Advertisement

Cyber Security Questions and Answers (Q&A)

PremierGaou
Answered: Sep 22, 2021
A virus requires a carrier file to spread across a network and replicates by inserting copies into other files. A trojan is defined as an attack that doesnt self-replicate.
A worm ca...Read More

1 Answer

3616 views
John Smith
Answered: Sep 22, 2021
Giving your home address to someone you met in a chat room.

1 Answer

1090 views
John Smith
Answered: Sep 22, 2021
An email directing the recipient to enter personal details on a fake website.

1 Answer

917 views
Jamez
Answered: Sep 22, 2021
A skilled programmer who secretly invades computers without authorisation.

2 Answers

594 views
Sravan
Answered: May 11, 2018

Planning, discovery, attack, reporting

4 Answers

577 views
Josephfemia
Answered: Sep 22, 2021
An intruder must penetrate three separate devices
Private network addresses are not disclosed to the internet
Internal systems do not have direct access to internet

1 Answer

498 views
Cesar H. Pablo, Journalist
Answered: Jan 19, 2018
Software on a computer is the instructions or information that is stored or created in order to operate certain functions on the computer. There are many computer programs that can be installed...Read More

2 Answers

491 views
MrsQ
Answered: Sep 22, 2021
Plaintext.
The process of encoding information is called encryption. In this process, the data is converted to an unreadable/unrecognizable form so that no one can access that data except...Read More

1 Answer

420 views
Bubbanc
Answered: Sep 22, 2021
To create a strong password you need to select a combination of upper and lowercase letters mixed with numbers and symbols. The best passwords contain a combination of upper and lowercase letters...Read More

1 Answer

412 views
Jamez
Answered: Sep 22, 2021
An email asking you to go to a website for a free computer scan.

1 Answer

384 views
Jamez
Answered: Sep 22, 2021
Using the method listed in the organisation’s security policy.

1 Answer

373 views
Rok.persak
Answered: Oct 24, 2018
Not really. All methodologies claims: 1. PREPARATION 2. DETECTION AND REPORTING 3. TRIAGE AND ANALYSIS 4. CONTAINMENT AND NEUTRALIZATION 5. POST-INCIDENT ACT...Read More

3 Answers

360 views
John Smith
Answered: Sep 22, 2021
Time of day restriction
Access Control Lists

1 Answer

348 views
Lmjr
Answered: Sep 22, 2021
To determine the impact of a threat against the

1 Answer

326 views
Emmanuella Ihenetu
Answered: Sep 26, 2019

To protect your data and personal imformation

1 Answer

239 views
Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.