
CSF Practice 2 - Chapters 1 to 3
Information Technology (IT)
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
38 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
What are the three classification of hackers? Describe the characteristics of each classification.
Evaluate responses using AI:
OFF
Answer explanation
White, Gray, Black hats (Chapter 1 ppt 18)
White hat attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
Gray hat attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
Black hat attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
2.
OPEN ENDED QUESTION
3 mins • 1 pt
What tools Criminals use to capture data streams over a network? How the tools work?
Evaluate responses using AI:
OFF
Answer explanation
packet-sniffing (Chapter 1 ppt 26)
Packet sniffers work by monitoring and recording all information coming across a network.
3.
OPEN ENDED QUESTION
3 mins • 1 pt
The Workforce Framework categorizes cybersecurity work into seven categories. What are the seven categories?
Evaluate responses using AI:
OFF
Answer explanation
Operate and Maintain (Chapter 1 ppt 38)
Protect and Defend
Investigate
Collect and Operate
Analyze
Oversight and Development
Securely Provision
4.
DROPDOWN QUESTION
1 min • 1 pt
(a) who may find a vulnerability and report it to the owners of the system if that action coincides with their agenda
5.
DROPDOWN QUESTION
1 min • 1 pt
(a) who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks
6.
DROPDOWN QUESTION
1 min • 1 pt
(a) hackers who break into networks or computer systems to discover weaknesses in order to improve the security of these systems
7.
DROPDOWN QUESTION
1 min • 1 pt
(a) having little or no skills, often using existing tools or instructions to launch attacks
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
38 questions
Tech+ 4.1 Open Book Questions
Quiz
•
10th Grade
35 questions
Computer Hardware Quiz
Quiz
•
9th - 12th Grade
40 questions
Soal PTS Genap 24/25 Informatika
Quiz
•
10th Grade
40 questions
Asesmen Semester Ganjil 2024 Kelas XII TKJ
Quiz
•
12th Grade
40 questions
Kiểm tra học kì II
Quiz
•
12th Grade - University
40 questions
Grade 11 Week 2 Quiz
Quiz
•
11th Grade - University
35 questions
ASESMEN AKHIR SEMESTER GANJIL TP 2024-2025 INFORMATIKA KELAS X
Quiz
•
10th Grade
33 questions
CSS 12 Week 1 PETA 1
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
20 questions
El Verbo IR Practice
Quiz
•
9th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
10 questions
Cell Organelles and Their Functions
Interactive video
•
6th - 10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
20 questions
Combining Sentences
Lesson
•
9th Grade
22 questions
El Imperfecto
Quiz
•
9th - 12th Grade
20 questions
Box and Whisker Plots
Quiz
•
9th Grade