Cyber Security TED Talk

Cyber Security TED Talk

12th Grade

7 Qs

quiz-placeholder

Similar activities

Password Safety & Security

Password Safety & Security

KG - Professional Development

11 Qs

Technical Terms - Internet (A-Z) - SSO

Technical Terms - Internet (A-Z) - SSO

12th Grade

10 Qs

Module 10-LAN Security

Module 10-LAN Security

9th Grade - University

9 Qs

Unit 10 AP CSP Advanced

Unit 10 AP CSP Advanced

9th - 12th Grade

10 Qs

AP CSP BI 5

AP CSP BI 5

9th - 12th Grade

9 Qs

Grade5-Week12

Grade5-Week12

5th Grade - University

11 Qs

Law , Artificial Intelligence & Screen Time

Law , Artificial Intelligence & Screen Time

7th - 12th Grade

12 Qs

10.3 Authentication

10.3 Authentication

9th - 12th Grade

11 Qs

Cyber Security TED Talk

Cyber Security TED Talk

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Kalpesh Sagar

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What percentage of breaches originate with human error according to Espinosa?

10%

30%

50%

70%

Answer explanation

In his talk, Espinosa states that 70% of breaches originate with human error.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the first law of cybersecurity Espinosa introduces?

Enable MFA

Create strong passwords

Continuous security awareness

Encrypt your data

Answer explanation

The first law covered is continuous security awareness training.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. How often does Espinosa recommend changing passwords?

Every 30 days

Every 60 days

Every 90 days

Every 120 days

Answer explanation

Explanation: Espinosa advises changing passwords every 90 days for proper security hygiene.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What does MFA stand for?

Multi-factor authorisation

Multifactor authentication

Multiple factor authentication

Multiple firewall access

Answer explanation

Explanation: MFA stands for multifactor authentication, the use of more than one method to verify identity.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What law relates to controlling access to data and systems?

First law

Second law

Third law

Fourth law

Answer explanation

Explanation: The third law covered is least privilege access, controlling access to data/systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which law focuses on protections from phishing and social engineering?

First law

Fourth law

Third law

Fifth law

Answer explanation

The fourth law is to guard against phishing and social engineering.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What does Espinosa say is the last line of defense for security?

Firewall

Encryption

Backups

Password manager

Answer explanation

Explanation: In the talk, Espinosa states backups are the last line of defense for cybersecurity.