Search Header Logo

Cybersecurity

Computers

9th - 12th Grade

Used 2+ times

Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What does cybersecurity aim to protect?

Only authorized people

Secrecy, integrity, and availability

Computer systems and data

None of the above


2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the main purpose of a threat model?

To prepare against specific threats

To overwhelm hackers

To profile attackers

To define security methods


3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

How is "what you know" authentication different from "what you have" authentication?

"What you know" is based on knowledge of a secret, while "what you have" is based on possession of a secret token.


"What you know" is more secure than "what you have".

"What you have" is easier to implement than "what you know".

 Both are equally difficult to compromise.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Why is it suggested to use two or more forms of authentication for important accounts?

To make it more convenient for users

 To increase the speed of authentication

To reduce the likelihood of unauthorized access

 To complicate the authentication process

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the principle called when a program's compromise should be limited and contained?

Isolation

Segregation

Compartmentalization

Separation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?