Jade Kennedy
Quiz by , created more than 1 year ago

Information Technology Quiz on Xtreme Ice (Cyber Range) Pitch Quiz, created by Jade Kennedy on 22/01/2018.

18
0
0
Jade Kennedy
Created by Jade Kennedy almost 7 years ago
Close

Xtreme Ice (Cyber Range) Pitch Quiz

Question 1 of 5

1

Xtreme Ice Cyber Range enables organizations to experience attack scenarios in a hyper-realistic simulated environment.

Select one of the following:

  • True
  • False

Explanation

Question 2 of 5

1

What are Xtreme Ice (Cyber Range) three core competencies?

Select one of the following:

  • 1. Support for Training
    2. Cyber Security
    3. Complex Attack Simulation

  • 1. Support for Training
    2. Customizable Environment
    3. Complex Attack Simulation

  • 1. Information Technology
    2. Cyber Security
    3. Telecommunications

  • 1. Telecommunications
    2. Customizable Environment
    3. Complex Attack Simulation

Explanation

Question 3 of 5

1

Xtreme Ice support for training includes:

Select one of the following:

  • Skills validation and Testing for industry standard certifications

  • Graduate studies

  • Undergraduate studies

  • Doctorate studies

Explanation

Question 4 of 5

1

Xtreme Ice (Cyber Range) customizable environment includes:

Select one of the following:

  • 1. New or replicated environments
    2. Plan new or analyze present attacks

  • 1. New or replicated environments
    2. Plan new or analyze past attacks

  • 1. New or counterfeit environments
    2. Plan new or analyze past attacks

  • 1. New or replicated environments
    2. Plan new or analyze current attacks

Explanation

Question 5 of 5

1

Xtreme Ice Cyber Range complex simulation includes:

Select one of the following:

  • 1. Research and Development, Testing, and evaluation
    2. Engineering validation

  • 1. Research and Development, Testing, and evaluation
    2. Software and hardware validation

  • 1. Experiment, Simulation, and Theory
    2. Software and hardware validation

  • 1. Experiment, Simulation, and Theory
    2. Engineering validation

Explanation