Threat Modeling

Quiz
•
Computers
•
9th - 12th Grade
•
Easy
Karen Hersh
Used 4+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 10 pts
What is cybersecurity?
The practice of preventing and mitigating attacks on computer systems and networks.
The practice of provoking and amassing attacks on technology.
The process of connecting devices together to allow them to share resources and data with each other
The process of creating a copy of a computer's hard drive and then using that copy to install an operating system, applications, and settings on another device
2.
MULTIPLE CHOICE QUESTION
5 mins • 10 pts
Which of the following is NOT part of cybersecurity?
Protecting computers, mobile devices, electronic systems, and the information on them
Keeping information from being used in ways other than how they were intended to be used
Minimizing the damage when information gets hacked
Sorting through large data sets to identify patterns and relationships that can help solve business problems
3.
MULTIPLE SELECT QUESTION
5 mins • 10 pts
A cyber attack is an attempt to make a computer, system, or other resource ______ or ________.
(Select the TWO answers that complete the definition)
Do something it wasn’t meant to
Do something for someone it wasn’t meant to
Do something the user permitted to happen
Do something for an authorized user from a remote location
4.
FILL IN THE BLANK QUESTION
5 mins • 10 pts
What are you protecting?
Who are you protecting it from?
What are their resources for attacking it?
What are your resources for protecting it?
What should we do about the things that could go wrong?
These five questions make up the _____________ Process
5.
MULTIPLE CHOICE QUESTION
5 mins • 10 pts
Which of the following is the BEST definition for threat modeling?
An activity which involves repetitive successive attempts of trying various password combinations to break into a secure system
A structured process for figuring out how to protect a system from cyber attacks
The process of identifying a user's identity, making sure that they can have access to the system and/or files.
The process of transforming information in a way that, ideally, only authorized parties can decode.
6.
MULTIPLE CHOICE QUESTION
5 mins • 10 pts
According to the video, which of the following is one of the five questions you should ask yourself when threat modeling?
How much trouble are you willing to go through to avoid those consequences?
What are the key elements of a strong security policy?
What are the latest techniques hackers can use to steal my data?
Why do I need to know about cybersecurity?
7.
MULTIPLE CHOICE QUESTION
5 mins • 10 pts
According to the video, which of the following passwords would be the MOST secure?
B3$TP@$$W0RD
014858230
Sk8ter4Eva!!!68
giraffehelicoptermonsterzoocoffee
Create a free account and access millions of resources
Similar Resources on Wayground
13 questions
Excel Macros & More

Quiz
•
12th Grade
10 questions
Cybersecurity threats 1

Quiz
•
9th Grade
15 questions
cyber safety

Quiz
•
9th - 12th Grade
10 questions
Class IX IT 402

Quiz
•
9th Grade
10 questions
Wi-Fi Router and Guest Network Quiz

Quiz
•
11th Grade
15 questions
Cybersecurity and Data Privacy Vocabulary

Quiz
•
11th Grade - University
10 questions
CompTIA ITF+ 2

Quiz
•
12th Grade
10 questions
IT English Essentials: Unit 6 - Quiz 1

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
20 questions
Analog vs Digital

Quiz
•
9th - 12th Grade
10 questions
CTEA Computer Vocab Terms #1

Quiz
•
12th Grade
10 questions
Exploring Cybersecurity Techniques and Threats

Interactive video
•
6th - 10th Grade
10 questions
Understanding the Internet and Data Transmission

Interactive video
•
7th - 12th Grade