10/7 Daily Do Now
Interactive Video
•
Information Technology (IT)
•
9th - 12th Grade
•
Hard
Amy Austin
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the three primary goals of cybersecurity?
Secrecy, Integrity, and Availability
Confidentiality, Reliability, and Accessibility
Privacy, Security, and Performance
Protection, Efficiency, and Usability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cybersecurity, what does a "threat model" describe?
A software program that detects malicious activity.
A profile of potential attackers, their capabilities, goals, and likely attack methods.
A set of guidelines for secure network configuration.
A historical record of past cyberattacks.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT listed as one of the three main types of authentication?
What you know
What you have
What you are
What you see
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary characteristic of a brute force attack in cybersecurity?
It involves tricking users into revealing sensitive information.
It attempts to guess a secret (like a PIN or password) by trying every possible combination.
It disrupts services by overwhelming a system with traffic.
It exploits software vulnerabilities to gain unauthorized access.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a significant drawback of biometric authentication compared to traditional methods like passwords?
It is always more expensive to implement.
It is deterministic, meaning it always gives the same result.
It cannot be easily reset if compromised.
It requires constant internet connectivity to function.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following rules is part of the Bell-LaPadula Model for access control?
Users can read up but not write down.
Users cannot read up or write down.
Users can write down but not read up.
Users can read and write at any security level.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of a Security Kernel or a Trusted Computing Base in system-level security?
To maximize the amount of operating system software.
To create a system that is impossible to compromise.
To provide a minimal set of operating system software that is close to provably secure.
To allow all users unrestricted access to system resources.
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the security principle that aims to limit the damage caused by a compromised program by containing it within its own environment?
Authentication
Access Control
Isolation
Encryption
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
11 questions
NEASC Extended Advisory
Lesson
•
9th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
20 questions
Multiplying and Dividing Integers
Quiz
•
7th Grade
Discover more resources for Information Technology (IT)
11 questions
NEASC Extended Advisory
Lesson
•
9th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Boomer ⚡ Zoomer - Holiday Movies
Quiz
•
KG - University
17 questions
Afro Latinos: Una Historia Breve Examen
Quiz
•
9th - 12th Grade
13 questions
Halloween Trivia
Quiz
•
9th Grade
17 questions
Hispanic Heritage Month Trivia
Quiz
•
9th - 12th Grade
12 questions
Graphing Inequalities on a Number Line
Quiz
•
9th Grade