Login
Remember
Register
Ask a Question
Recent questions and answers in Cybersecurity Prologue
0
votes
1
answer
If a student gains unauthorized access to the student database and modifies his/her marks, what type of violation would it be?
answered
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
access-gain
0
votes
1
answer
Which of the following is a physiological biometric that could be used for authentication?
answered
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
physiological-biometric
0
votes
1
answer
A system set up to lure an attacker, to learn about attack methodologies, and to gather evidence of intruders.
answered
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
cyber-attack
0
votes
1
answer
An email security threat that occurs when a malicious user sends an email pretending to be someone you know is called ___________.
answered
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
email-security
0
votes
1
answer
What is the security attribute that ensures data and services are available to authorized users whenever required?
answered
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
security-attribute
0
votes
1
answer
An extension of RADIUS that provides access control for routers, network access servers, and other networked computing devices is called __________.
answered
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
radius-extension
0
votes
1
answer
Deployment in APTs is fully automated.
answered
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
api-deployment
0
votes
1
answer
A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is known as _________.
answered
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
cyber-security
0
votes
1
answer
The type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom is called __________.
answered
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
malware-access
0
votes
1
answer
_________ is a standalone software that does not need human help/host program to spread.
answered
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
security-software
0
votes
1
answer
The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security is called ___________.
answered
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
weaken-security
0
votes
1
answer
________ is designed to extract data from its host computer for marketing purposes.
answered
Dec 9, 2021
in
Cybersecurity Prologue
by
rajeshsharma
data-extraction
0
votes
1
answer
Programs that are specifically designed to disrupt the performance of computers/networks are commonly known as __________.
answered
Dec 9, 2021
in
Cybersecurity Prologue
by
rajeshsharma
disrupt-performance
+2
votes
1
answer
Which of these is true with respect to passwords?
answered
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+1
vote
1
answer
Which of these are examples biometrics?
answered
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
Which of these are Threats related to Email Security?
answered
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
ethical-hacking
cybersecurity
+1
vote
1
answer
SABSA Framework is commonly represented as _______ SABSA matrix.
answered
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
sassa-framework
+2
votes
1
answer
A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
answered
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called ___________.
answered
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+1
vote
1
answer
Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
answered
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
The type of attack in which the attacker intercepts the information in transit without altering it. Active Attack Passive Attack Invasive Attack
answered
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
As an application of cryptography, digital Signatures and MACs can be used for _____________.
answered
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
Which of the following is an attack against availability?
answered
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
Which of the following is a new method of spreading malware by injecting malicious or malware-laden advertisements into genuine online advertising networks and webpages?
answered
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __________.
answered
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
Help get things started by
asking a question
.
Recent questions and answers in Cybersecurity Prologue
...