
CSF Practice 2 - Chapters 1 to 3

Quiz
•
Information Technology (IT)
•
9th - 12th Grade
•
Easy
Used 1+ times
FREE Resource
38 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
What are the three classification of hackers? Describe the characteristics of each classification.
Evaluate responses using AI:
OFF
Answer explanation
White, Gray, Black hats (Chapter 1 ppt 18)
White hat attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
Gray hat attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
Black hat attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
2.
OPEN ENDED QUESTION
3 mins • 1 pt
What tools Criminals use to capture data streams over a network? How the tools work?
Evaluate responses using AI:
OFF
Answer explanation
packet-sniffing (Chapter 1 ppt 26)
Packet sniffers work by monitoring and recording all information coming across a network.
3.
OPEN ENDED QUESTION
3 mins • 1 pt
The Workforce Framework categorizes cybersecurity work into seven categories. What are the seven categories?
Evaluate responses using AI:
OFF
Answer explanation
Operate and Maintain (Chapter 1 ppt 38)
Protect and Defend
Investigate
Collect and Operate
Analyze
Oversight and Development
Securely Provision
4.
DROPDOWN QUESTION
1 min • 1 pt
(a) who may find a vulnerability and report it to the owners of the system if that action coincides with their agenda
5.
DROPDOWN QUESTION
1 min • 1 pt
(a) who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks
6.
DROPDOWN QUESTION
1 min • 1 pt
(a) hackers who break into networks or computer systems to discover weaknesses in order to improve the security of these systems
7.
DROPDOWN QUESTION
1 min • 1 pt
(a) having little or no skills, often using existing tools or instructions to launch attacks
Create a free account and access millions of resources
Similar Resources on Wayground
40 questions
Pre test jaringan komputer dan internet

Quiz
•
10th Grade
41 questions
CYB 401: Software and Systems Security: Test 2

Quiz
•
12th Grade
40 questions
GAME INFORMATIKA 2425

Quiz
•
9th Grade
40 questions
Quiz sobre Escalonadores de Processos

Quiz
•
12th Grade - University
35 questions
TEST BANK: NETWORKS AND DIGITAL SECURITY

Quiz
•
9th - 12th Grade
35 questions
UH 2 Perlindungan Data Pribadi

Quiz
•
9th Grade - University
35 questions
SAS INFORMATIKA KELAS 9 SMPN 2 TULUNGAGUNG

Quiz
•
9th Grade
35 questions
Uji Pengetahuan Komputer

Quiz
•
10th Grade - University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
24 questions
Scientific method and variables review

Quiz
•
9th Grade
20 questions
Getting to know YOU icebreaker activity!

Quiz
•
6th - 12th Grade
10 questions
Impact of 9/11 and the War on Terror

Interactive video
•
10th - 12th Grade
20 questions
Biomolecules

Quiz
•
9th Grade
21 questions
Lab Safety

Quiz
•
10th Grade