Questions LLC
Login
or
Sign Up
Ask a New Question
Cybersecurity
Page 2
Questions (831)
How I can hacked password of one office?
2 answers
asked by
Ayansa Dabesa soboka
36 views
Identity theft is when someone ____?
A. Stalks your social media accounts B. Posts a picture of you without your permission C.
1 answer
asked by
Lila England
92 views
What kind of vulnerabilities are a threat only to a computer that is conected to other computers?
physical network software data
16 answers
asked anonymously
118 views
Marcel is at a security conference and wants to learn more about the process of using digitally-generated cyphers to encrypt and
3 answers
asked anonymously
185 views
I plan to poison Bot with soft tacos.
would anyone care to join me in my assassination?
44 answers
asked by
Bane!
144 views
Malware
4 answers
asked by
Serah Chimanga
112 views
Which of the following is not an example of malicious code?
A. Trojan horse B. worm C. virus D. spy gear ••
9 answers
asked by
Bryan
4,053 views
Find out what malware is.
1 answer
asked by
rstaats88
60 views
Each user has a password 6 characters long where each character is an uppercase letter, a lowercase letter, or a digit. Each
5 answers
asked by
lisa
1,899 views
A computer password is required to be 5 characters long. How many passwords are possible if the password requires 2 letter(s)
4 answers
asked by
Ann
2,947 views
a computer password is required to be 9 characters long. how many passwords are possible if the password requires 3 letters
1 answer
asked by
Robert
395 views
Cyber Community
Portfolio Item: Need help now!!!!!!!!!!!!!!!!!!!!
4 answers
asked by
.
113 views
Which of the following is not an example of malicious code?
• Trojan horse • worm • virus • spy gear
1 answer
asked by
TWO
137 views
how to hack with inspect
3 answers
asked by
Answers Forever
120 views
what is vulnerability?
3 answers
asked by
kebede
103 views
a hackers is trying to guess somone password the hacker knows that the pasword is 10 characters long and that each charater is
4 answers
asked by
paul ta
783 views
Which cyberattack carries the most serious threat?
A Trojan horse virus targets computers at all public libraries. A phishing
4 answers
asked by
Anonymous
1,219 views
Select all the options that apply from the options to complete the statement: Social engineering attacks can happen over...
SMSes
3 answers
asked anonymously
42 views
Select all the options that apply to complete the statement: Social engineering attacks can happen over...
SMSes Ads Email
3 answers
asked anonymously
36 views
Which one of the following is the odd one out?
choose one answer from the options below Spoofing Smishing Virus Phishing Social
3 answers
asked anonymously
41 views
What is the risk of not choosing a strong, secure password for your cloud service?
Your data might not be backed up properly You
3 answers
asked anonymously
43 views
Ntombi received an email claiming to be from a well-known online retailer, stating that her account had been compromised. The
3 answers
asked by
Corbin
40 views
What is the risk of not choosing a strong, secure password for your cloud service?
You might accidentally delete your data You
3 answers
asked anonymously
75 views
What is the risk of not choosing a strong, secure password for your cloud service?
choose from the answers below Unscrupulous
5 answers
asked anonymously
48 views
What is the best way to create your password?
choose from the answers below Come up with something that has a combination of
3 answers
asked anonymously
60 views
Indicate if the following statement about malware is true or false: If unwanted advertisements, such as banners or pop-ups, keep
3 answers
asked anonymously
80 views
Indicate if the following statement is true or false: Your personal data is a valuable commodity that can be used by
3 answers
asked anonymously
94 views
While most spam messages you receive are just annoying, others could put you at risk of falling victim to:
(1 point) Responses
2 answers
asked anonymously
140 views
Unauthorized way of gaining access to a computer system without authority is called hacking, hacker, Encrypting, fraud
2 answers
asked anonymously
42 views
A customer complains of receiving malicious E-mails several times from the same user a day what should you ask the customer
When
2 answers
asked by
Serah Chimanga
46 views
A customer complains of receiving malicious E-mails several times from the same user a day what should you ask the customer
When
2 answers
asked by
Serah Chimanga
47 views
What “principle of least privilege” means?
in simple words
3 answers
asked by
-
39 views
What “principle of least privilege” means?
in simple words
3 answers
asked by
-
43 views
4. [Threat rating: DREAD model] Compute the threat rating for the “authentication cookie theft via cross-scripting (XSS)
2 answers
asked anonymously
28 views
7. [Basics of risk management] Suppose that you are a security administrator in some organization. You receive a report from a
2 answers
asked anonymously
48 views
Unauthorized way of gaining access to a computer without authority is called......
A) hacking B) hacker C) encrypting D) fraud
2 answers
asked anonymously
40 views
Which security method is used by companies to fix a flaw in their application?
4 answers
asked anonymously
52 views
Discuss the following malwares
spyware Ransomware Adware
2 answers
asked anonymously
54 views
What does knows where all security needs are mean?
1 answer
asked anonymously
51 views
Choose the word or phrase that best matches the word in italics.
The programmers realized there was a breach in the system.
1 answer
asked anonymously
280 views
From a cost point of view, an organization knows it needs to implement some cybersecurity protection on its personal computers
1 answer
asked by
jj
133 views
A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus
1 answer
asked by
jj
157 views
How can you protect your home computer from being accessed by anyone in your household and getting into your personal data and
1 answer
asked by
jj
72 views
NOW GIVE ME YOUR CREDIT CARD NUMBERS AND INFORMATION
1 answer
asked by
help me
62 views
Why would you shut down operations when a breach was detected
1 answer
asked by
jj
116 views
Cybersecurity and what to do to prevent it. Writing a 30 second text or script for your ad.
1 answer
asked by
Mike
64 views
cybersecurity and what to do to prevent it. Writing a 30 minutes text or script for your ad.
2 answers
asked by
Micah
79 views
Which attack commonly includes the use of botnet and handler systems?
1 answer
asked anonymously
108 views
what is spyware
1 answer
asked by
Answers Forever
77 views
write a portfolio for a website ad about preventing malware
1 answer
asked by
hi
76 views
Pages
1
2
3
4
5
6
7
8
9
10
Parent Categories (47)
Artificial Intelligence/Machine Learning
Business
Business Technology
Career
Career Focus
Career Opportunities
Careers
Certification
Computer Science
Computer Science and Technology
Computer Science/Information Technology
Computer Science/Technology
Computers
Computers and Technology
Computing
Computing Specializations
Concerns
Education
Information & Communication Technology
Information Security
Information Technology
Internet
Internet Safety
Internet Security
IT/Technology
Job Market
Job Titles
Law
Law and Ethics
Law and Legislation
Legal
Legal Issues
Networks
Online Safety
Personal Safety
Return on Investment (ROI)
Risk Management
Security
Security and Privacy
Social Issues
Technology
Technology and Computer Science
Technology and Computing
Technology and Internet
Technology and Security
Technology Education
Technology or Computer Science