Questions LLC
Login
or
Sign Up
Ask a New Question
Cybersecurity
Page 2
Questions (892)
b) Define a cyber threat. [1]
b) State the purpose of cyber security. [1]
1 answer
asked by
ahaahah
82 views
Explain how a user could be fooled into running a Trojan. (2)
1 answer
asked by
ahaahah
66 views
name two ways an attacker can steal your credentials?
2 answers
asked by
no name
43 views
What is malware short for?
2 answers
asked anonymously
151 views
How I can hacked password of one office?
2 answers
asked by
Ayansa Dabesa soboka
39 views
Identity theft is when someone ____?
A. Stalks your social media accounts B. Posts a picture of you without your permission C.
1 answer
asked by
Lila England
96 views
What kind of vulnerabilities are a threat only to a computer that is conected to other computers?
physical network software data
16 answers
asked anonymously
125 views
Marcel is at a security conference and wants to learn more about the process of using digitally-generated cyphers to encrypt and
3 answers
asked anonymously
194 views
I plan to poison Bot with soft tacos.
would anyone care to join me in my assassination?
44 answers
asked by
Bane!
148 views
Malware
4 answers
asked by
Serah Chimanga
116 views
Which of the following is not an example of malicious code?
A. Trojan horse B. worm C. virus D. spy gear ••
9 answers
asked by
Bryan
4,064 views
Find out what malware is.
1 answer
asked by
rstaats88
65 views
Each user has a password 6 characters long where each character is an uppercase letter, a lowercase letter, or a digit. Each
5 answers
asked by
lisa
1,908 views
A computer password is required to be 5 characters long. How many passwords are possible if the password requires 2 letter(s)
4 answers
asked by
Ann
2,956 views
a computer password is required to be 9 characters long. how many passwords are possible if the password requires 3 letters
1 answer
asked by
Robert
401 views
Cyber Community
Portfolio Item: Need help now!!!!!!!!!!!!!!!!!!!!
4 answers
asked by
.
117 views
Which of the following is not an example of malicious code?
• Trojan horse • worm • virus • spy gear
1 answer
asked by
TWO
139 views
how to hack with inspect
3 answers
asked by
Answers Forever
124 views
what is vulnerability?
3 answers
asked by
kebede
107 views
a hackers is trying to guess somone password the hacker knows that the pasword is 10 characters long and that each charater is
4 answers
asked by
paul ta
791 views
Which cyberattack carries the most serious threat?
A Trojan horse virus targets computers at all public libraries. A phishing
4 answers
asked by
Anonymous
1,224 views
Select all the options that apply from the options to complete the statement: Social engineering attacks can happen over...
SMSes
3 answers
asked anonymously
46 views
Select all the options that apply to complete the statement: Social engineering attacks can happen over...
SMSes Ads Email
3 answers
asked anonymously
38 views
Which one of the following is the odd one out?
choose one answer from the options below Spoofing Smishing Virus Phishing Social
3 answers
asked anonymously
45 views
What is the risk of not choosing a strong, secure password for your cloud service?
Your data might not be backed up properly You
3 answers
asked anonymously
46 views
Ntombi received an email claiming to be from a well-known online retailer, stating that her account had been compromised. The
3 answers
asked by
Corbin
44 views
What is the risk of not choosing a strong, secure password for your cloud service?
You might accidentally delete your data You
3 answers
asked anonymously
81 views
What is the risk of not choosing a strong, secure password for your cloud service?
choose from the answers below Unscrupulous
5 answers
asked anonymously
53 views
What is the best way to create your password?
choose from the answers below Come up with something that has a combination of
3 answers
asked anonymously
63 views
Indicate if the following statement about malware is true or false: If unwanted advertisements, such as banners or pop-ups, keep
3 answers
asked anonymously
87 views
Indicate if the following statement is true or false: Your personal data is a valuable commodity that can be used by
3 answers
asked anonymously
99 views
Sarah, a teenager, met someone online who claimed to be a 17-year-old boy named Mike. They connected through a social media
3 answers
asked anonymously
142 views
While most spam messages you receive are just annoying, others could put you at risk of falling victim to:
(1 point) Responses
2 answers
asked anonymously
149 views
Unauthorized way of gaining access to a computer system without authority is called hacking, hacker, Encrypting, fraud
2 answers
asked anonymously
47 views
A customer complains of receiving malicious E-mails several times from the same user a day what should you ask the customer
When
2 answers
asked by
Serah Chimanga
51 views
A customer complains of receiving malicious E-mails several times from the same user a day what should you ask the customer
When
2 answers
asked by
Serah Chimanga
51 views
What “principle of least privilege” means?
in simple words
3 answers
asked by
-
41 views
What “principle of least privilege” means?
in simple words
3 answers
asked by
-
44 views
4. [Threat rating: DREAD model] Compute the threat rating for the “authentication cookie theft via cross-scripting (XSS)
2 answers
asked anonymously
29 views
7. [Basics of risk management] Suppose that you are a security administrator in some organization. You receive a report from a
2 answers
asked anonymously
52 views
Unauthorized way of gaining access to a computer without authority is called......
A) hacking B) hacker C) encrypting D) fraud
2 answers
asked anonymously
44 views
Which security method is used by companies to fix a flaw in their application?
4 answers
asked anonymously
55 views
Discuss the following malwares
spyware Ransomware Adware
2 answers
asked anonymously
61 views
What does knows where all security needs are mean?
1 answer
asked anonymously
53 views
Choose the word or phrase that best matches the word in italics.
The programmers realized there was a breach in the system.
1 answer
asked anonymously
285 views
From a cost point of view, an organization knows it needs to implement some cybersecurity protection on its personal computers
1 answer
asked by
jj
140 views
A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus
1 answer
asked by
jj
162 views
How can you protect your home computer from being accessed by anyone in your household and getting into your personal data and
1 answer
asked by
jj
76 views
NOW GIVE ME YOUR CREDIT CARD NUMBERS AND INFORMATION
1 answer
asked by
help me
68 views
Why would you shut down operations when a breach was detected
1 answer
asked by
jj
122 views
Pages
1
2
3
4
5
6
7
8
9
10
Parent Categories (47)
Artificial Intelligence/Machine Learning
Business
Business Technology
Career
Career Focus
Career Opportunities
Careers
Certification
Computer Science
Computer Science and Technology
Computer Science/Information Technology
Computer Science/Technology
Computers
Computers and Technology
Computing
Computing Specializations
Concerns
Education
Information & Communication Technology
Information Security
Information Technology
Internet
Internet Safety
Internet Security
IT/Technology
Job Market
Job Titles
Law
Law and Ethics
Law and Legislation
Legal
Legal Issues
Networks
Online Safety
Personal Safety
Return on Investment (ROI)
Risk Management
Security
Security and Privacy
Social Issues
Technology
Technology and Computer Science
Technology and Computing
Technology and Internet
Technology and Security
Technology Education
Technology or Computer Science