Login
Remember
Register
Ask a Question
Recent questions tagged cyber-security
+1
vote
1
answer
Which is more secure SSL or HTTPS?
asked
Jan 19, 2023
in
Cyber Security
by
Robindeniel
ssl
http
cyber-security
+1
vote
1
answer
What are the common methods of authentication for network security?
asked
Jan 19, 2023
in
Cyber Security
by
Robindeniel
cyber-security
0
votes
1
answer
The web application like banking websites should ask its users to log-in again after some specific period of time, let say 30 min. It can be considered as an example of which cybersecurity principle?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
+1
vote
1
answer
Which one of the following principles states that sometimes it is become more desirable to rescored the details of intrusion that to adopt more efficient measure to avoid it?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
1
answer
Which of the following can also consider as the instances of Open Design?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
1
answer
Which of the following act violates cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
1
answer
Which of the following is not an advantage of cyber security?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
cyber-security
0
votes
1
answer
A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is known as _________.
asked
Apr 2, 2022
in
Cybersecurity Prologue
by
sharadyadav1986
cyber-security
0
votes
1
answer
Which of the following is a type of cyber security?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
0
votes
1
answer
Which one of the following refers to the technique used for verifying the integrity of the message?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
software-integration
cyber-security
0
votes
1
answer
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
steal
spy
cyber-security
0
votes
1
answer
Which of the following refers to the violation of the principle if a computer is no more accessible?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
computer-principle
cyber-security
0
votes
1
answer
What does cyber security protect?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
0
votes
1
answer
What is Cyber Security?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
0
votes
1
answer
Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
ethical-behaviors
0
votes
1
answer
Read the following statement carefully and find out whether it is correct about the hacking or not?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
hacking
cyber-security
+2
votes
1
answer
Where can responses be viewed in Burp Suite?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
burp-suite
burp
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
1
answer
Which of the following can execute all the possible combination of attacks?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
attacks
cyber-attacks
cyber-security
burp
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+1
vote
1
answer
You can check the response in Intercept tab.
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
intercept-tab
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
+2
votes
2
answers
What is the task of the Comment control when intercepting a Burp Suite request?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
comment-contol
cyber-security
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
Page:
1
2
next »
...