Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged #cybersecurity
Home
Tag
#cybersecurity
+1
vote
Q: What are HTTP response codes in CyberSecurity?
asked
Sep 10, 2020
in
Cyber Security
by
AdilsonLima
#cybersecurity
+1
vote
Q: What is a three-way handshake process in Cyber Security?
asked
Sep 10, 2020
in
Cyber Security
by
AdilsonLima
#cybersecurity
+2
votes
Q: What is the difference between stored and reflected XSS in CyberSecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cybersecurity
+2
votes
Q: What is the difference between vulnerability assessment and penetration testing in CyberSecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cybersecurity
+1
vote
Q: What is a Botnet in CyberSecrity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cybersecurity
+2
votes
Q: What is the difference between IDS and IPS in CyberSecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cybersecurity
+1
vote
Q: What is Cross-Site Scripting and how it can be prevented?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cybersecurity
+1
vote
Q: What is Cryptography in cybersecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cybersecurity
0
votes
Q: Can you please explain what is cybersecurity?
asked
Aug 22, 2020
in
Cyber Security
by
sharadyadav1986
#cyber-security
#what-is-cybersecurity
#cybersecurity
0
votes
Q: Which of the following attack method aims to gather confidential information by deceiving the victim in cybersecrity?
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#cybersecurity
#etihcalhacking
0
votes
Q: Threats can exploit assets if assets are not vulnerable in cybersecurity?
asked
Jun 8, 2020
in
Ethical Hacking
by
DavidAnderson
#threats
#cybersecurity
To see more, click for the
full list of questions
or
popular tags
.
...