Search Header Logo

Threat Modeling

Authored by Karen Hersh

Computers

9th - 12th Grade

Used 4+ times

Threat Modeling
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

What is cybersecurity?

The practice of preventing and mitigating attacks on computer systems and networks.

The practice of provoking and amassing attacks on technology.

The process of connecting devices together to allow them to share resources and data with each other

The process of creating a copy of a computer's hard drive and then using that copy to install an operating system, applications, and settings on another device

2.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

Which of the following is NOT part of cybersecurity?

Protecting computers, mobile devices, electronic systems, and the information on them

Keeping information from being used in ways other than how they were intended to be used

Minimizing the damage when information gets hacked

Sorting through large data sets to identify patterns and relationships that can help solve business problems

3.

MULTIPLE SELECT QUESTION

5 mins • 10 pts

Media Image

A cyber attack is an attempt to make a computer, system, or other resource ______ or ________.

(Select the TWO answers that complete the definition)

Do something it wasn’t meant to

Do something for someone it wasn’t meant to

Do something the user permitted to happen

Do something for an authorized user from a remote location

4.

FILL IN THE BLANK QUESTION

5 mins • 10 pts

Media Image

  • What are you protecting?

  • Who are you protecting it from?

  • What are their resources for attacking it?

What are your resources for protecting it?

What should we do about the things that could go wrong?

These five questions make up the _____________ Process

5.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

Which of the following is the BEST definition for threat modeling?

An activity which involves repetitive successive attempts of trying various password combinations to break into a secure system

A structured process for figuring out how to protect a system from cyber attacks

The process of identifying a user's identity, making sure that they can have access to the system and/or files.

The process of transforming information in a way that, ideally, only authorized parties can decode.

6.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

According to the video, which of the following is one of the five questions you should ask yourself when threat modeling?

How much trouble are you willing to go through to avoid those consequences?

What are the key elements of a strong security policy?

What are the latest techniques hackers can use to steal my data?

Why do I need to know about cybersecurity?

7.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

According to the video, which of the following passwords would be the MOST secure?

B3$TP@$$W0RD

014858230

Sk8ter4Eva!!!68

giraffehelicoptermonsterzoocoffee

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?