Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged Cybersecurity
Home
Tag
Cybersecurity
+1
vote
Q: What is a cybersecurity risk assessment?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
20.8k
points)
cybersecurity
risk-assessment
+1
vote
Q: What do you understand by compliance in Cybersecurity?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
20.8k
points)
cybersecurity
+1
vote
Q: How will you keep yourself updated with the latest cybersecurity news?
asked
Jan 19
in
Cyber Security
by
Robindeniel
(
20.8k
points)
cybersecurity
+1
vote
Q: What steps would you take after a cybersecurity incident occurs?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
by
rajeshsharma
(
23.9k
points)
cybersecurity
+2
votes
Q: In Jan-2021, All India Council for Technical Education (AICTE) joined hands with which of the following to train 5 lakh students and faculty on cybersecurity?
asked
Jan 29, 2022
in
Big Data | Hadoop
by
sharadyadav1986
(
31.7k
points)
cybersecurity
Bigdata-questions-answers
Hadoop-questions-answers
+2
votes
Q: What is the difference between Threat, Vulnerability, and Risk in cybersecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
(
2.6k
points)
#
cybersecurity
+2
votes
Q: Which of these is true with respect to passwords?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
(
6.3k
points)
cybersecurity
+1
vote
Q: Which of these are examples biometrics?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
(
6.3k
points)
cybersecurity
+2
votes
Q: Which of these are Threats related to Email Security?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
(
6.3k
points)
ethical-hacking
cybersecurity
+2
votes
Q: A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
(
6.3k
points)
cybersecurity
+2
votes
Q: A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called ___________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
(
6.3k
points)
cybersecurity
+1
vote
Q: Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
(
6.3k
points)
cybersecurity
+2
votes
Q: The type of attack in which the attacker intercepts the information in transit without altering it. Active Attack Passive Attack Invasive Attack
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
(
6.3k
points)
cybersecurity
+2
votes
Q: As an application of cryptography, digital Signatures and MACs can be used for _____________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
(
6.3k
points)
cybersecurity
+2
votes
Q: Which of the following is an attack against availability?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
(
6.3k
points)
cybersecurity
+2
votes
Q: Which of the following is a new method of spreading malware by injecting malicious or malware-laden advertisements into genuine online advertising networks and webpages?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
(
6.3k
points)
cybersecurity
+2
votes
Q: The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
(
6.3k
points)
cybersecurity
To see more, click for the
full list of questions
or
popular tags
.
...