Login
Remember
Register
Ask a Question
Recent questions in Ethical Hacking
0
votes
1
answer
Which of the following attack method aims to gather confidential information by deceiving the victim in cybersecrity?
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#cybersecurity
#etihcalhacking
0
votes
1
answer
Threats can exploit assets if assets are not vulnerable in cybersecurity?
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#threats
#cybersecurity
+1
vote
1
answer
What is the common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
1
answer
The telephone version of phishing that exploits social engineering techniques is known as __________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
1
answer
A framework that utilizes a Network Policy Server is called __________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
network-policy
framework
network-framework
+1
vote
1
answer
Phishing emails include fake notifications from banks and e-payment systems.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
1
answer
A proactive process to predict potential risks efficiently.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
1
answer
Which of the following are the three phases of Incident response maturity assessment?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
0
answers
Which of the following is an attack against confidentiality?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
1
answer
Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
1
answer
Hash functions can be leveraged to ensure ________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
1
answer
What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
1
answer
Which of the following attributes is not a PII?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
1
answer
The security posture of an organization is defined by the ______ link in the chain. Strongest Average Weakest
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
1
answer
Which of the following attack method aims to gather confidential information by deceiving the victim?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
ethical-hacking
+1
vote
1
answer
What is PUP?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
1
answer
A pharming tactic in which the DNS table in a server is modified to deceive users by redirecting to fraudulent websites.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+3
votes
2
answers
Which of the following can be considered as an effective solution to ensure integrity?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
#abstraction
+1
vote
1
answer
Which encryption method is more suitable for quickly encrypting large amounts of data?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
1
answer
The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
0
votes
1
answer
_________ is commonly known for providing backdoor access to the system for malicious users.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+1
vote
1
answer
The method of protecting programs, networks, and systems from digital attacks is commonly known as __________.
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
+2
votes
1
answer
Which of the following is used to draw in users and infect them and deploy fast changing infrastructures?
asked
Jan 28, 2020
in
Ethical Hacking
by
AdilsonLima
#fast-changing
##machine-learning
0
votes
1
answer
What is SSL ?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
ssl
0
votes
1
answer
Differentiate Between a MAC and an IP Address?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
mac-address
ip-address
0
votes
1
answer
What are the different types of spoofing?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
types-of-spoofing
spoofing-types
0
votes
1
answer
What is meant by spoofing attack?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
spoofing-attack
0
votes
1
answer
Which programming language is used for hacking?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
programming-language
hacking-language
+1
vote
1
answer
What's a denial of service (DOS) attack
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
denial-of-service
0
votes
1
answer
What is SQL injection and its types?
asked
Oct 22, 2019
in
Ethical Hacking
by
SakshiSharma
sql-injection
Page:
« prev
1
2
3
4
5
next »
Recent questions in Ethical Hacking
...