CETL Prep 2025 with 100% correct
answers already graded A+
Top 3 Tech Enablers from Next Report 2020 - answer Digital Collaboration
Environments, Untethered Broadband & Connectivity, Blended Learning Tools
3 main ideas from Essential Skills Framework - answer Aligning tech with dist
strategic goals, collaboration, needs assessments
Districts seeking to improve their security stance are advised to use a
combination of the following strategies to better support the use of
authentication credentials: - answer Leverage single sign-on
Multi-factor authentication
Implement a password management tool
Transition to passphrases
Set up student accounts to support cyber safety
Over 90% of cyberattacks start with what? - answer Phishing
Common types of phishing - answer Deceptive - seems legit
Spear - has your personal info
Superintendent Fraud - like CEO "Whaling"
Phishing Protection - answer Cloud mitigation (cloud services to scan traffic)
Monitor network
Data Loss Prevention Solutions (DLP) - answer Train end users in what data
they are responsible for protecting and how to handle data. • Use encryption
services for any data that needs to be sent via email. • Train staff on security
, procedures and ensure everyone feels confident they won't be punished for
protecting data. • Establish processes for what to do if a data breach occurs.
• Consider insurance to cover the cost of mitigating the damage in the case
a data breach should occur. • Consider getting a 3d party to audit your
security systems.
Ransomware Protection - answer Back up data on a separate server
What should schools do about cybersecurity? - answer Patch software,
abandon when obsolete
Train Everyone - security is everyone's job
Educate dist staff about social engineering
Make it clear whom to report to if suspicious
Password management
Practice/tabletop exercises
Consider an outside audit
Minimize staff ability to be compromized
Web-based - answer Requires an internet connection
Cloud-based - answer Processing is done on local machine, upoading and
downloading require internet connection
Change Management Process - answer Identify
Present solid case to stakeholders
Plan
Identify resources & funding
Communication (on-going)
Monitor Resistance, Dependencies, Risks
Celebrate Success
answers already graded A+
Top 3 Tech Enablers from Next Report 2020 - answer Digital Collaboration
Environments, Untethered Broadband & Connectivity, Blended Learning Tools
3 main ideas from Essential Skills Framework - answer Aligning tech with dist
strategic goals, collaboration, needs assessments
Districts seeking to improve their security stance are advised to use a
combination of the following strategies to better support the use of
authentication credentials: - answer Leverage single sign-on
Multi-factor authentication
Implement a password management tool
Transition to passphrases
Set up student accounts to support cyber safety
Over 90% of cyberattacks start with what? - answer Phishing
Common types of phishing - answer Deceptive - seems legit
Spear - has your personal info
Superintendent Fraud - like CEO "Whaling"
Phishing Protection - answer Cloud mitigation (cloud services to scan traffic)
Monitor network
Data Loss Prevention Solutions (DLP) - answer Train end users in what data
they are responsible for protecting and how to handle data. • Use encryption
services for any data that needs to be sent via email. • Train staff on security
, procedures and ensure everyone feels confident they won't be punished for
protecting data. • Establish processes for what to do if a data breach occurs.
• Consider insurance to cover the cost of mitigating the damage in the case
a data breach should occur. • Consider getting a 3d party to audit your
security systems.
Ransomware Protection - answer Back up data on a separate server
What should schools do about cybersecurity? - answer Patch software,
abandon when obsolete
Train Everyone - security is everyone's job
Educate dist staff about social engineering
Make it clear whom to report to if suspicious
Password management
Practice/tabletop exercises
Consider an outside audit
Minimize staff ability to be compromized
Web-based - answer Requires an internet connection
Cloud-based - answer Processing is done on local machine, upoading and
downloading require internet connection
Change Management Process - answer Identify
Present solid case to stakeholders
Plan
Identify resources & funding
Communication (on-going)
Monitor Resistance, Dependencies, Risks
Celebrate Success