplicity of Design
Domain Separation
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Resources including hardware, system objects, or processes- must be separated and used as intended.
Domain Separation
Resource Encapsulation
Process Isolation
Minimalization
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?