Threat Modeling

Threat Modeling

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

1.1 Computer Systems Essential Knowledge

1.1 Computer Systems Essential Knowledge

9th - 12th Grade

15 Qs

Cyber Security Homework 1

Cyber Security Homework 1

7th - 9th Grade

15 Qs

Kuis Dadakan ;)

Kuis Dadakan ;)

10th Grade - University

15 Qs

Паскаль. Основные команды

Паскаль. Основные команды

8th - 11th Grade

10 Qs

ICT as Social Change

ICT as Social Change

12th Grade

10 Qs

Excel - basic

Excel - basic

9th Grade

15 Qs

สอบย่อย ครั้งที่ 1 (BC.2/2)

สอบย่อย ครั้งที่ 1 (BC.2/2)

11th Grade

10 Qs

HTML & Google Site Seatwork

HTML & Google Site Seatwork

12th Grade

10 Qs

Threat Modeling

Threat Modeling

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Easy

Created by

Karen Hersh

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

What is cybersecurity?

The practice of preventing and mitigating attacks on computer systems and networks.

The practice of provoking and amassing attacks on technology.

The process of connecting devices together to allow them to share resources and data with each other

The process of creating a copy of a computer's hard drive and then using that copy to install an operating system, applications, and settings on another device

2.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

Which of the following is NOT part of cybersecurity?

Protecting computers, mobile devices, electronic systems, and the information on them

Keeping information from being used in ways other than how they were intended to be used

Minimizing the damage when information gets hacked

Sorting through large data sets to identify patterns and relationships that can help solve business problems

3.

MULTIPLE SELECT QUESTION

5 mins • 10 pts

Media Image

A cyber attack is an attempt to make a computer, system, or other resource ______ or ________.

(Select the TWO answers that complete the definition)

Do something it wasn’t meant to

Do something for someone it wasn’t meant to

Do something the user permitted to happen

Do something for an authorized user from a remote location

4.

FILL IN THE BLANK QUESTION

5 mins • 10 pts

Media Image

  • What are you protecting?

  • Who are you protecting it from?

  • What are their resources for attacking it?

What are your resources for protecting it?

What should we do about the things that could go wrong?

These five questions make up the _____________ Process

5.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

Which of the following is the BEST definition for threat modeling?

An activity which involves repetitive successive attempts of trying various password combinations to break into a secure system

A structured process for figuring out how to protect a system from cyber attacks

The process of identifying a user's identity, making sure that they can have access to the system and/or files.

The process of transforming information in a way that, ideally, only authorized parties can decode.

6.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

According to the video, which of the following is one of the five questions you should ask yourself when threat modeling?

How much trouble are you willing to go through to avoid those consequences?

What are the key elements of a strong security policy?

What are the latest techniques hackers can use to steal my data?

Why do I need to know about cybersecurity?

7.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

According to the video, which of the following passwords would be the MOST secure?

B3$TP@$$W0RD

014858230

Sk8ter4Eva!!!68

giraffehelicoptermonsterzoocoffee

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?