Threat Modeling

Threat Modeling

9th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

9th - 12th Grade

11 Qs

KiCA Quizzes

KiCA Quizzes

KG - University

12 Qs

WJEC Computer Science KO - Security and Data Management

WJEC Computer Science KO - Security and Data Management

11th Grade

10 Qs

Hashing, Digital Signatures and BlockChain Practice Questions

Hashing, Digital Signatures and BlockChain Practice Questions

11th Grade

10 Qs

Cyber Security - Social Engineering

Cyber Security - Social Engineering

10th - 11th Grade

14 Qs

Impact of Security Breaches

Impact of Security Breaches

11th Grade

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

15 Qs

Threat Modeling

Threat Modeling

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Karen Hersh

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

What is cybersecurity?

The practice of preventing and mitigating attacks on computer systems and networks.

The practice of provoking and amassing attacks on technology.

The process of connecting devices together to allow them to share resources and data with each other

The process of creating a copy of a computer's hard drive and then using that copy to install an operating system, applications, and settings on another device

2.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

Which of the following is NOT part of cybersecurity?

Protecting computers, mobile devices, electronic systems, and the information on them

Keeping information from being used in ways other than how they were intended to be used

Minimizing the damage when information gets hacked

Sorting through large data sets to identify patterns and relationships that can help solve business problems

3.

MULTIPLE SELECT QUESTION

5 mins • 10 pts

Media Image

A cyber attack is an attempt to make a computer, system, or other resource ______ or ________.

(Select the TWO answers that complete the definition)

Do something it wasn’t meant to

Do something for someone it wasn’t meant to

Do something the user permitted to happen

Do something for an authorized user from a remote location

4.

FILL IN THE BLANK QUESTION

5 mins • 10 pts

Media Image
  • What are you protecting?

  • Who are you protecting it from?

  • What are their resources for attacking it?

What are your resources for protecting it?

What should we do about the things that could go wrong?

These five questions make up the _____________ Process

5.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

Which of the following is the BEST definition for threat modeling?

An activity which involves repetitive successive attempts of trying various password combinations to break into a secure system

A structured process for figuring out how to protect a system from cyber attacks

The process of identifying a user's identity, making sure that they can have access to the system and/or files.

The process of transforming information in a way that, ideally, only authorized parties can decode.

6.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

According to the video, which of the following is one of the five questions you should ask yourself when threat modeling?

How much trouble are you willing to go through to avoid those consequences?

What are the key elements of a strong security policy?

What are the latest techniques hackers can use to steal my data?

Why do I need to know about cybersecurity?

7.

MULTIPLE CHOICE QUESTION

5 mins • 10 pts

Media Image

According to the video, which of the following passwords would be the MOST secure?

B3$TP@$$W0RD

014858230

Sk8ter4Eva!!!68

giraffehelicoptermonsterzoocoffee

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?