Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Cyber Security Interview Questions and Answers
Home
Questions
Cyber Security
+1
vote
Q: As an email client, we should not use caution when opening emails and can download any
asked
Oct 23, 2021
in
Cyber Security
by
john ganales
download-attachment
0
votes
Q: How do we define RADIUS?
asked
Oct 23, 2021
in
Cyber Security
by
john ganales
radius
0
votes
Q: Which of the following malware is designed for advertising, such as pop-up screens?
asked
Oct 23, 2021
in
Cyber Security
by
john ganales
malware
0
votes
Q: Threats can exploit assets if assets are not vulnerable.
asked
Oct 23, 2021
in
Cyber Security
by
john ganales
cyber-threats
+1
vote
Q: The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.
asked
Oct 23, 2021
in
Cyber Security
by
john ganales
cryptography
0
votes
Q: Define various codes from a web application in term of cyber security?
asked
Oct 23, 2021
in
Cyber Security
by
john ganales
cyber-security-codes
0
votes
Q: Hardware or Software that prevents outsiders from obtaining unauthorized access to the internal information resource is
asked
Oct 23, 2021
in
Cyber Security
by
john ganales
unauthorized-access
+2
votes
Q: Where can responses be viewed in Burp Suite?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
burp-suite
burp
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: The \’\’HTTP History Tab\’\’ captures all host URLs.
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
history
burp
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: Which of the following can execute all the possible combination of attacks?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
attacks
cyber-attacks
cyber-security
burp
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: You can check the response in Intercept tab.
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
intercept-tab
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+2
votes
Q: What is the task of the Comment control when intercepting a Burp Suite request?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
comment-contol
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
Q: What are the tasks related to Burp Proxy for intercepting and manipulating the request?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
burp-proxy
cyber-security
+1
vote
Q: What happens when Intercept is off?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
burp-repeater
cyber-security
+1
vote
Q: Which of the following option is true about XSS with Burp-Repeater tool?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
cyber-security
burp-repeater
0
votes
Q: Which of the following security property does Spoofing violate?
asked
Feb 24, 2021
in
Cyber Security
by
GeorgeBell
cyber-security
+1
vote
Q: What are HTTP response codes in CyberSecurity?
asked
Sep 10, 2020
in
Cyber Security
by
AdilsonLima
#cybersecurity
+1
vote
Q: What is a three-way handshake process in Cyber Security?
asked
Sep 10, 2020
in
Cyber Security
by
AdilsonLima
#cybersecurity
+2
votes
Q: What is the difference between stored and reflected XSS in CyberSecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cybersecurity
+2
votes
Q: What is the difference between vulnerability assessment and penetration testing in CyberSecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cybersecurity
+1
vote
Q: What is the use of a firewall and how it can be implemented in Cyber Security?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cyber
security
+1
vote
Q: What is two-factor authentication and how it can be implemented for public websites in Cyber Security?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cyber
security
+2
votes
Q: What is the difference between hashing and encryption in Cyber Security?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cyber
security
+2
votes
Q: Symmetric Vs Asymmetric encryption in CyberSecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cyber
security
+1
vote
Q: What is a CIA triad in Cyber Security?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cyber
security
+1
vote
Q: What is a Botnet in CyberSecrity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cybersecurity
+2
votes
Q: What is the difference between IDS and IPS in CyberSecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cybersecurity
+1
vote
Q: What is Cross-Site Scripting and how it can be prevented?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cybersecurity
+2
votes
Q: What is the difference between Threat, Vulnerability, and Risk in cybersecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#
cybersecurity
+1
vote
Q: What is Cryptography in cybersecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cybersecurity
Page:
« prev
1
2
3
4
5
6
7
8
next »
...