CSF Practice 2 - Chapters 1 to 3

CSF Practice 2 - Chapters 1 to 3

9th - 12th Grade

38 Qs

quiz-placeholder

Similar activities

Tech+ 4.3

Tech+ 4.3

10th Grade

39 Qs

IT Webxam Practice Test #2

IT Webxam Practice Test #2

12th Grade

40 Qs

Ulangan Harian Mapel DPK TJKT Kls X TKJ 3 Gel.1

Ulangan Harian Mapel DPK TJKT Kls X TKJ 3 Gel.1

10th Grade

36 Qs

BSFC IT Taster Session Quiz

BSFC IT Taster Session Quiz

9th - 10th Grade

39 Qs

DAMPAK SOSIAL INFORMATIKA KELAS 9

DAMPAK SOSIAL INFORMATIKA KELAS 9

9th Grade

43 Qs

Computer System Servicing Quiz

Computer System Servicing Quiz

10th Grade

40 Qs

Systems Administration -2

Systems Administration -2

9th Grade - University

35 Qs

CSF Practice 2 - Chapters 1 to 3

CSF Practice 2 - Chapters 1 to 3

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Easy

Used 1+ times

FREE Resource

38 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What are the three classification of hackers? Describe the characteristics of each classification.

Evaluate responses using AI:

OFF

Answer explanation

White, Gray, Black hats (Chapter 1 ppt 18)

White hat attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.

Gray hat attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.

Black hat attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.

2.

OPEN ENDED QUESTION

3 mins • 1 pt

What tools Criminals use to capture data streams over a network? How the tools work?

Evaluate responses using AI:

OFF

Answer explanation

packet-sniffing (Chapter 1 ppt 26)

Packet sniffers work by monitoring and recording all information coming across a network.

3.

OPEN ENDED QUESTION

3 mins • 1 pt

The Workforce Framework categorizes cybersecurity work into seven categories. What are the seven categories?

Evaluate responses using AI:

OFF

Answer explanation

Operate and Maintain (Chapter 1 ppt 38)

Protect and Defend

Investigate

Collect and Operate

Analyze

Oversight and Development

Securely Provision

4.

DROPDOWN QUESTION

1 min • 1 pt

​ ​ (a)   who may find a vulnerability and report it to the owners of the system if that action coincides with their agenda

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

5.

DROPDOWN QUESTION

1 min • 1 pt

(a)   who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

6.

DROPDOWN QUESTION

1 min • 1 pt

(a)   hackers who break into networks or computer systems to discover weaknesses in order to improve the security of these systems

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

7.

DROPDOWN QUESTION

1 min • 1 pt

(a)   having little or no skills, often using existing tools or instructions to launch attacks

White Hat Hackers
Black Hat Hackers
Script Kiddies
Gray Hat Hackers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?