Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Ask a Question
Top 100+ questions in Cybersecurity Prologue
Home
Questions
Cybersecurity Prologue
0
votes
Q: If a student gains unauthorized access to the student database and modifies his/her marks, what type of violation would it be?
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
access-gain
0
votes
Q: Which of the following is a physiological biometric that could be used for authentication?
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
physiological-biometric
0
votes
Q: A system set up to lure an attacker, to learn about attack methodologies, and to gather evidence of intruders.
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
cyber-attack
0
votes
Q: An email security threat that occurs when a malicious user sends an email pretending to be someone you know is called ___________.
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
email-security
0
votes
Q: What is the security attribute that ensures data and services are available to authorized users whenever required?
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
security-attribute
0
votes
Q: An extension of RADIUS that provides access control for routers, network access servers, and other networked computing devices is called __________.
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
radius-extension
0
votes
Q: Deployment in APTs is fully automated.
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
api-deployment
0
votes
Q: A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is known as _________.
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
cyber-security
0
votes
Q: Programs that are specifically designed to disrupt the performance of computers/networks are commonly known as __________.
asked
Dec 9, 2021
in
Cybersecurity Prologue
by
rajeshsharma
disrupt-performance
0
votes
Q: ________ is designed to extract data from its host computer for marketing purposes.
asked
Dec 9, 2021
in
Cybersecurity Prologue
by
rajeshsharma
data-extraction
0
votes
Q: The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security is called ___________.
asked
Dec 9, 2021
in
Cybersecurity Prologue
by
rajeshsharma
weaken-security
0
votes
Q: _________ is a standalone software that does not need human help/host program to spread.
asked
Dec 9, 2021
in
Cybersecurity Prologue
by
rajeshsharma
security-software
0
votes
Q: The type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom is called __________.
asked
Dec 9, 2021
in
Cybersecurity Prologue
by
rajeshsharma
malware-access
+2
votes
Q: Which of these is true with respect to passwords?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+1
vote
Q: Which of these are examples biometrics?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
Q: Which of these are Threats related to Email Security?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
ethical-hacking
cybersecurity
+1
vote
Q: SABSA Framework is commonly represented as _______ SABSA matrix.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
sassa-framework
+2
votes
Q: A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
Q: A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called ___________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+1
vote
Q: Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
Q: The type of attack in which the attacker intercepts the information in transit without altering it. Active Attack Passive Attack Invasive Attack
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
Q: As an application of cryptography, digital Signatures and MACs can be used for _____________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
Q: Which of the following is an attack against availability?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
Q: Which of the following is a new method of spreading malware by injecting malicious or malware-laden advertisements into genuine online advertising networks and webpages?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
Q: The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
To see more, click for the
full list of questions
or
popular tags
.
...