Recent questions tagged Cyber-security-interview-questions-answers

0 votes
    From the options below, which of them is not a threat to information security? (a) Disaster (b) Eavesdropping (c ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    From the options below, which of them is not a vulnerability to information security? (a) flood (b) without ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    _____ platforms are used for safety and protection of information in the cloud. (a) Cloud workload protection platforms ( ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following information security technology is used for avoiding browser-based hacking? (a) Anti-malware in ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    The full form of EDR is _______ (a) Endpoint Detection and recovery (b) Early detection and response (c) Endpoint ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    _______ technology is used for analyzing and monitoring traffic in network and information flow. (a) Cloud access security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Compromising confidential information comes under _________ (a) Bug (b) Threat (c) Vulnerability (d) Attack I got this ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Lack of access control policy is a _____________ (a) Bug (b) Threat (c) Vulnerability (d) Attack I have been ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Possible threat to any information cannot be ________________ (a) reduced (b) transferred (c) protected (d) ignored The ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
...