Questions LLC
Login
or
Sign Up
Ask a New Question
Cybersecurity
Page 7
Questions (831)
2. What is malware? What are some signs that malware may be impacting the performance of your computer? How can you avoid
1 answer
asked anonymously
29 views
2. What is malware? What are some signs that malware may be impacting the performance of your computer? How can you avoid
1 answer
asked anonymously
28 views
5. What is encryption? What are three examples of information that should be encrypted before it is transmitted?
write this from
1 answer
asked anonymously
12 views
The word in italics means
The programmers realized there was a breach in the system.
1 answer
asked by
one
19 views
What are so follow-up questions for the cyber community dialogue portfolio
1 answer
asked anonymously
25 views
What are the biggest challenges faced by the cyber community today
1 answer
asked anonymously
25 views
Are there any emerging trends or technologies that are significant impact in the cyber community
1 answer
asked anonymously
28 views
What do hackers use to change public keys and prevent authorized users from accessing their own data?
A. Cryptovurology B.
1 answer
asked anonymously
28 views
What is DNS Spoofing?(2 points) Responses When a "Hacker" gains access to a DNS Server and re-routes or changes the IP address
1 answer
asked anonymously
25 views
what is cyber crime
1 answer
asked anonymously
16 views
Explain five cybercrime that are done on the cyber space
1 answer
asked by
KEDDYRICK
16 views
Two factors authentication (2FA) involves using something you know a password and something you have Mobile true or false
1 answer
asked by
KEDDYRICK
14 views
Question A student is reading a book about hackers. Which computing specialization relates to this topic the most? (1 point)
1 answer
asked by
kojejcciewhoiel
42 views
Give me a password containing letters, numbers and special characters
1 answer
asked anonymously
24 views
Data Protection
1 answer
asked anonymously
22 views
A student is reading a book about hackers. Which computing specialization relates to this topic the most?
(1 point) systems
1 answer
asked by
Blue
13 views
A student is reading a book about hackers. Which computing specialization relates to this topic the most?
systems networking data
1 answer
asked by
Blue
20 views
What is the Computer Misuse Act 1990 (highlight one)?
1. It makes it a criminal offence to copy work that is not your own without
3 answers
asked anonymously
22 views
Which of the following could cause your personal identity to be stolen online
(1 point)
1 answer
asked anonymously
42 views
The Adventures of Cyber Sam: Sam is a friendly and tech-savvy character who takes children on a journey through the virtual
3 answers
asked by
THE REAL KATSUKI BAKUGO
26 views
A student is reading a book about hackers. Which computing specialization relates to this topic the most?
(1 point) Responses
1 answer
asked anonymously
49 views
What is identity theft? (1 point)
Responses when someone uses a computer to harass or hurt others online when someone uses a
1 answer
asked anonymously
27 views
What is identity theft? (1 point)
Responses when someone uses a computer to harass or hurt others online when someone uses a
1 answer
asked anonymously
30 views
What’s the most important way to avoid malware and viruses? (1 point)
A. Never open a file from a sender you don’t recognize
1 answer
asked by
a helping hand
33 views
what is identity thief?
a. when someone sells personal information to make money b. when someone steals personal information and
1 answer
asked anonymously
27 views
1. In order to gain entry to your cloud storage, what does an attacker need?
2. Name at least two ways that an attacker can steal
1 answer
asked anonymously
48 views
Name at least two ways that an attacker can steal your credentials.
1 answer
asked anonymously
24 views
1. In order to gain entry to your cloud storage, what does an attacker need?
2. Name at least two ways that an attacker can steal
1 answer
asked by
Mujika
22 views
What is identity theft? (1 point)Responseswhen someone steals money by using a computer when someone steals money by using a
1 answer
asked anonymously
25 views
Give me a password with 8-20 characters and it must have letters, numbers & special characters
1 answer
asked anonymously
13 views
create an advertisement on cyber security
1 answer
asked by
Bot GPT 3.5
15 views
What is adware?
1 answer
asked by
Aaron Lee
16 views
What is a general term for a wide variety of harmful software that infects, explores, or exposes user data to without that
1 answer
asked by
Aaron Lee
18 views
why is social engineering dangerous
1 answer
asked anonymously
10 views
What security feature should you always turn on when your laptop is connected to public Wi-Fi to ensure a layer of security that
1 answer
asked by
Aaron Lee
25 views
You are worried about your password being stolen, but you have had this password for a long time. It is a good password and hard
1 answer
asked by
Aaron Lee
32 views
What is the effect of a security breach?
1 answer
asked by
Aaron Lee
26 views
Why would you shut down operations when a breach was detected?(1 point)
1 answer
asked by
Aaron Lee
20 views
What further expands capability of malware by combining it with cryptographic technology, which was intended to add privacy and
1 answer
asked by
tonton
33 views
hat term refers to software that is designed to damage or disable computer systems?
(1 point) Responses malware malware workflow
1 answer
asked by
tonton
37 views
ith the growing dependence on the internet, a primary concern for all businesses is internet security, otherwise known as:
(1
1 answer
asked by
tonton
62 views
What term refers to software that is designed to damage or disable computer systems?
(1 point) Responses malware malware workflow
1 answer
asked by
tonton
31 views
hat do hackers use to change public keys and prevent authorized users from accessing their own data?
(1 point) Responses
1 answer
asked by
tonton
86 views
Why would you shut down operations when a breach was detected?
1 answer
asked anonymously
23 views
72.4% complete Question An organization is creating a quick reference guide to assist team members when addressing common
1 answer
asked anonymously
15 views
Complete the sentence.
can be an unintentional cyber breach.
1 answer
asked anonymously
12 views
You are worried about your password being stolen, but you have had this password for a long time. It is a good password and hard
1 answer
asked by
hatemaths
37 views
Question
What is a general term for a wide variety of harmful software that infects, explores, or exposes user data to without
1 answer
asked by
john
35 views
What is the effect of a security breach?(1 point) Responses increase in revenue increase in revenue reputational well-being
1 answer
asked anonymously
42 views
Why would you shut down operations when a breach was detected?(1 point) Responses to reduce the cost of running the system to
1 answer
asked anonymously
34 views
Pages
1
2
3
4
5
6
7
8
9
10
Parent Categories (47)
Artificial Intelligence/Machine Learning
Business
Business Technology
Career
Career Focus
Career Opportunities
Careers
Certification
Computer Science
Computer Science and Technology
Computer Science/Information Technology
Computer Science/Technology
Computers
Computers and Technology
Computing
Computing Specializations
Concerns
Education
Information & Communication Technology
Information Security
Information Technology
Internet
Internet Safety
Internet Security
IT/Technology
Job Market
Job Titles
Law
Law and Ethics
Law and Legislation
Legal
Legal Issues
Networks
Online Safety
Personal Safety
Return on Investment (ROI)
Risk Management
Security
Security and Privacy
Social Issues
Technology
Technology and Computer Science
Technology and Computing
Technology and Internet
Technology and Security
Technology Education
Technology or Computer Science