
10/7 Daily Do Now
Interactive Video
•
Information Technology (IT)
•
9th - 12th Grade
•
Practice Problem
•
Hard
Amy Austin
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the three primary goals of cybersecurity?
Secrecy, Integrity, and Availability
Confidentiality, Reliability, and Accessibility
Privacy, Security, and Performance
Protection, Efficiency, and Usability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cybersecurity, what does a "threat model" describe?
A software program that detects malicious activity.
A profile of potential attackers, their capabilities, goals, and likely attack methods.
A set of guidelines for secure network configuration.
A historical record of past cyberattacks.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT listed as one of the three main types of authentication?
What you know
What you have
What you are
What you see
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary characteristic of a brute force attack in cybersecurity?
It involves tricking users into revealing sensitive information.
It attempts to guess a secret (like a PIN or password) by trying every possible combination.
It disrupts services by overwhelming a system with traffic.
It exploits software vulnerabilities to gain unauthorized access.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a significant drawback of biometric authentication compared to traditional methods like passwords?
It is always more expensive to implement.
It is deterministic, meaning it always gives the same result.
It cannot be easily reset if compromised.
It requires constant internet connectivity to function.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following rules is part of the Bell-LaPadula Model for access control?
Users can read up but not write down.
Users cannot read up or write down.
Users can write down but not read up.
Users can read and write at any security level.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of a Security Kernel or a Trusted Computing Base in system-level security?
To maximize the amount of operating system software.
To create a system that is impossible to compromise.
To provide a minimal set of operating system software that is close to provably secure.
To allow all users unrestricted access to system resources.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
15 questions
Making Inferences
Quiz
•
7th - 12th Grade
20 questions
El Verbo IR Practice
Quiz
•
9th Grade
23 questions
TSI Math Vocabulary
Quiz
•
10th - 12th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
15 questions
Graphing Inequalities
Quiz
•
7th - 9th Grade
10 questions
Cell Organelles and Their Functions
Interactive video
•
6th - 10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
15 questions
Combine Like Terms and Distributive Property
Quiz
•
8th - 9th Grade