
CSF Practice 2 - Chapters 1 to 3
Quiz
•
Information Technology (IT)
•
9th - 12th Grade
•
Easy
Used 1+ times
FREE Resource
Enhance your content in a minute
38 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
What are the three classification of hackers? Describe the characteristics of each classification.
Evaluate responses using AI:
OFF
Answer explanation
White, Gray, Black hats (Chapter 1 ppt 18)
White hat attackers break into networks or computer systems to discover weaknesses in order to improve the security of these systems.
Gray hat attackers are somewhere between white and black hat attackers. The gray hat attackers may find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
Black hat attackers are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks.
2.
OPEN ENDED QUESTION
3 mins • 1 pt
What tools Criminals use to capture data streams over a network? How the tools work?
Evaluate responses using AI:
OFF
Answer explanation
packet-sniffing (Chapter 1 ppt 26)
Packet sniffers work by monitoring and recording all information coming across a network.
3.
OPEN ENDED QUESTION
3 mins • 1 pt
The Workforce Framework categorizes cybersecurity work into seven categories. What are the seven categories?
Evaluate responses using AI:
OFF
Answer explanation
Operate and Maintain (Chapter 1 ppt 38)
Protect and Defend
Investigate
Collect and Operate
Analyze
Oversight and Development
Securely Provision
4.
DROPDOWN QUESTION
1 min • 1 pt
(a) who may find a vulnerability and report it to the owners of the system if that action coincides with their agenda
5.
DROPDOWN QUESTION
1 min • 1 pt
(a) who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks
6.
DROPDOWN QUESTION
1 min • 1 pt
(a) hackers who break into networks or computer systems to discover weaknesses in order to improve the security of these systems
7.
DROPDOWN QUESTION
1 min • 1 pt
(a) having little or no skills, often using existing tools or instructions to launch attacks
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
34 questions
SMR SegInf quiz Malware, criptografía, WiFi
Quiz
•
10th Grade
39 questions
4.1-4.3 Questions
Quiz
•
9th Grade
39 questions
E-TECH MODULE 1
Quiz
•
11th Grade
36 questions
Programming Constructs, Procedures and Functions
Quiz
•
11th Grade
35 questions
SAS GENAP KELAS X TP 2024/2025
Quiz
•
10th Grade
40 questions
Quiz Animasi 2 Dimensi
Quiz
•
12th Grade
41 questions
Content Creation Tip, Tricks & Strategies
Quiz
•
9th - 12th Grade
34 questions
REMEDIAL X MERDEKA SMAS FATAHILLAH
Quiz
•
10th Grade
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
Discover more resources for Information Technology (IT)
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
20 questions
Halloween movies trivia
Quiz
•
7th - 12th Grade
15 questions
Halloween Characters
Quiz
•
7th - 12th Grade
10 questions
Halloween Movies Trivia
Quiz
•
5th Grade - University
10 questions
Halloween Trivia Challenge
Interactive video
•
6th - 10th Grade
10 questions
Understanding Meiosis
Interactive video
•
6th - 10th Grade
11 questions
Halloween Trivia #2
Quiz
•
12th Grade
14 questions
Halloween Fun
Quiz
•
2nd - 12th Grade
