Login
Remember
Register
User SakshiSharma
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by SakshiSharma
0
votes
Which of the following is not a type of scanning?
answered
Feb 19, 2022
in
Cyber Security
scanning
0
votes
Which of the following is not a cybercrime?
answered
Feb 19, 2022
in
Cyber Security
cyber-crime
0
votes
In ethical hacking and cyber security, there are _______ types of scanning:
answered
Feb 19, 2022
in
Cyber Security
ethical-hacking
0
votes
Which of the following is an objective of network security?
answered
Feb 19, 2022
in
Cyber Security
network-security
0
votes
Which of the following port and IP address scanner famous among the users?
answered
Feb 19, 2022
in
Cyber Security
ip-scanner
ip-address-scan
0
votes
What are the features of cyber security?
answered
Feb 19, 2022
in
Cyber Security
cyber-security-features
0
votes
Client-side scripts can be allowed to execute in the browsers for needed operations.
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
client-side-script
0
votes
Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
script-execution
0
votes
Which of the following are most likely to result in insecure cryptography?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
insecure-cryptography
0
votes
What is an attack that exploits the trust a site has in a user’s browser?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
user-browser
0
votes
Role-based access control helps prevent which OWASP Top 10 vulnerability?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
owasp
access-control
0
votes
What happens when an application takes user inputted data and sends it to a web browser, without proper validation?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
input-data
web
browser
0
votes
What is an attack that forces a user’s session credential or session ID to an explicit value?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
session-id
user-credential
0
votes
Which of the following languages are the primary targets of cross-site scripting?
answered
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
cross-site-scripting
0
votes
What are the Utility programs in JCL?
answered
Jan 9, 2022
in
JCL
utility-program
0
votes
Which statement is used to identify the private libraries in JOB?
answered
Jan 9, 2022
in
JCL
private-libraries
0
votes
Which utility is used to run a COBOL-DB2 Program?
answered
Jan 9, 2022
in
JCL
cobol-db2
0
votes
Explain the hierarchy levels in JCL?
answered
Jan 9, 2022
in
JCL
jcl-hierarchy
0
votes
What is the use of symbol // in JCL?
answered
Jan 9, 2022
in
JCL
jcl-symbol
0
votes
Differentiate between the JOBLIB and the STEPLIB statements?
answered
Jan 9, 2022
in
JCL
joblib
steplib
Page:
« prev
1
...
81
82
83
84
85
86
87
88
89
90
91
...
382
next »
...