10/7 Daily Do Now

10/7 Daily Do Now

Assessment

Interactive Video

Information Technology (IT)

9th - 12th Grade

Hard

Created by

Amy Austin

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three primary goals of cybersecurity?

Secrecy, Integrity, and Availability

Confidentiality, Reliability, and Accessibility

Privacy, Security, and Performance

Protection, Efficiency, and Usability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cybersecurity, what does a "threat model" describe?

A software program that detects malicious activity.

A profile of potential attackers, their capabilities, goals, and likely attack methods.

A set of guidelines for secure network configuration.

A historical record of past cyberattacks.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT listed as one of the three main types of authentication?

What you know

What you have

What you are

What you see

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary characteristic of a brute force attack in cybersecurity?

It involves tricking users into revealing sensitive information.

It attempts to guess a secret (like a PIN or password) by trying every possible combination.

It disrupts services by overwhelming a system with traffic.

It exploits software vulnerabilities to gain unauthorized access.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a significant drawback of biometric authentication compared to traditional methods like passwords?

It is always more expensive to implement.

It is deterministic, meaning it always gives the same result.

It cannot be easily reset if compromised.

It requires constant internet connectivity to function.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following rules is part of the Bell-LaPadula Model for access control?

Users can read up but not write down.

Users cannot read up or write down.

Users can write down but not read up.

Users can read and write at any security level.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a Security Kernel or a Trusted Computing Base in system-level security?

To maximize the amount of operating system software.

To create a system that is impossible to compromise.

To provide a minimal set of operating system software that is close to provably secure.

To allow all users unrestricted access to system resources.

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the security principle that aims to limit the damage caused by a compromised program by containing it within its own environment?

Authentication

Access Control

Isolation

Encryption