Login
Remember
Register
User sharadyadav1986
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by sharadyadav1986
0
votes
Can you please explain what is Ethical hacking?
answered
Sep 1, 2020
in
Cyber Security
#ethical-hacking
#what-is-ethical-hacking
0
votes
Can you please explain what is IP and MAC Addresses?
answered
Sep 1, 2020
in
Cyber Security
#ip
#mac-address
#ip-address
0
votes
What do you mean by a worm?
answered
Sep 1, 2020
in
Cyber Security
#what-is-worm
#security-worm
0
votes
State the difference between virus and worm
answered
Sep 1, 2020
in
Cyber Security
#cyber-virus
#cyber-worm
0
votes
Name some tools used for packet sniffing.
answered
Sep 1, 2020
in
Cyber Security
#cyber-packet-sniffinf
0
votes
Explain anti-virus sensor systems
answered
Sep 1, 2020
in
Cyber Security
#cyber-anti-virus
#anti-virus-sensor-systems
0
votes
List out the types of sniffing attacks.
answered
Sep 1, 2020
in
Cyber Security
#sniffing-attacks
#sniffing-attacks-types
0
votes
Can you please explain what is a distributed denial-of-service attack (DDoS)?
answered
Sep 1, 2020
in
Cyber Security
#denial-of-service-attack
#ddos
0
votes
Explain the concept of session hijacking.
answered
Sep 1, 2020
in
Cyber Security
#session-hijacking
#session-hijack-attack
0
votes
List out various methods of session hijacking.
answered
Sep 1, 2020
in
Cyber Security
#session-hijack-methods
#methods-session-hijack
0
votes
Can you please explain what are Hacking Tools?
answered
Sep 1, 2020
in
Cyber Security
#hacking-tools
#tools-hacking
0
votes
Explain honeypot and its Types.
answered
Sep 1, 2020
in
Cyber Security
#honeypot
#honeypot-types
#types-honeypot
0
votes
Name common encryption tools.
answered
Sep 1, 2020
in
Cyber Security
#encryption-tools
#tools-encryption
0
votes
Can you please explain what is Backdoor?
answered
Sep 1, 2020
in
Cyber Security
#backdoor
#what-is-ackdoor
0
votes
Is it right to send login credentials through email?
answered
Sep 1, 2020
in
Cyber Security
#login-credential
#login-email-credential
0
votes
Explain the 80/20 rule of networking?
answered
Sep 1, 2020
in
Cyber Security
#80
20-rules
#rule-of-networking
0
votes
Define WEP cracking.
answered
Sep 1, 2020
in
Cyber Security
#what-is-wep-cracking
#wep-cracking
0
votes
Can you please explain what are various WEP cracking tools?
answered
Sep 1, 2020
in
Cyber Security
#wep-cracking-tools
#cracking-tools
0
votes
Can you please explain what is a security auditing?
answered
Sep 1, 2020
in
Cyber Security
#what-is-security-auditing
#security-auditing
0
votes
Explain phishing.
answered
Sep 1, 2020
in
Cyber Security
#what-is-phishing
#phishing
Page:
« prev
1
...
284
285
286
287
288
289
290
291
292
293
294
...
330
next »
...