Cyber Security TED Talk

Cyber Security TED Talk

12th Grade

7 Qs

quiz-placeholder

Similar activities

AP CSP BI 5

AP CSP BI 5

9th - 12th Grade

9 Qs

IT Biztonság

IT Biztonság

9th - 12th Grade

9 Qs

Ethical Hacking 1

Ethical Hacking 1

11th - 12th Grade

10 Qs

Law , Artificial Intelligence & Screen Time

Law , Artificial Intelligence & Screen Time

7th - 12th Grade

12 Qs

Computer Security Authentication Quiz

Computer Security Authentication Quiz

12th Grade

10 Qs

SecPro Unit 6.1 and 6.2 Terminology Quiz

SecPro Unit 6.1 and 6.2 Terminology Quiz

9th - 12th Grade

10 Qs

Technical Terms - Internet (A-Z) - SSO

Technical Terms - Internet (A-Z) - SSO

12th Grade

10 Qs

D4 WorkBook - Quizzez

D4 WorkBook - Quizzez

12th Grade

12 Qs

Cyber Security TED Talk

Cyber Security TED Talk

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Kalpesh Sagar

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What percentage of breaches originate with human error according to Espinosa?

10%

30%

50%

70%

Answer explanation

In his talk, Espinosa states that 70% of breaches originate with human error.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the first law of cybersecurity Espinosa introduces?

Enable MFA

Create strong passwords

Continuous security awareness

Encrypt your data

Answer explanation

The first law covered is continuous security awareness training.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. How often does Espinosa recommend changing passwords?

Every 30 days

Every 60 days

Every 90 days

Every 120 days

Answer explanation

Explanation: Espinosa advises changing passwords every 90 days for proper security hygiene.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What does MFA stand for?

Multi-factor authorisation

Multifactor authentication

Multiple factor authentication

Multiple firewall access

Answer explanation

Explanation: MFA stands for multifactor authentication, the use of more than one method to verify identity.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What law relates to controlling access to data and systems?

First law

Second law

Third law

Fourth law

Answer explanation

Explanation: The third law covered is least privilege access, controlling access to data/systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which law focuses on protections from phishing and social engineering?

First law

Fourth law

Third law

Fifth law

Answer explanation

The fourth law is to guard against phishing and social engineering.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What does Espinosa say is the last line of defense for security?

Firewall

Encryption

Backups

Password manager

Answer explanation

Explanation: In the talk, Espinosa states backups are the last line of defense for cybersecurity.