Cyber Security TED Talk

Cyber Security TED Talk

12th Grade

7 Qs

quiz-placeholder

Similar activities

Common  Sense

Common Sense

KG - Professional Development

12 Qs

Email Basics

Email Basics

10th Grade - Professional Development

10 Qs

Google Calendar

Google Calendar

7th Grade - Professional Development

10 Qs

ML #4 - Media & The Mind

ML #4 - Media & The Mind

9th - 12th Grade

9 Qs

Moderate Questions

Moderate Questions

7th - 12th Grade

10 Qs

Fortnite 101

Fortnite 101

KG - University

7 Qs

Matemática 2 - Programação

Matemática 2 - Programação

12th Grade

10 Qs

What is Al - Quran

What is Al - Quran

KG - University

10 Qs

Cyber Security TED Talk

Cyber Security TED Talk

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Kalpesh Sagar

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What percentage of breaches originate with human error according to Espinosa?

10%

30%

50%

70%

Answer explanation

In his talk, Espinosa states that 70% of breaches originate with human error.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the first law of cybersecurity Espinosa introduces?

Enable MFA

Create strong passwords

Continuous security awareness

Encrypt your data

Answer explanation

The first law covered is continuous security awareness training.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. How often does Espinosa recommend changing passwords?

Every 30 days

Every 60 days

Every 90 days

Every 120 days

Answer explanation

Explanation: Espinosa advises changing passwords every 90 days for proper security hygiene.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What does MFA stand for?

Multi-factor authorisation

Multifactor authentication

Multiple factor authentication

Multiple firewall access

Answer explanation

Explanation: MFA stands for multifactor authentication, the use of more than one method to verify identity.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What law relates to controlling access to data and systems?

First law

Second law

Third law

Fourth law

Answer explanation

Explanation: The third law covered is least privilege access, controlling access to data/systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which law focuses on protections from phishing and social engineering?

First law

Fourth law

Third law

Fifth law

Answer explanation

The fourth law is to guard against phishing and social engineering.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What does Espinosa say is the last line of defense for security?

Firewall

Encryption

Backups

Password manager

Answer explanation

Explanation: In the talk, Espinosa states backups are the last line of defense for cybersecurity.