Login
Remember
Register
User Robindeniel
Wall
Recent activity
All questions
All answers
Ask a Question
Questions by Robindeniel
0
votes
1
answer
Transformation is an effect that lets an element change its _________
asked
Aug 24, 2021
in
Styling with CSS3
css-transformation
0
votes
1
answer
CSS3 transforms allow you to _____________ elements.
asked
Aug 24, 2021
in
Styling with CSS3
css3-transform
css-style
0
votes
1
answer
media includes a block of CSS properties only if a certain condition is true.
asked
Aug 24, 2021
in
Styling with CSS3
css-properties
0
votes
1
answer
Identify the animation property.
asked
Aug 24, 2021
in
Styling with CSS3
animation-property
css-animation
0
votes
1
answer
A responsive grid-view often has __________
asked
Aug 24, 2021
in
Styling with CSS3
responsive-grid
css-grid
0
votes
1
answer
Which of these is not merit of external style sheet?
asked
Aug 24, 2021
in
Styling with CSS3
external-style-sheet
style-sheet
0
votes
1
answer
Inline CSS uses which attribute of the HTML element?
asked
Aug 24, 2021
in
Styling with CSS3
inline-css
0
votes
1
answer
Tag which provides a way to add a hook to a part of a text or part of a document is?
asked
Aug 24, 2021
in
Styling with CSS3
style-text
css-text
0
votes
1
answer
The ________ operator is used for combining multiple media features together into a single media query.
asked
Aug 24, 2021
in
Styling with CSS3
style
css-style
0
votes
1
answer
The type of vulnerability scan that facilitates access to low level data.
asked
Aug 17, 2021
in
Security Assessment
vulnerability-type
0
votes
1
answer
Which among the following aims at bringing the level of acceptable risk and the current risk level in line?
asked
Aug 17, 2021
in
Security Assessment
acceptable-risk
0
votes
1
answer
The process that involves analyzing entities like TCP and ICMP to identify an application or an operating system
asked
Aug 17, 2021
in
Security Assessment
tcp
icmp
operating-system
0
votes
1
answer
The type of security assessment that aims to test the organizations detection and response capabilities
asked
Aug 17, 2021
in
Security Assessment
security-detection
0
votes
1
answer
A process that aims to gain information about a system without directly engaging with the system is known as _______________
asked
Aug 17, 2021
in
Security Assessment
information-threat
0
votes
1
answer
Which of the following aims to integrate the defensive tactics and controls from the Blue Team with the threats and vulnerabilities found by the Red Team into a single objective?
asked
Aug 17, 2021
in
Security Assessment
defensive-tactics
threats
vulnerabilities
0
votes
1
answer
A type of testing with limited knowledge of the internal working of an application
asked
Aug 17, 2021
in
Security Assessment
testing
internal-application-testing
0
votes
1
answer
Which of the following assessment type works to determine whether a threat made detected, is genuine?
asked
Aug 17, 2021
in
Security Assessment
threat-mode
threat-detection
0
votes
1
answer
Which among the following involves evaluating security against a standard to check for complaince?
asked
Aug 17, 2021
in
Security Assessment
security-evaluating
0
votes
1
answer
Which of the following is best used for penetration testing?
asked
Aug 17, 2021
in
Security Assessment
penetration-testing
0
votes
1
answer
Passive fingerprinting sends and collects traffic to from the target system.
asked
Aug 17, 2021
in
Security Assessment
passive-fingerprints
0
votes
1
answer
Which of the following is typically used by threat actors security analysts trying to determine the security posture of externally accessible assets?
asked
Aug 17, 2021
in
Security Assessment
security-analysis
0
votes
1
answer
Which of the following can be considered as a sound example of social engineering attack?
asked
Aug 17, 2021
in
Security Assessment
user-account
0
votes
1
answer
A type of computer attack that in which the intruder engages with the targeted system is known as _______________
asked
Aug 17, 2021
in
Security Assessment
computer-attack
target-system
0
votes
1
answer
Which among the following companies have bug bounty programs?
asked
Aug 17, 2021
in
Security Assessment
bug-bounty-programs
0
votes
1
answer
Penetration testing is also called as ethical hacking.
asked
Aug 17, 2021
in
Security Assessment
penetration-testing
ethical-hacking
0
votes
1
answer
Which of the following best finds uncommon and eccentric issues?
asked
Aug 17, 2021
in
Security Assessment
eccentric-issues
0
votes
1
answer
During the scanning phase of pen testing, which of the following method analyzes an applications code to determine its behavior during runtime?
asked
Aug 17, 2021
in
Security Assessment
scanning-phase
security-phase
0
votes
1
answer
Which of the following exploits psychological manipulation in deceiving users to make security mistakes?
asked
Aug 17, 2021
in
Security Assessment
security-mistakes
0
votes
1
answer
The risk level decreases with increase in the likelihood of potential risk.
asked
Aug 17, 2021
in
Security Assessment
risk-assessment
0
votes
1
answer
Assessing security and auditing security mean the same thing.
asked
Aug 17, 2021
in
Security Assessment
security-assessing
security-audit
Page:
« prev
1
...
44
45
46
47
48
49
50
51
52
53
54
...
148
next »
...