Login
Remember
Register
Ask a Question
Recent questions in Internet of Things IoT
0
votes
1
answer
What are the advantages of IoT?
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot-advantages
0
votes
2
answers
List mostly used sensors types in IoT
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot-sensors
0
votes
1
answer
What are the disadvantages of IoT?
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot-disadvantages
0
votes
1
answer
List layers of IoT protocol stack
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot-protocol-stack
0
votes
2
answers
What is the difference between IoT and IIoT?
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot
iiot
0
votes
1
answer
What are the fundamental components of IoT?
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot-components
0
votes
1
answer
Explain Raspberry Pi
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
raspbery-pi
0
votes
1
answer
PowerShell command is in ___________________ format. Choose the correct otpion from below list
asked
Jul 27, 2020
in
Internet of Things IoT
by
Hodge
#powersehll
0
votes
1
answer
Which technique of Threat hunting is considered to be the "least difficult" to hunt?
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#search
0
votes
1
answer
Which of the following are threat modeling tools?
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-modelling-tools
0
votes
1
answer
Who described the five levels of hunting maturity model?
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#hunter-david
0
votes
1
answer
Modifying a data within the system to achieve a malicious goal is known as __________
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#data-tempring
0
votes
1
answer
Which of the following is not a mitigation technique for the information disclosure type of threat
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-encyption
0
votes
1
answer
Threat hunting maturity model was defined by
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
0
votes
1
answer
The process of designing a security specification and then eventually testing that specification is known as
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-modelling
0
votes
1
answer
______ is a proactive way of hunting attacks.
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-hunting
0
votes
1
answer
Threat hunters should mainly focus on which of the following things
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-things
0
votes
1
answer
Which of the following is used to gather cyber threat intelligence and generate threat analysis report
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-hunt
0
votes
1
answer
APT stands for ____________.
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
0
votes
1
answer
It is very easy for an organization to detect the threats within few days using traditional signature-based technologies.
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-signature
0
votes
1
answer
Who developed hunting maturity model?
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-technology
0
votes
1
answer
The threats that become successful in hunting and occurs frequently are automated. This occurs in which level of hunting maturity model?
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-hunting-frequency
0
votes
1
answer
Which of the following threat hunting platform uses Forensic state analysis (FSA) to discover hidden threats and compromises?
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#hunting-platform
0
votes
1
answer
Maltego is an advanced querying tool that uses stateful session data models to complement user behavior analytics.
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threa-sessions
0
votes
1
answer
Malicious executables are transmitted during which stage of cyber Kill chain?
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#malicious-executables
0
votes
1
answer
Which of the following is an adaptation of the U.S. military’s kill chain process?
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#cyber-kill-chain
0
votes
1
answer
_________ is the first step in discovering adversaries.
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-adversaries
0
votes
1
answer
Which of the following are the tools required for an organization to conduct Threat Hunting?
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-hunting-tools
0
votes
1
answer
In data flow diagrams (DFD), the data flow shape represents boundary between trust levels or privileges.
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-data-flow-diagram
0
votes
1
answer
The technique through which isolating groups of similar information is called
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-clustering
Page:
« prev
1
2
3
4
5
6
next »
Recent questions in Internet of Things IoT
...