GenCyber is only as good as every camp is good.  Please take the time to answer these questions honestly and completely.  Thank you!

* 1. What sex are you?

* 2. What is your race?

* 3. Why did you come to this camp?

* 4. Is this the first GenCyber camp you have attended?

* 5. Have you participated in any other cybersecurity activities? 

* 6. Please tell us your level of agreement with the following:

  Strongly disagree Disagree Not Sure Agree Strongly agree
I can identify risks to my online security.
I can protect my online security.
I can identify risks to other people's online security.
I can protect other people's online security.
I am responsible for acting ethically online.
I know how to act ethically online.

* 7. Please tell us your level of agreement with the following:

  Strongly disagree Disagree Not sure Agree Strongly agree
I can identify the 10 Cybersecurity First Principles.
I can explain why each of the 10 Cybersecurity First Principles is important.
I can describe each of the 10 Cybersecurity First Principles to a friend who did not attend camp.

* 8. Please tell us your level of agreement with the following:

  Strongly disagree Disagree Not sure Agree  Strongly Agree
I learned a lot about cybersecurity.
I enjoyed learning about cybersecurity.
I would like to learn more about cybersecurity.

* 9. Please tell us your level of agreement with the following:

  Strongly disagree Disagree Not sure Agree Strongly agree
Given a chance to attend another cybersecurity camp, I would.
Given a chance to learn more about cybersecurity, I would. 
Given a chance to participate in another activity about cybersecurity, I would. 

* 10. Please tell us your level of agreement with the following:

  Strongly disagree Disagree Not sure Agree Strongly agree
Now that I have come to camp, I intend to learn more about what it takes to have a career in cybersecurity. 
Now that I have come to camp, I intend to try to find more cybersecurity activities that I can take part in. 
Now that I have come to camp, I intend to seek out more cybersecurity information.
Before I came to this camp I was thinking about a career in cybersecurity. 
This camp has made me more likely to pursue a career in cybersecurity

* 11. Please tell us your level of agreement with the following:

  Strongly disagree Disagree Not sure  Agree Strongly agree
The teachers in this camp helped me learn cybersecurity.
My opinions and ideas were respected in this camp.
I enjoyed the projects and activities at this camp.
This camp was well organized. 
I am glad I attended this camp

* 12. My favorite thing about this camp was ___________________

* 13. The thing I disliked most about this camp was ___________________

* 14. The camp would be better if ___________________

* 15. How did you hear about this camp? Please select all that apply

* 16. Which security principle best fits this scenario? The www.google.com front page has very options making it very easy to use.

* 17. Information hiding is any attempt to prevent people from seeing or accessing information. Which below provide information hiding?

* 18. Domain separation is the concept of separating information or resources that don't belong together, that may interfere with one another, or separating information by level of security (example: unclassified, secret, and top secret). Which is an example of domain separation?  Select all that apply.



* 19. Which security principle best fits this scenario.  In cyber security, one of the best ways to protect a computer is with a strategy called defense in depth which means there are multiple defenses put in place and when one fails others remain to defend the computer. 

* 20. Which security principle best fits this scenario? When logging into a computer it is a good practice to do so as a regular user instead of an administrator.


* 21. Which security principle best fits this scenario.  Many computers are built with parts that can easily be taken out and replaced.

* 22. Which account has access to all commands and files in Linux?

* 23. Which security principle best fits this scenario? You are running two programs on a computer. One program crashes, but, the other program continues to run.


* 24. Separating and using hardware, system objects, or processes as intended is:

* 25. What is social engineering?

* 26. What is a spear phishing attack?

* 27. Which is a type of malicious software designed to encrypt files on a computer until a sum of money is paid.

* 28. What can help to identify a social engineering attack?

* 29. A simple system is easier to understand and easier to maintain and secure. Which is the simplest system?

* 30. The goal of minimization is to simplify and decrease the complexity of a system. True or false; minimizing the number of users on a computer makes it more secure?

Report a problem

T