Jade Kennedy
Quiz von , erstellt am more than 1 year ago

Information Technology Quiz am Xtreme Ice (Cyber Range) Pitch Quiz, erstellt von Jade Kennedy am 22/01/2018.

18
0
0
Jade Kennedy
Erstellt von Jade Kennedy vor fast 7 Jahre
Schließen

Xtreme Ice (Cyber Range) Pitch Quiz

Frage 1 von 5

1

Xtreme Ice Cyber Range enables organizations to experience attack scenarios in a hyper-realistic simulated environment.

Wähle eins der folgenden:

  • WAHR
  • FALSCH

Erklärung

Frage 2 von 5

1

What are Xtreme Ice (Cyber Range) three core competencies?

Wähle eine der folgenden:

  • 1. Support for Training
    2. Cyber Security
    3. Complex Attack Simulation

  • 1. Support for Training
    2. Customizable Environment
    3. Complex Attack Simulation

  • 1. Information Technology
    2. Cyber Security
    3. Telecommunications

  • 1. Telecommunications
    2. Customizable Environment
    3. Complex Attack Simulation

Erklärung

Frage 3 von 5

1

Xtreme Ice support for training includes:

Wähle eine der folgenden:

  • Skills validation and Testing for industry standard certifications

  • Graduate studies

  • Undergraduate studies

  • Doctorate studies

Erklärung

Frage 4 von 5

1

Xtreme Ice (Cyber Range) customizable environment includes:

Wähle eine der folgenden:

  • 1. New or replicated environments
    2. Plan new or analyze present attacks

  • 1. New or replicated environments
    2. Plan new or analyze past attacks

  • 1. New or counterfeit environments
    2. Plan new or analyze past attacks

  • 1. New or replicated environments
    2. Plan new or analyze current attacks

Erklärung

Frage 5 von 5

1

Xtreme Ice Cyber Range complex simulation includes:

Wähle eine der folgenden:

  • 1. Research and Development, Testing, and evaluation
    2. Engineering validation

  • 1. Research and Development, Testing, and evaluation
    2. Software and hardware validation

  • 1. Experiment, Simulation, and Theory
    2. Software and hardware validation

  • 1. Experiment, Simulation, and Theory
    2. Engineering validation

Erklärung