Login
Remember
Register
Ask a Question
Recent questions tagged cybersecurity
0
votes
1
answer
How does its security work?
asked
Nov 1, 2023
in
CyberArk
by
john ganales
cybersecurity
+1
vote
1
answer
What is a cybersecurity risk assessment?
asked
Jan 19, 2023
in
Cyber Security
by
Robindeniel
cybersecurity
risk-assessment
+1
vote
1
answer
What do you understand by compliance in Cybersecurity?
asked
Jan 19, 2023
in
Cyber Security
by
Robindeniel
cybersecurity
+1
vote
1
answer
How will you keep yourself updated with the latest cybersecurity news?
asked
Jan 19, 2023
in
Cyber Security
by
Robindeniel
cybersecurity
+1
vote
1
answer
What steps would you take after a cybersecurity incident occurs?
asked
Mar 10, 2022
in
Security Incident Management and Forensics
by
rajeshsharma
cybersecurity
+2
votes
1
answer
In Jan-2021, All India Council for Technical Education (AICTE) joined hands with which of the following to train 5 lakh students and faculty on cybersecurity?
asked
Jan 29, 2022
in
Big Data | Hadoop
by
sharadyadav1986
cybersecurity
Bigdata-questions-answers
Hadoop-questions-answers
+2
votes
1
answer
What is the difference between Threat, Vulnerability, and Risk in cybersecurity?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#
cybersecurity
+2
votes
1
answer
Which of these is true with respect to passwords?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+1
vote
1
answer
Which of these are examples biometrics?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
Which of these are Threats related to Email Security?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
ethical-hacking
cybersecurity
+2
votes
1
answer
A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called ___________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+1
vote
1
answer
Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
The type of attack in which the attacker intercepts the information in transit without altering it. Active Attack Passive Attack Invasive Attack
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
As an application of cryptography, digital Signatures and MACs can be used for _____________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
Which of the following is an attack against availability?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
Which of the following is a new method of spreading malware by injecting malicious or malware-laden advertisements into genuine online advertising networks and webpages?
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
+2
votes
1
answer
The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
by
AdilsonLima
cybersecurity
To see more, click for the
full list of questions
or
popular tags
.
...