
CSF Practice 2 - Chapters 1 to 3

Quiz
•
Information Technology (IT)
•
9th - 12th Grade
•
Easy
Used 1+ times
FREE Resource
38 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
What are the three classification of hackers? Describe the characteristics of each classification.
Evaluate responses using AI:
OFF
Answer explanation
White, Gray, Black hats (Chapter 1 ppt 18)
White hat attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
Gray hat attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
Black hat attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
2.
OPEN ENDED QUESTION
3 mins • 1 pt
What tools Criminals use to capture data streams over a network? How the tools work?
Evaluate responses using AI:
OFF
Answer explanation
packet-sniffing (Chapter 1 ppt 26)
Packet sniffers work by monitoring and recording all information coming across a network.
3.
OPEN ENDED QUESTION
3 mins • 1 pt
The Workforce Framework categorizes cybersecurity work into seven categories. What are the seven categories?
Evaluate responses using AI:
OFF
Answer explanation
Operate and Maintain (Chapter 1 ppt 38)
Protect and Defend
Investigate
Collect and Operate
Analyze
Oversight and Development
Securely Provision
4.
DROPDOWN QUESTION
1 min • 1 pt
(a) who may find a vulnerability and report it to the owners of the system if that action coincides with their agenda
5.
DROPDOWN QUESTION
1 min • 1 pt
(a) who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks
6.
DROPDOWN QUESTION
1 min • 1 pt
(a) hackers who break into networks or computer systems to discover weaknesses in order to improve the security of these systems
7.
DROPDOWN QUESTION
1 min • 1 pt
(a) having little or no skills, often using existing tools or instructions to launch attacks
Create a free account and access millions of resources
Similar Resources on Wayground
40 questions
Understanding Social Engineering Threats

Quiz
•
11th Grade
35 questions
TEST BANK: NETWORKS AND DIGITAL SECURITY

Quiz
•
9th - 12th Grade
41 questions
CYB 401: Software and Systems Security: Test 2

Quiz
•
12th Grade
35 questions
UH 2 Perlindungan Data Pribadi

Quiz
•
9th Grade - University
35 questions
SAS INFORMATIKA KELAS 9 SMPN 2 TULUNGAGUNG

Quiz
•
9th Grade
35 questions
Uji Pengetahuan Komputer

Quiz
•
10th Grade - University
40 questions
Pre test jaringan komputer dan internet

Quiz
•
10th Grade
40 questions
ET Unit 1 (HUMSS)

Quiz
•
11th Grade - University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
Discover more resources for Information Technology (IT)
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
40 questions
LSHS Student Handbook Review: Pages 7-9

Quiz
•
11th Grade
24 questions
Scientific method and variables review

Quiz
•
9th Grade
10 questions
Characteristics of Life

Quiz
•
9th - 10th Grade
19 questions
Mental Health Vocabulary Pre-test

Quiz
•
9th Grade