Login
Remember
Register
User AdilsonLima
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by AdilsonLima
+2
votes
1
answer
Which of these are Threats related to Email Security?
asked
Jan 28, 2020
in
Cybersecurity Prologue
ethical-hacking
cybersecurity
+1
vote
1
answer
A proactive process to predict potential risks efficiently.
asked
Jan 28, 2020
in
Ethical Hacking
+1
vote
1
answer
SABSA Framework is commonly represented as _______ SABSA matrix.
asked
Jan 28, 2020
in
Cybersecurity Prologue
sassa-framework
+2
votes
1
answer
A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
+2
votes
1
answer
A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called ___________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
0
votes
1
answer
Which of the following are the three phases of Incident response maturity assessment?
asked
Jan 28, 2020
in
Ethical Hacking
0
votes
0
answers
Which of the following is an attack against confidentiality?
asked
Jan 28, 2020
in
Ethical Hacking
0
votes
1
answer
Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?
asked
Jan 28, 2020
in
Ethical Hacking
+1
vote
1
answer
Hash functions can be leveraged to ensure ________.
asked
Jan 28, 2020
in
Ethical Hacking
+1
vote
1
answer
What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?
asked
Jan 28, 2020
in
Ethical Hacking
+1
vote
1
answer
Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
asked
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
+1
vote
1
answer
Which of the following attributes is not a PII?
asked
Jan 28, 2020
in
Ethical Hacking
+2
votes
1
answer
The type of attack in which the attacker intercepts the information in transit without altering it. Active Attack Passive Attack Invasive Attack
asked
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
+1
vote
1
answer
The security posture of an organization is defined by the ______ link in the chain. Strongest Average Weakest
asked
Jan 28, 2020
in
Ethical Hacking
0
votes
1
answer
Which of the following attack method aims to gather confidential information by deceiving the victim?
asked
Jan 28, 2020
in
Ethical Hacking
ethical-hacking
+1
vote
1
answer
What is PUP?
asked
Jan 28, 2020
in
Ethical Hacking
+1
vote
1
answer
A pharming tactic in which the DNS table in a server is modified to deceive users by redirecting to fraudulent websites.
asked
Jan 28, 2020
in
Ethical Hacking
+2
votes
1
answer
As an application of cryptography, digital Signatures and MACs can be used for _____________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
+3
votes
2
answers
Which of the following can be considered as an effective solution to ensure integrity?
asked
Jan 28, 2020
in
Ethical Hacking
#abstraction
+2
votes
1
answer
Which of the following is an attack against availability?
asked
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
+1
vote
1
answer
Which encryption method is more suitable for quickly encrypting large amounts of data?
asked
Jan 28, 2020
in
Ethical Hacking
+1
vote
1
answer
The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.
asked
Jan 28, 2020
in
Ethical Hacking
+2
votes
1
answer
Which of the following is a new method of spreading malware by injecting malicious or malware-laden advertisements into genuine online advertising networks and webpages?
asked
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
0
votes
1
answer
_________ is commonly known for providing backdoor access to the system for malicious users.
asked
Jan 28, 2020
in
Ethical Hacking
+1
vote
1
answer
The method of protecting programs, networks, and systems from digital attacks is commonly known as __________.
asked
Jan 28, 2020
in
Ethical Hacking
+2
votes
1
answer
The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __________.
asked
Jan 28, 2020
in
Cybersecurity Prologue
cybersecurity
+2
votes
1
answer
Which of the following is used to draw in users and infect them and deploy fast changing infrastructures?
asked
Jan 28, 2020
in
Ethical Hacking
#fast-changing
##machine-learning
+1
vote
1
answer
During compilation, TypeScript code gets converted to assembly language. False True
asked
Jan 27, 2020
in
JavaScript
+1
vote
1
answer
Why are optional parameters added?
asked
Jan 27, 2020
in
JavaScript
+1
vote
1
answer
Contextual typing in TypeScript is a form of ___________.
asked
Jan 27, 2020
in
JavaScript
Page:
« prev
1
...
38
39
40
41
42
43
44
45
46
47
48
...
57
next »
...