Categories
5G Network
Agile
Amazon EC2
Android
Angular
Ansible
Arduino
Artificial Intelligence
Augmented Reality
AWS
Azure
Big Data
Blockchain
BootStrap
Cache Teachniques
Cassandra
Commercial Insurance
C#
C++
Cloud
CD
CI
Cyber Security
Data Handling
Data using R
Data Science
DBMS
Design-Pattern
DevOps
ECMAScript
Fortify
Ethical Hacking
Framework
GIT
GIT Slack
Gradle
Hadoop
HBase
HDFS
Hibernate
Hive
HTML
Image Processing
IOT
JavaScript
Java
Jenkins
Jira
JUnit
Kibana
Linux
Machine Learning
MangoDB
MVC
NGINX
Onsen UI
Oracle
PHP
Python
QTP
R Language
Regression Analysis
React JS
Robotic
Salesforce
SAP
Selenium
Service Discovery
Service Now
SOAP UI
Spark SQL
Testing
TOGAF
Research Method
Virtual Reality
Vue.js
Home
Recent Q&A
Feedback
Ask a Question
Top 100+ questions and answers in Ethical Hacking
Home
>
Top 100+ questions and answers in Ethical Hacking
+3
votes
Q: Which of the following can be considered as an effective solution to ensure integrity?
answered
Dec 3, 2020
in
Ethical Hacking
by
sharadyadav1986
#abstraction
0
votes
Q: An error message displayed on the system symbolizes virus infection.
answered
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#ethicalhacking
#virus
0
votes
Q: Hash functions can be leveraged to ensure ________.
answered
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#ethicalhacking
0
votes
Q: As an application of cryptography, digital Signatures and MACs can be used for_____________.
answered
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#mac
0
votes
Q: Which of the following attack method aims to gather confidential information by deceiving the victim in cybersecrity?
answered
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#cybersecurity
#etihcalhacking
0
votes
Q: Threats can exploit assets if assets are not vulnerable in cybersecurity?
answered
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#threats
#cybersecurity
+1
vote
Q: What is the common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security?
answered
Feb 10, 2020
in
Ethical Hacking
by
anonymous
+1
vote
Q: The telephone version of phishing that exploits social engineering techniques is known as __________.
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: A framework that utilizes a Network Policy Server is called __________.
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
network-policy
framework
network-framework
+1
vote
Q: Which of these is true with respect to passwords?
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Which of these are examples biometrics?
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: Phishing emails include fake notifications from banks and e-payment systems.
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: Which of these are Threats related to Email Security?
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
ethical-hacking
+1
vote
Q: A proactive process to predict potential risks efficiently.
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: SABSA Framework is commonly represented as _______ SABSA matrix.
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called ___________.
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Which of the following are the three phases of Incident response maturity assessment?
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Which of the following is an attack against confidentiality?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: Hash functions can be leveraged to ensure ________.
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: Which of the following attributes is not a PII?
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: The type of attack in which the attacker intercepts the information in transit without altering it. Active Attack Passive Attack Invasive Attack
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: The security posture of an organization is defined by the ______ link in the chain. Strongest Average Weakest
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
Q: Which of the following attack method aims to gather confidential information by deceiving the victim?
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
ethical-hacking
+1
vote
Q: What is PUP?
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: A pharming tactic in which the DNS table in a server is modified to deceive users by redirecting to fraudulent websites.
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
Q: As an application of cryptography, digital Signatures and MACs can be used for _____________.
answered
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
Facebook
Twitter
LinkedIn
Reddit
To see more, click for all the
questions in this category
.
...