Web Technologies
Android
Angular
BootStrap
ECMAScript
HTML
Image Processing
JavaScript
MVC
Onsen UI
React JS
SOAP UI
Vue.js
Cloud/DevOps Technologies
Amazon EC2
Ansible
Augmented Reality
AWS
Azure
Big Data
Cache Teachniques
Cassandra
Commercial Insurance
Cloud
CD
CI
Data Handling
Data using R
Data Science
DevOps
Gradle
Hadoop
HBase
HDFS
Hive
IOT
Jenkins
Machine Learning
MangoDB
NGINX
SOAP UI
Latest Technologies
5G Network
Agile
Android
Arduino
Augmented Reality
Commercial Insurance
C#
C++
Cyber Security
Data Handling
Data using R
Data Science
DBMS
Design-Pattern
Fortify
Ethical Hacking
Framework
GIT
GIT Slack
Image Processing
Java
Jenkins
Jira
JUnit
Kibana
Linux
MangoDB
Oracle
PHP
Python
QTP
R Language
Regression Analysis
Robotic
Salesforce
SAP
Selenium
Service Discovery
Service Now
Spark SQL
Testing
TOGAF
Research Method
Virtual Reality
Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions in Cyber Security
Home
Questions
Cyber Security
+1
vote
What is the difference between Diffie Hellman and RSA?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
diffie-hellman
rsa
+1
vote
What is Remote Desktop Protocol (RDP)?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
remote-desktop-protocol
+1
vote
What are the several indicators of compromise(IOC) that organizations should monitor?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
indicators-of-compromise
+1
vote
How to protect data in transit Vs rest?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
transit-vs-rest
+1
vote
What is the use of Address Resolution Protocol (ARP)?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
address-resolution-protocol
+1
vote
How to reset or remove the BIOS password?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
bios-password
+1
vote
What are the seven layers of the OSI model?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
osi-model
+1
vote
What is a cybersecurity risk assessment?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
cybersecurity
risk-assessment
+1
vote
Explain System hardening?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
system-hardening
+1
vote
what is the difference between the Red Team and the Blue team?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
red-team
+1
vote
What is the difference between a false positive and a false negative in IDS?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
faslse-negative
ids
+1
vote
What is the use of Patch Management?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
patch-management
+1
vote
What do you understand by compliance in Cybersecurity?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
cybersecurity
+1
vote
What is a DDOS attack and how to stop and prevent them?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
ddos-attack
+1
vote
How will you keep yourself updated with the latest cybersecurity news?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
cybersecurity
+1
vote
What is SQL injection and how it can be prevented?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
sql-injection
+1
vote
What is phishing and how it can be prevented?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
phisphing
+1
vote
What is cognitive security?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
cognitive-security
+1
vote
What is the difference between black hat, white hat, and grey hat hackers?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
hat-hackers
hat
+1
vote
Which is more secure SSL or HTTPS?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
ssl
http
cyber-security
+1
vote
What are the common methods of authentication for network security?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
cyber-security
+1
vote
What is Cryptography?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
19.8k
points)
cryptography
0
votes
Name of the Hacker who breaks the SIPRNET system?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
(
30.5k
points)
siprnet-system
0
votes
Which of the following known as the oldest phone hacking techniques used by hackers to make free calls?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
(
30.5k
points)
phone-hacking
0
votes
Which of the following is considered as the first hacker’s conference?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
(
30.5k
points)
hackers
0
votes
Which type following UNIX account provides all types of privileges and rights which one can perform administrative functions?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
(
30.5k
points)
linux-account
0
votes
Which one of the following is considered as the most secure Linux operating system that also provides anonymity and the incognito option for securing the user’s information?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
(
30.5k
points)
linux
0
votes
Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the fundamentals?
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
(
30.5k
points)
confidentiality
0
votes
In order to ensure the security of the data/ information, we need to ____________ the data:
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
(
30.5k
points)
data-information
+1
vote
In an any organization, company or firm the policies of information security come under__________.
asked
May 3, 2022
in
Cyber Security
by
sharadyadav1986
(
30.5k
points)
policies
Page:
1
2
3
4
...
8
next »
...