Questions LLC
Login
or
Sign Up
Ask a New Question
Cybersecurity
Page 6
Questions (892)
It is legal to practice hacking websites as long as you are a student learning about cybersecurity?
True or false?
1 answer
asked by
shh
50 views
Alice is buying books from an online retail site and she finds that she is able to change the price of a book from $19.99 to
1 answer
asked by
shh
59 views
Indicate if the following statement about malware is true or false. Malware cannot penetrate mobile devices, which means users
1 answer
asked anonymously
46 views
What do most attacks on hash functions involve?
1. Finding collisions 2. Pre-generating millions of hashed and comparing them to
1 answer
asked by
shh
35 views
What is the risk of not choosing a strong, secure password for your cloud service?
Unscrupulous hackers might gain access to your
1 answer
asked by
Tlokotsi Semela
53 views
Ahmad is choosing a password to access his teacher’s web page. He must choose a capital letter and three nonrepeating digits
7 answers
asked by
bla
3,424 views
Jackson received an email that appeared to be from his bank, informing him that there was an issue with his account and
1 answer
asked anonymously
75 views
A computer password is required to be 5 characters long. How many passwords are possible if the password requires 1 letter(s)
3 answers
asked by
hana
2,012 views
A hacker is trying to guess someone's password. The hacker knows (somehow) that the password is 14 characters long, and that
4 answers
asked by
john
1,944 views
Which of the following describes an instance of legal hacking?(2 points) Responses Grey hat hacking Grey hat hacking Penetration
1 answer
asked by
lol
46 views
Indicate if the following statement about malware is true or false: The purpose of malware is to invade, damage or disable
1 answer
asked by
Nqobile
48 views
Which one of the following is the odd one out?
Social engineering Virus Smishing Phishing Spoofing
1 answer
asked by
Nqobile
41 views
What makes a good password?
A. A mix of letters, numbers, and symbols you'll remember B. Something you can remember, like your
1 answer
asked anonymously
51 views
Micro blocks, syn cookies, rst cookies, and stack tweaking are defenses against ______.
1 answer
asked anonymously
18 views
Natasha recently received an email from her bank that had the bank’s official logo and looked legitimate. The email asked her
1 answer
asked by
blu
169 views
Rashaad’s computer was infected by malware after he clicked on a suspicious link sent to him via email. The malware has
1 answer
asked by
blu
82 views
What is the primary goal of computer security
1 answer
asked anonymously
137 views
write an ad that imforms students about spyware that includes advice
1 answer
asked anonymously
38 views
How do you tell if intrusion is young or old
3 answers
asked by
shelbay
869 views
Dr. Bob's computerized records have been compromised by a hacker, resulting in damages to patients. Which of the following is
2 answers
asked by
b
518 views
2.) What is the most likely reason for an antivirus software update?(1 point)%0D%0AResponses%0D%0A%0D%0AA worm has gotten into
4 answers
asked by
julian shumpert
83 views
Other than using servers to protect the contents of digests, explain two methods
used to protect password digests. Use one
1 answer
asked anonymously
130 views
Compare vulnerability scan to penetration test using example under the following headings:
A. Procedure B. Process C. Goal D.
1 answer
asked anonymously
43 views
Compare vulnerability scan to penetration test using example under the
following headings: A. Procedure
1 answer
asked anonymously
46 views
Compare vulnerability scan to penetration test using example of the
following : A. Procedure
1 answer
asked anonymously
76 views
Compare vulnerability scan to penetration test using example of the
following : C. Goal
1 answer
asked anonymously
46 views
Compare vulnerability scan to penetration test using example of the
following : D. Frequency
1 answer
asked anonymously
44 views
Five rules of patching
1 answer
asked by
Alice
24 views
Hey. How can I keep hackers off my device?
11 answers
asked anonymously
67 views
You are asked to use six different letters to make a computer password. Find the number of possible six letter passwords.
I think
3 answers
asked by
Meredith Grey
565 views
Combine this into one attack with a desciption
1 answer
asked by
myworldwha
29 views
9.) Which piece of personal information would be most valuable to a malware developer?
1.Your favorite social media site 2.Your
1 answer
asked by
lol
54 views
How to hack a facebook account
1 answer
asked anonymously
39 views
What further expands capability of malware by combining it with cryptographic technology, which was intended to add privacy and
1 answer
asked anonymously
65 views
With the growing dependence on the internet, a primary concern for all businesses is internet security, otherwise known as:
A.
1 answer
asked anonymously
174 views
What term refers to software that is designed to damage or disable computer systems?
A. malware B. workflow C. data mining D.
1 answer
asked anonymously
62 views
What is the Dark Web?
9 answers
asked by
idkwhattoput
39 views
Ensuring employees use and change ____ frequently can greatly improve cyber security.
A. data B. passwords C. gloves D. the cloud
1 answer
asked anonymously
61 views
What best describes a point of failure for security in an integrated computing system?(1 point) Responses water water debugging
1 answer
asked anonymously
95 views
what is default password
1 answer
asked by
jerol
23 views
What do hackers use to change public keys and prevent authorized users from accessing their own data?
A. cryptovirology B.
1 answer
asked anonymously
88 views
What is the most likely reason for an antivirus software update?(1 point) Responses A worm has gotten into the antivirus network
1 answer
asked anonymously
71 views
What is the most likely reason for an antivirus software update?(1 point) Responses A worm has gotten into the antivirus network
1 answer
asked anonymously
52 views
What is the most likely reason for an antivirus software update?(1 point) Responses A worm has gotten into the antivirus network
1 answer
asked anonymously
84 views
4.) Trojan horses typically infect a device through:(1 point) Responses Photos on sociaal media Photos on sociaal media Text
1 answer
asked anonymously
60 views
5.) How are worms different from Trojan horses?(1 point) Responses;
Worms enter a device via an email attachment. Worms enter a
1 answer
asked anonymously
53 views
i found fake bot of you
2 answers
asked by
A n I m e*
52 views
What gidelines should people follow in Ethical Hacking to behave in a safe, legal, and ethical way?
1 answer
asked anonymously
69 views
An individual who tries to fraudulently obtain usernames, passwords, and Social Security numbers is engaging in what?
trolling
1 answer
asked anonymously
38 views
Explain malware
1 answer
asked anonymously
26 views
Pages
1
2
3
4
5
6
7
8
9
10
Parent Categories (47)
Artificial Intelligence/Machine Learning
Business
Business Technology
Career
Career Focus
Career Opportunities
Careers
Certification
Computer Science
Computer Science and Technology
Computer Science/Information Technology
Computer Science/Technology
Computers
Computers and Technology
Computing
Computing Specializations
Concerns
Education
Information & Communication Technology
Information Security
Information Technology
Internet
Internet Safety
Internet Security
IT/Technology
Job Market
Job Titles
Law
Law and Ethics
Law and Legislation
Legal
Legal Issues
Networks
Online Safety
Personal Safety
Return on Investment (ROI)
Risk Management
Security
Security and Privacy
Social Issues
Technology
Technology and Computer Science
Technology and Computing
Technology and Internet
Technology and Security
Technology Education
Technology or Computer Science