What is LessonUp
Search
Channels
AI tools
Log in
Register
‹
Return to search
DC Incentro Cyber Security 08-08-2022
1 / 86
next
Slide 1:
Slide
quiz
Basisschool
Groep 1
This lesson contains
86 slides
, with
interactive quizzes
and
text slides
.
Start lesson
Save
Share
Print lesson
Items in this lesson
Slide 1 - Slide
Slide 2 - Slide
Slide 3 - Slide
Slide 4 - Slide
Slide 5 - Slide
Slide 6 - Slide
Slide 7 - Slide
Slide 8 - Slide
Slide 9 - Slide
Slide 10 - Slide
Slide 11 - Slide
Slide 12 - Slide
Slide 13 - Slide
Slide 14 - Slide
Why should you always lock your computer screen when you step away from your computer?
A
Someone can add or delete files from your computer
B
Colleagues might use your computer to announce that you're buying lunch for everyone!
C
An unauthorized person can have access to confidential client data
D
You save power!
Slide 15 - Quiz
Slide 16 - Slide
"What does the “https://” at the beginning of a URL
denote, as opposed to ""http://"" (without the “s”)?"
A
That the site is the newest version available
B
That information entered into the site is encrypted
C
The site is not accessible to certain computers
D
That the site has special high definition
Slide 17 - Quiz
Slide 18 - Slide
What is not an element of cyber security
A
confidentiality
B
reproducability
C
integrity
D
integrity
Slide 19 - Quiz
Slide 20 - Slide
What is an example of shadow IT?
A
a hacker group
B
Joining an online meeting with not enough light so your face can not be seen
C
Having an IT job that is higly confidential so you can't talk about it at social gatherings
D
The use of your kids school tabet to join an online meeting
Slide 21 - Quiz
Slide 22 - Slide
A memory leak is an example of a cyber security issue
A
False, it is a bug in the code
B
True, a hacker can use it to take down your application
C
False, my code never has memory leaks
D
It's mark Rutte not recollecting major political things
Slide 23 - Quiz
Slide 24 - Slide
HTTPS is helpful for?
A
For preventing CSRF attacks
B
For preventing XSS attacks
C
For preventing SQL injections
D
For preventing Sniffing attacks
Slide 25 - Quiz
Slide 26 - Slide
Slide 27 - Slide
The best way to store passwords is by
A
Make sure that POST, PUT, PATCH & DELETE calls are idempotent
B
Transmit the CSRF token by only using cookies
C
Generate the CSRF token on the service-side and require a custom-HTTP-header per request
D
Only permit HTTPS requests
Slide 28 - Quiz
Slide 29 - Slide
Slide 30 - Slide
Slide 31 - Slide
Which of the following is the most secure password option?
A
x509 certificate
B
Welkom2007
C
hI678gbCV#?$%:t:u7?3H%>-3tH(e3SksNr.b#
D
pointed-silica-womb-garden
Slide 32 - Quiz
Slide 33 - Slide
I can use my API key in multiple locations without security issues
A
Yes, API keys are secure by design
B
Yes, but only in related services
C
Nope, usage in multiple places gives a higher risk of a security breach
Slide 34 - Quiz
Slide 35 - Slide
To make account management easier I should create a single user for my whole team
A
Yes, this ensures that if people leave the team we still have the credentials
B
Yes, I can then easily onboard people by sharing the same password
C
No, because I don't like sharing
D
No, because this will hide who does what
Slide 36 - Quiz
Slide 37 - Slide
I only need to think about securing my API if and when I make it public
A
TRUE
B
FALSE
Slide 38 - Quiz
Slide 39 - Slide
Slide 40 - Slide
If I find a cool open source librarly I can use it without problems, as long as it has many github stars
A
True, many github stars mean that lots of people use it, so any issues wil be quickly fixed
B
False, I still need to review the code itself before using it
C
False, I also need to look at when the latest update has happened to make sure it is still up to date
Slide 41 - Quiz
Slide 42 - Slide
What flaw can lead to exposure of resources or functionality to unintended actors?
A
Improper Authentication
B
Session Fixation
C
Insecure Cryptographic Storage
D
Unvalidated Redirects and Forwards
Slide 43 - Quiz
Slide 44 - Slide
What security risk is GraphQL known for?
A
DoS attacks using expensive queries
B
Apollo Server having major security holes in major version releases
C
GraphQL doesn't support JWT tokens
D
Blabla, REST is better, blabla
Slide 45 - Quiz
Slide 46 - Slide
What information can you trust from a JWT you received?
A
The user ID
B
The expiration date
C
The algorithm that was used to sign it
D
Everything, as long as you validate the signature with your private key.
Slide 47 - Quiz
Slide 48 - Slide
What should you do to keep your Angular application up to date regarding security?
A
Nothing, Angular got you covered
B
Keep current with the latest Angular library releases
C
Use a 3rd party library
D
Don't modify your copy of Angular
Slide 49 - Quiz
Slide 50 - Slide
An unexpected result when two actions do not occur in the same order is called what?
A
De-referencing
B
A race condition
C
An insecure function
D
Improper error handling
Slide 51 - Quiz
Slide 52 - Slide
Logging is only meant to tell me my code is misbehaving
A
True, it is only written so a developer can see what is happening
B
False, it can also be used as a reporting tool
C
False, it can also give insights in common and unexpected usage of my code
Slide 53 - Quiz
Slide 54 - Slide
I should commit passwords with my code as my repository is protection enough
A
TRUE
B
FALSE
Slide 55 - Quiz
Slide 56 - Slide
I should provide as much information in my error message as possible
A
True, this makes debugging easier
B
False, this would make the payload larger than necessary
C
False, this might expose the behaviour of my code
Slide 57 - Quiz
Slide 58 - Slide
Which statement is true?
A
REST APIs should deny access by default, except public resources
B
JWT tokens can manually be invalidated
C
The following header is valid, “Access-Control-Alllow-origin: https://*.website.com”
D
Limit the rate of API access does not minimize the harm from automated attack tooling
Slide 59 - Quiz
Slide 60 - Slide
Slide 61 - Slide
Slide 62 - Slide
You just received an email that looks phishy, what do you do with it?
A
Report it to information-security-nl@incentro.com
B
Ignore it and throw it in the digital bin
C
Report it through the Google phishing report-button
D
Click all the available links to investigate where it came from so you can report them.
Slide 63 - Quiz
Slide 64 - Slide
You just received an email that looks phishy, and have clicked the link... now what?
A
Report it to information-security-nl@incentro.com
B
Ignore it and throw it in the digital bin
C
Report it through the Google phishing report-button
D
Click all the available links to investigate where it came from so you can report them.
Slide 65 - Quiz
Slide 66 - Slide
What is the most common cause of IT security breaches
A
Hackers
B
Code errors
C
Human behavior
D
Phishing emails
Slide 67 - Quiz
Slide 68 - Slide
Which threat vector is most commonly exploited by attackers who are at a distance
A
email
B
direct access
C
wireless
D
Removable media
Slide 69 - Quiz
Slide 70 - Slide
Which ones are valid web security vulnerabilities?
A
CSRF
B
XSS
C
UDP
D
SSRF
Slide 71 - Quiz
Slide 72 - Slide
What should you do to protect a React application against XSS attacks?
A
Sanitize all the user content strings you output
B
Nothing, React has built-in XSS protection
C
Throw an error if a user tries to input characters like `<>`
D
alert(1);
Slide 73 - Quiz
Slide 74 - Slide
Which signs should I check in order to recognize a phishing email?
A
The time it was sent
B
Content poorly written, often with misspelling
C
Including suspicious links and/or attachments
D
Sent by a wrong domain
Slide 75 - Quiz
Slide 76 - Slide
Spoofing a WiFi Access point is also called?
A
An evil twin attack
B
Pineapple attack
C
A keystroke Injection
D
Nmap scan Attack
Slide 77 - Quiz
Slide 78 - Slide
Slide 79 - Slide
To prevent an CSRF attack, an web application should?
A
Make sure that POST, PUT, PATCH & DELETE calls are idempotent
B
Transmit the CSRF token by only using cookies
C
Generate the CSRF token on the service-side and require a custom-HTTP-header per request
D
Only permit HTTPS requests
Slide 80 - Quiz
Slide 81 - Slide
Slide 82 - Slide
Which statement is true?
A
REST APIs should deny access by default, except public resources
B
JWT tokens can manually be invalidated
C
The following header is valid, “Access-Control-Alllow-origin: https://*.website.com”
D
Limit the rate of API access does not minimize the harm from automated attack tooling
Slide 83 - Quiz
Slide 84 - Slide
Slide 85 - Slide
Slide 86 - Slide
More lessons like this
Chapter 2: The Rule of Law
November 2024
-
95 slides
Maatschappijleer
Middelbare school
havo, vwo
Leerjaar 4
Seneca Burgerschap
Movies that Matter - Shadow Game EN (before watching movie) - v.a. vmbo-breed
April 2023
-
24 slides
Maatschappijleer
Burgerschapsonderwijs
+2
Middelbare school
MBO
vmbo, havo, vwo
Filmeducatie
Movies that Matter - Shadow Game EN (before watching movie) - MBO
April 2023
-
24 slides
Maatschappijleer
Burgerschapsonderwijs
+2
Middelbare school
MBO
vmbo, havo, vwo
Filmeducatie
Argumentative Essay - Introduction
August 2022
-
70 slides
Engels
Middelbare school
vwo
Leerjaar 4,6
2V Wider World unit 4 quantifiers & irr. verbs 56-70
June 2022
-
16 slides
Engels
Middelbare school
vwo
Leerjaar 2
Chapter 3: Democracy
November 2024
-
118 slides
Maatschappijleer
Middelbare school
havo
Leerjaar 5
Seneca Burgerschap
Nationale Opera & Ballet - Quiz 'Behind the scenes'
September 2025
-
19 slides
Kunst
Ckv
+2
Middelbare school
vmbo, mavo, havo, vwo
Leerjaar 1-6
Nationale Opera & Ballet
Introduction Essay Writing
August 2022
-
33 slides
Engels
Middelbare school
havo, vwo
Leerjaar 3,4