Advertisement

Cyber Security Questions and Answers (Q&A)

PremierGaou
Answered: Jun 22, 2024
A virus requires a carrier file to spread across a network and replicates by inserting copies into other files. A trojan is defined as an attack that doesnt self-replicate.
A worm ca...Read More

1 Answer

6861 views
John Smith
Answered: Jun 22, 2024
Giving your home address to someone you met in a chat room.

1 Answer

2171 views
Cesar H. Pablo, Journalist
Answered: Jan 19, 2018
Software on a computer is the instructions or information that is stored or created in order to operate certain functions on the computer. There are many computer programs that can be installed...Read More

2 Answers

1086 views
John Smith
Answered: Jun 22, 2024
An email directing the recipient to enter personal details on a fake website.

1 Answer

1005 views
Sravan
Answered: May 11, 2018

Planning, discovery, attack, reporting

4 Answers

832 views
Bubbanc
Answered: Jun 22, 2024
To create a strong password you need to select a combination of upper and lowercase letters mixed with numbers and symbols. The best passwords contain a combination of upper and lowercase letters...Read More

1 Answer

706 views
Josephfemia
Answered: Jun 22, 2024
An intruder must penetrate three separate devices
Private network addresses are not disclosed to the internet
Internal systems do not have direct access to internet

1 Answer

684 views
Jamez
Answered: Jun 22, 2024
A skilled programmer who secretly invades computers without authorisation.

2 Answers

682 views
John Smith
Answered: Jun 22, 2024
Black Box testing, White Box testing, Grey Box Testing

The correct answer is a) Black Box testing, is testing with the penetrator having no prior knowledge of the system. White Box testing,...Read More

1 Answer

594 views
John Smith
Answered: Jun 22, 2024
Backtrack, helix, phlak-the first one could be an acceptable answer, because any linux distribution could be effective in penetration testing. on the other hand the distributions in c) are more...Read More

1 Answer

592 views
Jamez
Answered: Jun 22, 2024
Using the method listed in the organisation’s security policy.

1 Answer

512 views
MrsQ
Answered: Jun 22, 2024
Plaintext.
The process of encoding information is called encryption. In this process, the data is converted to an unreadable/unrecognizable form so that no one can access that data except...Read More

1 Answer

478 views
Rok.persak
Answered: Oct 24, 2018
Not really. All methodologies claims: 1. PREPARATION 2. DETECTION AND REPORTING 3. TRIAGE AND ANALYSIS 4. CONTAINMENT AND NEUTRALIZATION 5. POST-INCIDENT ACT...Read More

3 Answers

477 views
John Smith
Answered: Jun 22, 2024
Documentation, log, system configuration, ruleset, network sniffing, file integrity -the correct answer is a). answer b) does not have ruleset and c) has personnel review, which in large companies...Read More

1 Answer

441 views
Jamez
Answered: Jun 22, 2024
An email asking you to go to a website for a free computer scan.

1 Answer

427 views
Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.