CSF Practice 2 - Chapters 1 to 3

CSF Practice 2 - Chapters 1 to 3

9th - 12th Grade

38 Qs

quiz-placeholder

Similar activities

Quiz Xll-TKJ tentang Antivirus dan Keamanan Jaringan

Quiz Xll-TKJ tentang Antivirus dan Keamanan Jaringan

12th Grade - University

40 Qs

Computer Security Risks: Prevention & Mitigation Quiz

Computer Security Risks: Prevention & Mitigation Quiz

12th Grade

33 Qs

sistem komputer

sistem komputer

9th Grade

40 Qs

UH 2 Perlindungan Data Pribadi

UH 2 Perlindungan Data Pribadi

9th Grade - University

35 Qs

SAS INFORMATIKA KELAS 9 SMPN 2 TULUNGAGUNG

SAS INFORMATIKA KELAS 9 SMPN 2 TULUNGAGUNG

9th Grade

35 Qs

Uji Pengetahuan Komputer

Uji Pengetahuan Komputer

10th Grade - University

35 Qs

Pengantar Perangkat Keras dan Sistem Operasi

Pengantar Perangkat Keras dan Sistem Operasi

9th Grade

37 Qs

TEST BANK: NETWORKS AND DIGITAL SECURITY

TEST BANK: NETWORKS AND DIGITAL SECURITY

9th - 12th Grade

35 Qs

CSF Practice 2 - Chapters 1 to 3

CSF Practice 2 - Chapters 1 to 3

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Easy

Used 1+ times

FREE Resource

38 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What are the three classification of hackers? Describe the characteristics of each classification.

Evaluate responses using AI:

OFF

Answer explanation

White, Gray, Black hats (Chapter 1 ppt 18)

White hat attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.

Gray hat attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.

Black hat attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.

2.

OPEN ENDED QUESTION

3 mins • 1 pt

What tools Criminals use to capture data streams over a network? How the tools work?

Evaluate responses using AI:

OFF

Answer explanation

packet-sniffing (Chapter 1 ppt 26)

Packet sniffers work by monitoring and recording all information coming across a network.

3.

OPEN ENDED QUESTION

3 mins • 1 pt

The Workforce Framework categorizes cybersecurity work into seven categories. What are the seven categories?

Evaluate responses using AI:

OFF

Answer explanation

Operate and Maintain (Chapter 1 ppt 38)

Protect and Defend

Investigate

Collect and Operate

Analyze

Oversight and Development

Securely Provision

4.

DROPDOWN QUESTION

1 min • 1 pt

​ ​ (a)   who may find a vulnerability and report it to the owners of the system if that action coincides with their agenda

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

5.

DROPDOWN QUESTION

1 min • 1 pt

(a)   who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

6.

DROPDOWN QUESTION

1 min • 1 pt

(a)   hackers who break into networks or computer systems to discover weaknesses in order to improve the security of these systems

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

7.

DROPDOWN QUESTION

1 min • 1 pt

(a)   having little or no skills, often using existing tools or instructions to launch attacks

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?