Advertisement

Cyber Security Questions and Answers (Q&A)

PremierGaou
Answered: Oct 06, 2024
A virus requires a carrier file to spread across a network and replicates by inserting copies into other files. A trojan is defined as an attack that doesnt self-replicate.
A worm ca...Read More

1 Answer

6979 views
John Smith
Answered: Oct 06, 2024
Giving your home address to someone you met in a chat room.

1 Answer

2182 views
Cesar H. Pablo, Journalist
Answered: Jan 19, 2018
Software on a computer is the instructions or information that is stored or created in order to operate certain functions on the computer. There are many computer programs that can be installed...Read More

2 Answers

1129 views
John Smith
Answered: Oct 06, 2024
An email directing the recipient to enter personal details on a fake website.

1 Answer

1016 views
Sravan
Answered: May 11, 2018

Planning, discovery, attack, reporting

4 Answers

836 views
Bubbanc
Answered: Oct 06, 2024
To create a strong password you need to select a combination of upper and lowercase letters mixed with numbers and symbols. The best passwords contain a combination of upper and lowercase letters...Read More

1 Answer

714 views
Josephfemia
Answered: Oct 06, 2024
An intruder must penetrate three separate devices
Private network addresses are not disclosed to the internet
Internal systems do not have direct access to internet

1 Answer

687 views
Jamez
Answered: Oct 06, 2024
A skilled programmer who secretly invades computers without authorisation.

2 Answers

683 views
John Smith
Answered: Oct 06, 2024
Black Box testing, White Box testing, Grey Box Testing

The correct answer is a) Black Box testing, is testing with the penetrator having no prior knowledge of the system. White Box testing,...Read More

1 Answer

603 views
John Smith
Answered: Oct 06, 2024
Backtrack, helix, phlak-the first one could be an acceptable answer, because any linux distribution could be effective in penetration testing. on the other hand the distributions in c) are more...Read More

1 Answer

602 views
Jamez
Answered: Oct 06, 2024
Using the method listed in the organisation’s security policy.

1 Answer

516 views
Rok.persak
Answered: Oct 24, 2018
Not really. All methodologies claims: 1. PREPARATION 2. DETECTION AND REPORTING 3. TRIAGE AND ANALYSIS 4. CONTAINMENT AND NEUTRALIZATION 5. POST-INCIDENT ACT...Read More

3 Answers

485 views
MrsQ
Answered: Oct 06, 2024
Plaintext.
The process of encoding information is called encryption. In this process, the data is converted to an unreadable/unrecognizable form so that no one can access that data except...Read More

1 Answer

484 views
John Smith
Answered: Oct 06, 2024
Documentation, log, system configuration, ruleset, network sniffing, file integrity -the correct answer is a). answer b) does not have ruleset and c) has personnel review, which in large companies...Read More

1 Answer

450 views
Jamez
Answered: Oct 06, 2024
An email asking you to go to a website for a free computer scan.

1 Answer

427 views
Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.