Login
Remember
Register
User AdilsonLima
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by AdilsonLima
0
votes
Which of these are examples biometrics?
answered
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
0
votes
Phishing emails include fake notifications from banks and e-payment systems.
answered
Jan 28, 2020
in
Ethical Hacking
0
votes
Which of these are Threats related to Email Security?
answered
Jan 28, 2020
in
Cybersecurity Prologue
ethical-hacking
cybersecurity
0
votes
A proactive process to predict potential risks efficiently.
answered
Jan 28, 2020
in
Ethical Hacking
0
votes
SABSA Framework is commonly represented as _______ SABSA matrix.
answered
Jan 28, 2020
in
Cybersecurity Prologue
sassa-framework
0
votes
A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
answered
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
0
votes
A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called ___________.
answered
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
0
votes
Which of the following are the three phases of Incident response maturity assessment?
answered
Jan 28, 2020
in
Ethical Hacking
0
votes
Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?
answered
Jan 28, 2020
in
Ethical Hacking
0
votes
Hash functions can be leveraged to ensure ________.
answered
Jan 28, 2020
in
Ethical Hacking
0
votes
What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?
answered
Jan 28, 2020
in
Ethical Hacking
0
votes
Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
answered
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
0
votes
Which of the following attributes is not a PII?
answered
Jan 28, 2020
in
Ethical Hacking
0
votes
The type of attack in which the attacker intercepts the information in transit without altering it. Active Attack Passive Attack Invasive Attack
answered
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
0
votes
The security posture of an organization is defined by the ______ link in the chain. Strongest Average Weakest
answered
Jan 28, 2020
in
Ethical Hacking
0
votes
Which of the following attack method aims to gather confidential information by deceiving the victim?
answered
Jan 28, 2020
in
Ethical Hacking
ethical-hacking
0
votes
What is PUP?
answered
Jan 28, 2020
in
Ethical Hacking
0
votes
A pharming tactic in which the DNS table in a server is modified to deceive users by redirecting to fraudulent websites.
answered
Jan 28, 2020
in
Ethical Hacking
0
votes
As an application of cryptography, digital Signatures and MACs can be used for _____________.
answered
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
0
votes
Which of the following can be considered as an effective solution to ensure integrity?
answered
Jan 28, 2020
in
Ethical Hacking
#abstraction
Page:
« prev
1
...
56
57
58
59
60
61
62
63
64
65
66
...
81
next »
...