Questions LLC
Login
or
Sign Up
Ask a New Question
Cybersecurity
Page 9
Questions (831)
How does ransomware affect organizational assets?(1 point)
Responses Ransomware attacks force all networks to send their IP
1 answer
asked anonymously
40 views
You have received a bunch of emails from the same company that makes your indoor exercise bicycle. You are very interested as
1 answer
asked anonymously
32 views
Your cellphone social media application keeps changing and getting new pictures. The pictures are not any that you know. This
1 answer
asked anonymously
25 views
describe how does a strong password policy help provide strong security in an environment.
1 answer
asked anonymously
17 views
In 1–2 sentences, describe how does a strong password policy help provide strong security in an environment
1 answer
asked anonymously
23 views
How would you go about calculating the cost to implement a cybersecurity solution? Give your answer in 1–2 sentences.
1 answer
asked anonymously
55 views
cybersecurity
1 answer
asked anonymously
15 views
How does ransomware affect organizational assets?(1 point)
Responses A ransomware attack is designed to render organizational
1 answer
asked anonymously
50 views
How can installation media can be used to compromise a computer?(1 point)
Responses Installation media runs without using all the
1 answer
asked anonymously
84 views
Your organization has a gross sales of $40 million, and you have 100 employees. What is the maximum amount of loss in dollars
1 answer
asked anonymously
51 views
Why is larency theft graphics easier to read
1 answer
asked anonymously
13 views
how to protect the master emerald
1 answer
asked by
Knuckles
15 views
Which of the following is an example of an activity that can be automated?(1 point) Responses risk assessment risk assessment
1 answer
asked anonymously
31 views
Which of the following is an example of an activity that can be automated?(1 point)
Responses risk assessment penetration testing
1 answer
asked anonymously
25 views
Which of the following is an example of an activity that can be automated?(1 point)
Responses risk assessment risk assessment
1 answer
asked anonymously
32 views
creating fake YouTube accounts good
1 answer
asked anonymously
22 views
What is the effect of a security breach
• increase in revenue • reputational well-being • data loss • labor loss
1 answer
asked by
Bob
38 views
cybersafety and photo management
1 answer
asked anonymously
22 views
Which of the following is not an example of malicious code?
1 answer
asked anonymously
18 views
If malware was on my device, do they have access to my information?
19 answers
asked anonymously
64 views
What is adware?
A. adware is programming masked as advertisements that cause undesirable or invasive activities on clients' pcs.
1 answer
asked by
young_240sx
22 views
What is a general term for a wide variety of harmful software that infects, explores, or exposes user data to without that
1 answer
asked by
young_240sx
18 views
Full details of an hacker
1 answer
asked anonymously
13 views
Which era can lead to threats controlled by a desktop computer 🖕
1 answer
asked by
Angel
15 views
Multiple Choice
Which of the following is not an example of malicious code? (1 point) Responses Trojan horse Trojan horse worm
1 answer
asked by
dont copy me ik ur name - its jax
31 views
Question
What is malware short for? (1 point) Responses malingered software malingered software Maltese hardware Maltese hardware
1 answer
asked by
dont copy me ik ur name - its jax
33 views
Generate a PSA script that could be read out on a radio stations about cybersecurity.
Include these things: What spyware is and
1 answer
asked anonymously
24 views
Generate a PSA script that can be read in 1 minute and would be read out on a radio station.
Your PSA must have: What spyware is
1 answer
asked anonymously
22 views
Omar got an email stating that he needed to update the software his company uses for banking. He clicked on the link and did the
1 answer
asked anonymously
40 views
Omar got an email stating that he needed to update the software his company uses for banking. He clicked on the link and did the
1 answer
asked anonymously
32 views
What action is needed for domain maintenance?
(1 point) Responses installing security patches installing security patches
1 answer
asked anonymously
58 views
In not less than two pages discuss the topic threat modelling including examples of where threat modelling can be done and
1 answer
asked anonymously
22 views
Denial of service (DoS) is among the security threats that have been on the rise in recent years.
1. Discuss recommendations for
1 answer
asked by
KO
34 views
What is “phishing”?
(1 point) Responses the threat to publish the victim's data or perpetually block access to it unless a
1 answer
asked anonymously
9 views
As a physical security measure, _____.
Question 5 options: electronic trackers are attached to a computer at the power outlet
1 answer
asked by
KO
18 views
Which statement is true of application-filtering firewalls?
Question 8 options: They are less secure than packet-filtering
1 answer
asked by
KO
50 views
_____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through the use of
1 answer
asked by
KO
26 views
In the context of e-commerce transaction security measures, authentication is a critical factor because it ensures that:
Question
1 answer
asked by
KO
26 views
Which of the following passwords would be considered the strongest and most secure?(1 point) Responses R3ADYGO123 R3ADYGO123
1 answer
asked by
hatemaths
19 views
What is generally traded when securing systems?(1 point) Responses being able to easily use the system being able to easily use
1 answer
asked by
hatemaths
27 views
From a cost point of view, an organization knows it needs to implement some cybersecurity protection on its personal computers
1 answer
asked by
hatemaths
32 views
How does ransomware affect organizational assets?(1 point) Responses A ransomware attack causes users to constantly reboot their
1 answer
asked by
hatemaths
22 views
How does spyware operate?(1 point) Responses Spyware is automated to carry out certain actions within the system. Spyware is
1 answer
asked by
hatemaths
28 views
How can installation media can be used to compromise a computer?(1 point) Responses Installation media is designed to hack
1 answer
asked by
hatemaths
26 views
You have received a bunch of emails from the same company that makes your indoor exercise bicycle. You are very interested as
1 answer
asked by
hatemaths
20 views
Your cellphone social media application keeps changing and getting new pictures. The pictures are not any that you know. This
1 answer
asked by
hatemaths
18 views
Which of the following is not an example of malicious code? (1 point ) Trojan horse worm virus spy gear
1 answer
asked anonymously
28 views
What is malware short for? (1 point ) malingered software Maltese hardware Omalicious software Omalfunctioning hardware
1 answer
asked anonymously
18 views
San Antonio is thought to have the highest concentration of cyber intelligence employees outside of Washington, D.C. Which
1 answer
asked anonymously
44 views
What are the advantages of CAPS?
1 answer
asked anonymously
10 views
Pages
1
2
3
4
5
6
7
8
9
10
Parent Categories (47)
Artificial Intelligence/Machine Learning
Business
Business Technology
Career
Career Focus
Career Opportunities
Careers
Certification
Computer Science
Computer Science and Technology
Computer Science/Information Technology
Computer Science/Technology
Computers
Computers and Technology
Computing
Computing Specializations
Concerns
Education
Information & Communication Technology
Information Security
Information Technology
Internet
Internet Safety
Internet Security
IT/Technology
Job Market
Job Titles
Law
Law and Ethics
Law and Legislation
Legal
Legal Issues
Networks
Online Safety
Personal Safety
Return on Investment (ROI)
Risk Management
Security
Security and Privacy
Social Issues
Technology
Technology and Computer Science
Technology and Computing
Technology and Internet
Technology and Security
Technology Education
Technology or Computer Science