Advertisement

Cyber Security Questions and Answers (Q&A)

PremierGaou
Answered: Feb 06, 2023
A virus requires a carrier file to spread across a network and replicates by inserting copies into other files. A trojan is defined as an attack that doesnt self-replicate.
A worm ca...Read More

1 Answer

6181 views
John Smith
Answered: Feb 06, 2023
Giving your home address to someone you met in a chat room.

1 Answer

2081 views
John Smith
Answered: Feb 06, 2023
An email directing the recipient to enter personal details on a fake website.

1 Answer

984 views
Cesar H. Pablo, Journalist
Answered: Jan 19, 2018
Software on a computer is the instructions or information that is stored or created in order to operate certain functions on the computer. There are many computer programs that can be installed...Read More

2 Answers

776 views
Sravan
Answered: May 11, 2018

Planning, discovery, attack, reporting

4 Answers

765 views
Jamez
Answered: Feb 06, 2023
A skilled programmer who secretly invades computers without authorisation.

2 Answers

666 views
Josephfemia
Answered: Feb 06, 2023
An intruder must penetrate three separate devices
Private network addresses are not disclosed to the internet
Internal systems do not have direct access to internet

1 Answer

654 views
Bubbanc
Answered: Feb 06, 2023
To create a strong password you need to select a combination of upper and lowercase letters mixed with numbers and symbols. The best passwords contain a combination of upper and lowercase letters...Read More

1 Answer

599 views
John Smith
Answered: Feb 06, 2023
Black Box testing, White Box testing, Grey Box Testing

The correct answer is a) Black Box testing, is testing with the penetrator having no prior knowledge of the system. White Box testing,...Read More

1 Answer

569 views
John Smith
Answered: Feb 06, 2023
Backtrack, helix, phlak-the first one could be an acceptable answer, because any linux distribution could be effective in penetration testing. on the other hand the distributions in c) are more...Read More

1 Answer

490 views
Jamez
Answered: Feb 06, 2023
Using the method listed in the organisation’s security policy.

1 Answer

485 views
MrsQ
Answered: Feb 06, 2023
Plaintext.
The process of encoding information is called encryption. In this process, the data is converted to an unreadable/unrecognizable form so that no one can access that data except...Read More

1 Answer

455 views
Rok.persak
Answered: Oct 24, 2018
Not really. All methodologies claims: 1. PREPARATION 2. DETECTION AND REPORTING 3. TRIAGE AND ANALYSIS 4. CONTAINMENT AND NEUTRALIZATION 5. POST-INCIDENT ACT...Read More

3 Answers

431 views
Jamez
Answered: Feb 06, 2023
An email asking you to go to a website for a free computer scan.

1 Answer

415 views
John Smith
Answered: Feb 06, 2023
Documentation, log, system configuration, ruleset, network sniffing, file integrity -the correct answer is a). answer b) does not have ruleset and c) has personnel review, which in large companies...Read More

1 Answer

401 views
Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.