Evaluating two Approaches to Assessing Student Progress In Cybersecurity Exercises