GenCyber 10 Principles of Cybersecurity

GenCyber 10 Principles of Cybersecurity

6th - 8th Grade

20 Qs

quiz-placeholder

Similar activities

AQA GCSE Computer Science - 3.1.4 Sorting Algorithms

AQA GCSE Computer Science - 3.1.4 Sorting Algorithms

8th - 10th Grade

18 Qs

Coding Quiz

Coding Quiz

8th Grade

20 Qs

Computational Thinking & Coding - Test #1

Computational Thinking & Coding - Test #1

7th Grade

20 Qs

Ohio's Computer Science Standards Glossary of Terms

Ohio's Computer Science Standards Glossary of Terms

7th - 10th Grade

21 Qs

Berpikir Komputasional_Test

Berpikir Komputasional_Test

6th Grade

20 Qs

Decomposition&PatterRecong

Decomposition&PatterRecong

7th Grade

16 Qs

Intro to Computational Thinking

Intro to Computational Thinking

6th - 8th Grade

15 Qs

ASK T1 (Bab 1 - Konsep Asas Pemikiran Komputasional)

ASK T1 (Bab 1 - Konsep Asas Pemikiran Komputasional)

KG - University

20 Qs

GenCyber 10 Principles of Cybersecurity

GenCyber 10 Principles of Cybersecurity

Assessment

Quiz

Computers

6th - 8th Grade

Medium

Used 47+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Any attempt to prevent people from being able to see information.

Information/Data Hiding

Least Privilege

Resource Encapsulation

Layering

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The goal is to simplify and decrease the number of ways the software can be exploited.

Abstraction

Domain Separation

Modularity

Minimization

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A fancy word for summarizing or explaining in a way that can be easily understood.

Process Isolation

Abstraction

Minimization

Least Privilege

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Keeping processes separate prevents the failure of one process from negatively impacting another.

Information/Data Hiding

Resource Encapsulation

Process Isolation

Simplicity of Design

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Limits what access people have to your resources and what they can do with them.

Least Privilege

Layering

Process Isolation

Abstraction

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Separating areas where resources are located prevents accidents and loss data, keeping information worlds from colliding.

Layering

Modularity

Simplicity of Design

Domain Separation

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Resources including hardware, system objects, or processes- must be separated and used as intended.

Domain Separation

Resource Encapsulation

Process Isolation

Minimalization

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?