Categories
5G Network
Agile
Amazon EC2
Android
Angular
Ansible
Arduino
Artificial Intelligence
Augmented Reality
AWS
Azure
Big Data
Blockchain
BootStrap
Cache Teachniques
Cassandra
Commercial Insurance
C#
C++
Cloud
CD
CI
Cyber Security
Data Handling
Data using R
Data Science
DBMS
Design-Pattern
DevOps
ECMAScript
Fortify
Ethical Hacking
Framework
GIT
GIT Slack
Gradle
Hadoop
HBase
HDFS
Hibernate
Hive
HTML
Image Processing
IOT
JavaScript
Java
Jenkins
Jira
JUnit
Kibana
Linux
Machine Learning
MangoDB
MVC
NGINX
Onsen UI
Oracle
PHP
Python
QTP
R Language
Regression Analysis
React JS
Robotic
Salesforce
SAP
Selenium
Service Discovery
Service Now
SOAP UI
Spark SQL
Testing
TOGAF
Research Method
Virtual Reality
Vue.js
Home
Recent Q&A
Feedback
Ask a Question
A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
Home
>
Ethical Hacking
>
A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
Q:
A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
Malicious threats
Advanced Persistent Threats
Hidden Threats
Invisible Threats
Answer
1
Answer
0
votes
answered
Jan 28, 2020
by
AdilsonLima
Advanced Persistent Threats
Click here to read more about Loan/Mortgage
Click here to read more about Insurance
Facebook
Twitter
LinkedIn
Related questions
0
votes
Q: _________ is commonly known for providing backdoor access to the system for malicious users.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Caching Technique where cache is populated the first time a certain piece of data is requested is called _________.
asked
Jul 1, 2020
in
Cache Technique
by
Robindeniel
#cache-technique
#cache-data
#data-cache
+1
vote
Q: You are using an S3 bucket through which you are running a photo sharing website. It is found that some of other sites owners also using your bucket URL and causing a loss to your business. How will you protect your buckets content from unauthorized usage?
asked
May 9, 2020
by
SakshiSharma
#aws
+1
vote
Q: A framework that utilizes a Network Policy Server is called __________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: _________ is an implementation of partitioning where you can send your q ery to a random instance
asked
Feb 16, 2020
in
JAVA
by
rahuljain1
#query-instance
0
votes
Q: Which of the following is an attack against confidentiality?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: Which of the following is an attack against availability?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: When there is a large set of data and you want to retrieve a small set of data. What is the concept called?
asked
Oct 25, 2020
in
Hive
by
rahuljain1
#large-set-of-data
#hive-dataset
0
votes
Q: When there is a large set of data and you want to retrieve a small set of data. What is the concept called?
asked
Jan 31, 2020
in
Cassandra
by
MBarbieri
#cassandra-concept
+1
vote
Q: Is there any network specific conditions for using Blockchain technology in an organization?
asked
Feb 20, 2020
in
BlockChain
by
rahuljain1
#blockchain-technology
0
votes
Q: Is there any network specific conditions for using Blockchain technology in an organization?
asked
Jan 18, 2020
in
BlockChain
by
SakshiSharma
#blockchain-organization
0
votes
Q: A person crosses a 600 m long street in 5 minutes. What is his speed in km per hour?
asked
Oct 31, 2019
in
Other
by
MBarbieri
0
votes
Q: A person crosses a 600 m long street in 5 minutes. What is his speed in km per hour?
asked
Oct 31, 2019
in
Other
by
AdilsonLima
#generalknowledge
0
votes
Q: A person goes from A to B at the speed of 40 kmph and comes back at the speed of 60 kmph. What is his average speed for the whole journey?
asked
Oct 31, 2019
in
Other
by
MBarbieri
0
votes
Q: Which of the following attack method aims to gather confidential information by deceiving the victim in cybersecrity?
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#cybersecurity
#etihcalhacking
0
votes
Q: Which of the following attack method aims to gather confidential information by deceiving the victim?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
ethical-hacking
+1
vote
Q: What's a denial of service (DOS) attack
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
denial-of-service
0
votes
Q: Is it possible to restrict the premium payment for a lesser number of years than the duration of thepolicy in Insurance?
asked
Jul 3, 2020
in
Insurance
by
Robindeniel
#insurance-payments
#insurance-duration
#duration-insurance
#payments-insurance
0
votes
Q: A person walking at 4 Kmph reaches his office 8 minutes late. If he walks at 6 Kmph, he reaches there 8 minutes earlier. How far is the office from his house?
asked
Oct 31, 2019
in
Other
by
AdilsonLima
#aptitude
0
votes
Q: What kind of files or nodes /dev/ directory contains and how do I access or see device files?
asked
Aug 31, 2019
in
Linux
by
Robin
#linux
#linux-log
#linux-dedicated-web-hosting
#load-balancing-software-linux
#linux-http-file-server
#linux-vps-hosting-comparison
#linux-ip-pbx
#linux-iscsi-server
#linux-backup-appliance
#linux-monitoring-web
#sql-server-in-linux
#network-testing-tools-linux
#what-is-audit-log-in-linux
#vmware-view-linux-client
#linux-backup-and-restore-commands
#linux-file-permissions
#hyper-v-manager-for-linux
#linux-certification
#linux-training
#linux-tutorial
+1
vote
Q: A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called ___________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: A metal ‘X’ loses two electrons and a non-metal ‘Y’ gains one electron. Show the electron dot structure of compound formed between them. Is ionic or covalent? Does it have high melting point or low? Will it conduct electricity in solid state or in aqueous solution and why?
asked
May 17, 2019
in
Other
by
Derya
#metal
#non-metal
0
votes
Q: An express train travelled at an average speed of 100 km/hr, stopping for 3 minutes after every 75 km. How long did it take to reach its destination 600 km from the starting point?
asked
Oct 31, 2019
in
Other
by
AdilsonLima
0
votes
Q: What does the three color indicates tracking times or duration for an issue in JIRA?
asked
Sep 30, 2019
in
JIRA
by
Robin
three-color
jira-three-color
jira-indication
jira-time-tracking
+1
vote
Q: The type of attack in which the attacker intercepts the information in transit without altering it. Active Attack Passive Attack Invasive Attack
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Denial of service (DOS) attack
asked
Oct 14, 2019
in
Ethical Hacking
by
GeorgeBell
#ethical-hacker-career
##ethical-hacker-books
#ethical-hacker-forums
#ethical-hacker-curso
#ethical-hacker-software
#ethical-hacker-certification
#ethical-hacker-question
+1
vote
Q: The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Scenarios where client takes onus & are responsible for determining the network locations of available service instances
asked
Feb 4, 2020
in
Agile
by
timbroom
+1
vote
Q: The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
...