Questions LLC
Login
or
Sign Up
Ask a New Question
Cybersecurity
Page 6
Questions (833)
What is the risk of not choosing a strong, secure password for your cloud service?
Unscrupulous hackers might gain access to your
1 answer
asked by
Tlokotsi Semela
49 views
Ahmad is choosing a password to access his teacher’s web page. He must choose a capital letter and three nonrepeating digits
7 answers
asked by
bla
3,418 views
Jackson received an email that appeared to be from his bank, informing him that there was an issue with his account and
1 answer
asked anonymously
70 views
A computer password is required to be 5 characters long. How many passwords are possible if the password requires 1 letter(s)
3 answers
asked by
hana
2,008 views
A hacker is trying to guess someone's password. The hacker knows (somehow) that the password is 14 characters long, and that
4 answers
asked by
john
1,940 views
Which of the following describes an instance of legal hacking?(2 points) Responses Grey hat hacking Grey hat hacking Penetration
1 answer
asked by
lol
43 views
Indicate if the following statement about malware is true or false: The purpose of malware is to invade, damage or disable
1 answer
asked by
Nqobile
44 views
Which one of the following is the odd one out?
Social engineering Virus Smishing Phishing Spoofing
1 answer
asked by
Nqobile
36 views
What makes a good password?
A. A mix of letters, numbers, and symbols you'll remember B. Something you can remember, like your
1 answer
asked anonymously
46 views
Micro blocks, syn cookies, rst cookies, and stack tweaking are defenses against ______.
1 answer
asked anonymously
15 views
Natasha recently received an email from her bank that had the bank’s official logo and looked legitimate. The email asked her
1 answer
asked by
blu
152 views
Rashaad’s computer was infected by malware after he clicked on a suspicious link sent to him via email. The malware has
1 answer
asked by
blu
77 views
What is the primary goal of computer security
1 answer
asked anonymously
134 views
write an ad that imforms students about spyware that includes advice
1 answer
asked anonymously
35 views
How do you tell if intrusion is young or old
3 answers
asked by
shelbay
865 views
Dr. Bob's computerized records have been compromised by a hacker, resulting in damages to patients. Which of the following is
2 answers
asked by
b
507 views
2.) What is the most likely reason for an antivirus software update?(1 point)%0D%0AResponses%0D%0A%0D%0AA worm has gotten into
4 answers
asked by
julian shumpert
76 views
Other than using servers to protect the contents of digests, explain two methods
used to protect password digests. Use one
1 answer
asked anonymously
125 views
Compare vulnerability scan to penetration test using example under the following headings:
A. Procedure B. Process C. Goal D.
1 answer
asked anonymously
38 views
Compare vulnerability scan to penetration test using example under the
following headings: A. Procedure
1 answer
asked anonymously
42 views
Compare vulnerability scan to penetration test using example of the
following : A. Procedure
1 answer
asked anonymously
71 views
Compare vulnerability scan to penetration test using example of the
following : C. Goal
1 answer
asked anonymously
43 views
Compare vulnerability scan to penetration test using example of the
following : D. Frequency
1 answer
asked anonymously
40 views
Five rules of patching
1 answer
asked by
Alice
20 views
Hey. How can I keep hackers off my device?
11 answers
asked anonymously
64 views
You are asked to use six different letters to make a computer password. Find the number of possible six letter passwords.
I think
3 answers
asked by
Meredith Grey
565 views
Combine this into one attack with a desciption
1 answer
asked by
myworldwha
26 views
9.) Which piece of personal information would be most valuable to a malware developer?
1.Your favorite social media site 2.Your
1 answer
asked by
lol
50 views
How to hack a facebook account
1 answer
asked anonymously
36 views
What further expands capability of malware by combining it with cryptographic technology, which was intended to add privacy and
1 answer
asked anonymously
60 views
With the growing dependence on the internet, a primary concern for all businesses is internet security, otherwise known as:
A.
1 answer
asked anonymously
154 views
What term refers to software that is designed to damage or disable computer systems?
A. malware B. workflow C. data mining D.
1 answer
asked anonymously
56 views
What is the Dark Web?
9 answers
asked by
idkwhattoput
36 views
Ensuring employees use and change ____ frequently can greatly improve cyber security.
A. data B. passwords C. gloves D. the cloud
1 answer
asked anonymously
55 views
What best describes a point of failure for security in an integrated computing system?(1 point) Responses water water debugging
1 answer
asked anonymously
85 views
what is default password
1 answer
asked by
jerol
20 views
What do hackers use to change public keys and prevent authorized users from accessing their own data?
A. cryptovirology B.
1 answer
asked anonymously
80 views
What is the most likely reason for an antivirus software update?(1 point) Responses A worm has gotten into the antivirus network
1 answer
asked anonymously
66 views
What is the most likely reason for an antivirus software update?(1 point) Responses A worm has gotten into the antivirus network
1 answer
asked anonymously
47 views
What is the most likely reason for an antivirus software update?(1 point) Responses A worm has gotten into the antivirus network
1 answer
asked anonymously
80 views
4.) Trojan horses typically infect a device through:(1 point) Responses Photos on sociaal media Photos on sociaal media Text
1 answer
asked anonymously
54 views
5.) How are worms different from Trojan horses?(1 point) Responses;
Worms enter a device via an email attachment. Worms enter a
1 answer
asked anonymously
51 views
i found fake bot of you
2 answers
asked by
A n I m e*
49 views
What gidelines should people follow in Ethical Hacking to behave in a safe, legal, and ethical way?
1 answer
asked anonymously
64 views
An individual who tries to fraudulently obtain usernames, passwords, and Social Security numbers is engaging in what?
trolling
1 answer
asked anonymously
34 views
Explain malware
1 answer
asked anonymously
21 views
what does a Cybersecurity Analyst do
1 answer
asked by
Cybersecurity Analyst
17 views
Have you ever wondered what goes on in the mind of a cybercriminal? How do they plan and execute their attacks on unsuspecting
1 answer
asked anonymously
28 views
the programmers realized there was a breach in the system
1 answer
asked anonymously
59 views
With the growing dependence on the internet, a primary concern for all businesses is internet security, otherwise known as:
(1
1 answer
asked anonymously
43 views
Pages
1
2
3
4
5
6
7
8
9
10
Parent Categories (47)
Artificial Intelligence/Machine Learning
Business
Business Technology
Career
Career Focus
Career Opportunities
Careers
Certification
Computer Science
Computer Science and Technology
Computer Science/Information Technology
Computer Science/Technology
Computers
Computers and Technology
Computing
Computing Specializations
Concerns
Education
Information & Communication Technology
Information Security
Information Technology
Internet
Internet Safety
Internet Security
IT/Technology
Job Market
Job Titles
Law
Law and Ethics
Law and Legislation
Legal
Legal Issues
Networks
Online Safety
Personal Safety
Return on Investment (ROI)
Risk Management
Security
Security and Privacy
Social Issues
Technology
Technology and Computer Science
Technology and Computing
Technology and Internet
Technology and Security
Technology Education
Technology or Computer Science