Advertisement

Cyber Security Questions and Answers (Q&A)

PremierGaou
Answered: Apr 19, 2024
A virus requires a carrier file to spread across a network and replicates by inserting copies into other files. A trojan is defined as an attack that doesnt self-replicate.
A worm ca...Read More

1 Answer

6748 views
John Smith
Answered: Apr 19, 2024
Giving your home address to someone you met in a chat room.

1 Answer

2162 views
Cesar H. Pablo, Journalist
Answered: Jan 19, 2018
Software on a computer is the instructions or information that is stored or created in order to operate certain functions on the computer. There are many computer programs that can be installed...Read More

2 Answers

1053 views
John Smith
Answered: Apr 19, 2024
An email directing the recipient to enter personal details on a fake website.

1 Answer

1002 views
Sravan
Answered: May 11, 2018

Planning, discovery, attack, reporting

4 Answers

826 views
Bubbanc
Answered: Apr 19, 2024
To create a strong password you need to select a combination of upper and lowercase letters mixed with numbers and symbols. The best passwords contain a combination of upper and lowercase letters...Read More

1 Answer

703 views
Jamez
Answered: Apr 19, 2024
A skilled programmer who secretly invades computers without authorisation.

2 Answers

680 views
Josephfemia
Answered: Apr 19, 2024
An intruder must penetrate three separate devices
Private network addresses are not disclosed to the internet
Internal systems do not have direct access to internet

1 Answer

680 views
John Smith
Answered: Apr 19, 2024
Black Box testing, White Box testing, Grey Box Testing

The correct answer is a) Black Box testing, is testing with the penetrator having no prior knowledge of the system. White Box testing,...Read More

1 Answer

592 views
John Smith
Answered: Apr 19, 2024
Backtrack, helix, phlak-the first one could be an acceptable answer, because any linux distribution could be effective in penetration testing. on the other hand the distributions in c) are more...Read More

1 Answer

587 views
Jamez
Answered: Apr 19, 2024
Using the method listed in the organisation’s security policy.

1 Answer

510 views
MrsQ
Answered: Apr 19, 2024
Plaintext.
The process of encoding information is called encryption. In this process, the data is converted to an unreadable/unrecognizable form so that no one can access that data except...Read More

1 Answer

474 views
Rok.persak
Answered: Oct 24, 2018
Not really. All methodologies claims: 1. PREPARATION 2. DETECTION AND REPORTING 3. TRIAGE AND ANALYSIS 4. CONTAINMENT AND NEUTRALIZATION 5. POST-INCIDENT ACT...Read More

3 Answers

470 views
John Smith
Answered: Apr 19, 2024
Documentation, log, system configuration, ruleset, network sniffing, file integrity -the correct answer is a). answer b) does not have ruleset and c) has personnel review, which in large companies...Read More

1 Answer

435 views
Jamez
Answered: Apr 19, 2024
An email asking you to go to a website for a free computer scan.

1 Answer

426 views
Advertisement
Advertisement
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.