A company blocks inbound ports but leaves all outbound traffic open. Which attack goal is still easiest? A Screen capture
Continue readingCategory: 0. BLOG
Your blog category
Chapter 12: Cyber Security, Malware, and Protection Tools (Set-9)
A company decides which systems need strongest controls by checking “likelihood + damage.” What is this activity called? A File
Continue readingChapter 12: Cyber Security, Malware, and Protection Tools (Set-8)
A company ranks systems as “critical, important, normal” before applying controls. This process is called A Disk formatting B Screen
Continue readingChapter 12: Cyber Security, Malware, and Protection Tools (Set-7)
Which term means “system weakness”? A Antivirus B Encryption C Vulnerability D Backup Explanation Explanation: A vulnerability is a weakness
Continue readingChapter 12: Cyber Security, Malware, and Protection Tools (Set-6)
Which term means “harmful online danger”? A Disk space B Screen saver C Cyber threat D File format Explanation A
Continue readingChapter 12: Cyber Security, Malware, and Protection Tools (Set-5)
A company uses the same admin password on many routers. Which risk becomes most serious if one password leaks? A
Continue readingChapter 12: Cyber Security, Malware, and Protection Tools (Set-4)
A security officer asks employees to report any suspicious email within 10 minutes using a fixed form. This practice mainly
Continue readingChapter 12: Cyber Security, Malware, and Protection Tools (Set-3)
A security team lists “customer database, admin accounts, payment system” and then decides which needs strongest protection first. What step
Continue readingChapter 12: Cyber Security, Malware, and Protection Tools (Set-2)
In cyber security, what term describes anything valuable that must be protected, like files, accounts, or devices? A Asset B
Continue readingChapter 12: Cyber Security, Malware, and Protection Tools (Set-1)
A company stores customer data online. Which term best describes a weakness that attackers can exploit in its system? A
Continue reading