CSF Practice 2 - Chapters 1 to 3

CSF Practice 2 - Chapters 1 to 3

9th - 12th Grade

38 Qs

quiz-placeholder

Similar activities

SeguridadInformaticaBasicaMod5

SeguridadInformaticaBasicaMod5

12th Grade

33 Qs

Basics of Web Design Test

Basics of Web Design Test

9th Grade

40 Qs

Computer Graphics and Infographics Quiz

Computer Graphics and Infographics Quiz

11th Grade

35 Qs

Quiz Informatika SMP

Quiz Informatika SMP

9th Grade - University

35 Qs

Mikrotik

Mikrotik

12th Grade

40 Qs

Hak Kekayaan Intelektual dalam Informatika

Hak Kekayaan Intelektual dalam Informatika

11th Grade

40 Qs

untitled

untitled

3rd Grade - University

35 Qs

Communication and Literacy Quiz

Communication and Literacy Quiz

12th Grade - University

40 Qs

CSF Practice 2 - Chapters 1 to 3

CSF Practice 2 - Chapters 1 to 3

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Easy

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

38 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What are the three classification of hackers? Describe the characteristics of each classification.

Evaluate responses using AI:

OFF

Answer explanation

White, Gray, Black hats (Chapter 1 ppt 18)

White hat attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.

Gray hat attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.

Black hat attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.

2.

OPEN ENDED QUESTION

3 mins • 1 pt

What tools Criminals use to capture data streams over a network? How the tools work?

Evaluate responses using AI:

OFF

Answer explanation

packet-sniffing (Chapter 1 ppt 26)

Packet sniffers work by monitoring and recording all information coming across a network.

3.

OPEN ENDED QUESTION

3 mins • 1 pt

The Workforce Framework categorizes cybersecurity work into seven categories. What are the seven categories?

Evaluate responses using AI:

OFF

Answer explanation

Operate and Maintain (Chapter 1 ppt 38)

Protect and Defend

Investigate

Collect and Operate

Analyze

Oversight and Development

Securely Provision

4.

DROPDOWN QUESTION

1 min • 1 pt

​ ​ (a)   who may find a vulnerability and report it to the owners of the system if that action coincides with their agenda

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

5.

DROPDOWN QUESTION

1 min • 1 pt

(a)   who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

6.

DROPDOWN QUESTION

1 min • 1 pt

(a)   hackers who break into networks or computer systems to discover weaknesses in order to improve the security of these systems

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

7.

DROPDOWN QUESTION

1 min • 1 pt

(a)   having little or no skills, often using existing tools or instructions to launch attacks

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?