Hi Guest

MobileUser

1 HomePage 1 Jobs 1 WalkIn 1Articles  

Node.JS Books
Special Offer
Laptop Lenovo
GATE Exam

Cat Exam
Start a Blog
Develop Your Skill

Develop Your Skill

SQL Books

Develop Your Skill

 :) Latest Topic
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
leftlink
 leftlink
 :) Topic of Day
 
 :) Hot Jobs
 :)
 :) Most Searchable
 


 :) Quiz System
Computer Quiz
Science Quiz
Banking Quiz
Sports Quiz
GK Quiz


  

 
Which of the following should be covered under the security policy? View:-27046
Question Posted on 05 Aug 2021

Which of the following should be covered under the security policy?
Choose the correct option from below ....
ADS Posted In : Important Topics | Security Assessment



A type of attack that depends on human error rather than on vulnerabilities in the system. View:-34203
Question Posted on 04 Aug 2021

A type of attack that depends on human error rather than on vulnerabilities in the system.
Choose the cor....
ADS Posted In : Important Topics | Security Assessment


A technique of testing without having any knowledge of the internal working of the application View:-60174
Question Posted on 04 Aug 2021

A technique of testing without having any knowledge of the internal working of the application
Choose the....
ADS Posted In : Important Topics | Security Assessment


Assessing security and auditing security mean the same thing. View:-31984
Question Posted on 03 Aug 2021

Assessing security and auditing security mean the same thing.
Choose the correct option from below list <....
ADS Posted In : Important Topics | Security Assessment


The risk level decreases with increase in the likelihood of potential risk. View:-32645
Question Posted on 03 Aug 2021

The risk level decreases with increase in the likelihood of potential risk.
Choose the correct option fro....
ADS Posted In : Important Topics | Security Assessment


Which of the following exploits psychological manipulation in deceiving users to make security mistakes? View:-19879
Question Posted on 02 Aug 2021

Which of the following exploits psychological manipulation in deceiving users to make security mistakes?
....
ADS Posted In : Important Topics | Security Assessment


During the scanning phase of pen testing, which of the following method analyzes an application’s code to determine its behavior during runtime? View:-23486
Question Posted on 01 Aug 2021

During the scanning phase of pen testing, which of the following method analyzes an applications code to dete....
ADS Posted In : Important Topics | Security Assessment


Which of the following best finds uncommon and eccentric issues? View:-22901
Question Posted on 31 Jul 2021

Which of the following best finds uncommon and eccentric issues?
Choose the correct option from below lis....
ADS Posted In : Important Topics | Security Assessment


Penetration testing is also called as ethical hacking. View:-23896
Question Posted on 30 Jul 2021

Penetration testing is also called as ethical hacking.
Choose the correct option from below list
(1)F....
ADS Posted In : Important Topics | Security Assessment


Which among the following companies have bug bounty programs? View:-24289
Question Posted on 29 Jul 2021

Which among the following companies have bug bounty programs?
Choose the correct option from below list <....
ADS Posted In : Important Topics | Security Assessment


A type of computer attack that in which the intruder engages with the targeted system is known as _______________ View:-20499
Question Posted on 27 Jul 2021

A type of computer attack that in which the intruder engages with the targeted system is known as ___________....
ADS Posted In : Important Topics | Security Assessment


Which of the following can be considered as a sound example of social engineering attack? View:-22763
Question Posted on 26 Jul 2021

Which of the following can be considered as a sound example of social engineering attack?
Choose the corr....
ADS Posted In : Important Topics | Security Assessment


Which of the following is typically used by threat actors/security analysts trying to determine the security posture of externally accessible assets? View:-26496
Question Posted on 25 Jul 2021

Which of the following is typically used by threat actors security analysts trying to determine the security ....
ADS Posted In : Important Topics | Security Assessment


Passive fingerprinting sends and collects traffic to/from the target system. View:-32602
Question Posted on 25 Jul 2021

Passive fingerprinting sends and collects traffic to from the target system.
Choose the correct option fr....
ADS Posted In : Important Topics | Security Assessment


Which of the following is best used for penetration testing? View:-29546
Question Posted on 24 Jul 2021

Which of the following is best used for penetration testing?
Choose the correct option from below list
ADS Posted In : Important Topics | Security Assessment


Which among the following involves evaluating security against a standard to check for complaince? View:-26605
Question Posted on 23 Jul 2021

Which among the following involves evaluating security against a standard to check for complaince?
Choose....
ADS Posted In : Important Topics | Security Assessment


Which of the following assessment type works to determine whether a threat made/detected, is genuine? View:-20671
Question Posted on 22 Jul 2021

Which of the following assessment type works to determine whether a threat made detected, is genuine?
Cho....
ADS Posted In : Important Topics | Security Assessment


A type of testing with limited knowledge of the internal working of an application View:-21544
Question Posted on 21 Jul 2021

A type of testing with limited knowledge of the internal working of an application
Choose the correct opt....
ADS Posted In : Important Topics | Security Assessment


Which of the following aims to integrate the defensive tactics and controls from the Blue Team with the threats and vulnerabilities found by the Red T View:-21269
Question Posted on 19 Jul 2021

Which of the following aims to integrate the defensive tactics and controls from the Blue Team with the threa....
ADS Posted In : Important Topics | Security Assessment


A process that aims to gain information about a system without directly engaging with the system is known as _______________ View:-25666
Question Posted on 18 Jul 2021

A process that aims to gain information about a system without directly engaging with the system is known as ....
ADS Posted In : Important Topics | Security Assessment


The type of security assessment that aims to test the organization's detection and response capabilities View:-52260
Question Posted on 17 Jul 2021

The type of security assessment that aims to test the organizations detection and response capabilities
C....
ADS Posted In : Important Topics | Security Assessment


The process that involves analyzing entities like TCP and ICMP to identify an application or an operating system View:-24660
Question Posted on 16 Jul 2021

The process that involves analyzing entities like TCP and ICMP to identify an application or an operating sys....
ADS Posted In : Important Topics | Security Assessment


Which among the following aims at bringing the level of acceptable risk and the current risk level in line? View:-26938
Question Posted on 15 Jul 2021

Which among the following aims at bringing the level of acceptable risk and the current risk level in line? <....
ADS Posted In : Important Topics | Security Assessment


The type of vulnerability scan that facilitates access to low-level data. View:-36565
Question Posted on 13 Jul 2021

The type of vulnerability scan that facilitates access to low level data.
Choose the correct option from ....
ADS Posted In : Important Topics | Security Assessment


1
 
  
 :) Categoriese
 :) Most Visited Questions