Cyber Security TED Talk

Cyber Security TED Talk

12th Grade

7 Qs

quiz-placeholder

Similar activities

Ramadan Quiz

Ramadan Quiz

KG - Professional Development

10 Qs

Aviation

Aviation

KG - University

10 Qs

Digital Citizenship

Digital Citizenship

6th Grade - Professional Development

10 Qs

Digital citizenship

Digital citizenship

KG - 12th Grade

10 Qs

blox fruit

blox fruit

9th - 12th Grade

10 Qs

Rules to Live By Quiz

Rules to Live By Quiz

9th - 12th Grade

10 Qs

CALL_Past (non verbal sentence). Sonya indriany 2317004

CALL_Past (non verbal sentence). Sonya indriany 2317004

11th - 12th Grade

10 Qs

Quiz 2 Javascript

Quiz 2 Javascript

12th Grade

10 Qs

Cyber Security TED Talk

Cyber Security TED Talk

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Kalpesh Sagar

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What percentage of breaches originate with human error according to Espinosa?

10%

30%

50%

70%

Answer explanation

In his talk, Espinosa states that 70% of breaches originate with human error.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the first law of cybersecurity Espinosa introduces?

Enable MFA

Create strong passwords

Continuous security awareness

Encrypt your data

Answer explanation

The first law covered is continuous security awareness training.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. How often does Espinosa recommend changing passwords?

Every 30 days

Every 60 days

Every 90 days

Every 120 days

Answer explanation

Explanation: Espinosa advises changing passwords every 90 days for proper security hygiene.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What does MFA stand for?

Multi-factor authorisation

Multifactor authentication

Multiple factor authentication

Multiple firewall access

Answer explanation

Explanation: MFA stands for multifactor authentication, the use of more than one method to verify identity.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What law relates to controlling access to data and systems?

First law

Second law

Third law

Fourth law

Answer explanation

Explanation: The third law covered is least privilege access, controlling access to data/systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which law focuses on protections from phishing and social engineering?

First law

Fourth law

Third law

Fifth law

Answer explanation

The fourth law is to guard against phishing and social engineering.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What does Espinosa say is the last line of defense for security?

Firewall

Encryption

Backups

Password manager

Answer explanation

Explanation: In the talk, Espinosa states backups are the last line of defense for cybersecurity.

Discover more resources for Computers