Search Header Logo

CSF Practice 2 - Chapters 1 to 3

Information Technology (IT)

9th - 12th Grade

Used 1+ times

CSF Practice 2 - Chapters 1 to 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

38 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What are the three classification of hackers? Describe the characteristics of each classification.

Evaluate responses using AI:

OFF

Answer explanation

White, Gray, Black hats (Chapter 1 ppt 18)

White hat attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.

Gray hat attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.

Black hat attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.

2.

OPEN ENDED QUESTION

3 mins • 1 pt

What tools Criminals use to capture data streams over a network? How the tools work?

Evaluate responses using AI:

OFF

Answer explanation

packet-sniffing (Chapter 1 ppt 26)

Packet sniffers work by monitoring and recording all information coming across a network.

3.

OPEN ENDED QUESTION

3 mins • 1 pt

The Workforce Framework categorizes cybersecurity work into seven categories. What are the seven categories?

Evaluate responses using AI:

OFF

Answer explanation

Operate and Maintain (Chapter 1 ppt 38)

Protect and Defend

Investigate

Collect and Operate

Analyze

Oversight and Development

Securely Provision

4.

DROPDOWN QUESTION

1 min • 1 pt

​ ​ (a)   who may find a vulnerability and report it to the owners of the system if that action coincides with their agenda

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

5.

DROPDOWN QUESTION

1 min • 1 pt

(a)   who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

6.

DROPDOWN QUESTION

1 min • 1 pt

(a)   hackers who break into networks or computer systems to discover weaknesses in order to improve the security of these systems

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

7.

DROPDOWN QUESTION

1 min • 1 pt

(a)   having little or no skills, often using existing tools or instructions to launch attacks

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?