CSF Practice 2 - Chapters 1 to 3

CSF Practice 2 - Chapters 1 to 3

9th - 12th Grade

38 Qs

quiz-placeholder

Similar activities

Google Sheet

Google Sheet

10th Grade - University

35 Qs

Latihan psat informatika kelas 11 2025

Latihan psat informatika kelas 11 2025

10th Grade - University

40 Qs

Introductory GIS Quiz

Introductory GIS Quiz

12th Grade

35 Qs

Latihan Soal Informatika Kelas X

Latihan Soal Informatika Kelas X

10th Grade

40 Qs

Latihan Soal Sistem Komputer - Kelas 7

Latihan Soal Sistem Komputer - Kelas 7

7th Grade - University

40 Qs

Latihan Soal Persiapan Olimpiade Informatika OSN-K 2025

Latihan Soal Persiapan Olimpiade Informatika OSN-K 2025

10th Grade

40 Qs

Y9_Pictoblox AI_FA

Y9_Pictoblox AI_FA

9th - 12th Grade

40 Qs

SAS GENAP KELAS XI TP 2024/2025

SAS GENAP KELAS XI TP 2024/2025

11th Grade

35 Qs

CSF Practice 2 - Chapters 1 to 3

CSF Practice 2 - Chapters 1 to 3

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Easy

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

38 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What are the three classification of hackers? Describe the characteristics of each classification.

Evaluate responses using AI:

OFF

Answer explanation

White, Gray, Black hats (Chapter 1 ppt 18)

White hat attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.

Gray hat attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.

Black hat attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.

2.

OPEN ENDED QUESTION

3 mins • 1 pt

What tools Criminals use to capture data streams over a network? How the tools work?

Evaluate responses using AI:

OFF

Answer explanation

packet-sniffing (Chapter 1 ppt 26)

Packet sniffers work by monitoring and recording all information coming across a network.

3.

OPEN ENDED QUESTION

3 mins • 1 pt

The Workforce Framework categorizes cybersecurity work into seven categories. What are the seven categories?

Evaluate responses using AI:

OFF

Answer explanation

Operate and Maintain (Chapter 1 ppt 38)

Protect and Defend

Investigate

Collect and Operate

Analyze

Oversight and Development

Securely Provision

4.

DROPDOWN QUESTION

1 min • 1 pt

​ ​ (a)   who may find a vulnerability and report it to the owners of the system if that action coincides with their agenda

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

5.

DROPDOWN QUESTION

1 min • 1 pt

(a)   who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

6.

DROPDOWN QUESTION

1 min • 1 pt

(a)   hackers who break into networks or computer systems to discover weaknesses in order to improve the security of these systems

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

7.

DROPDOWN QUESTION

1 min • 1 pt

(a)   having little or no skills, often using existing tools or instructions to launch attacks

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?