Cybersecurity Cybersecurity 93 Questions Ask question Search Order By: ActiveTagClear Filter 6 Votes 13 Ans What should children know about the risks of online gaming ? Featured776 viewsBibek Baniya Answered question January 18, 2025CybersecurityCyber Education cybersecurity online gaming 0 Votes 0 Ans How does ransomware work, and why has it become a growing threat in recent years? 7 viewsBibek Baniya Asked question 5 days agoCybersecuritycybercrime 0 Votes 0 Ans What are the consequences for organizations that fail to secure customer data against cyberattacks? 7 viewsBibek Baniya Asked question 5 days agoCybersecuritycybercrime 0 Votes 0 Ans What role do ethical hackers play in combating cybercrime? 7 viewsBibek Baniya Asked question 5 days agoCybersecuritycybercrime 0 Votes 0 Ans How can individuals protect themselves from phishing scams and identity theft? 7 viewsBibek Baniya Asked question 5 days agoCybersecuritycybercrime 0 Votes 0 Ans What are some of the most common types of cybercrimes people fall victim to today? 7 viewsBibek Baniya Asked question 5 days agoCybersecuritycybercrime 1 Votes 1 Ans Why is it risky to use public Wi-Fi, and how can you stay safe when using it? 45 viewspraxantp Answered question January 19, 2025Cybersecuritycybersecurity 1 Votes 1 Ans What is the purpose of encrypting sensitive data, and how does it work? 40 viewspraxantp Answered question January 19, 2025CybersecurityCyber Security 1 Votes 1 Ans What is a firewall, and how does it help protect your devices? 38 viewspraxantp Answered question January 19, 2025Cybersecuritycybersecurity 1 Votes 1 Ans What is social engineering, and how do cybercriminals use it to trick people? 38 viewspraxantp Answered question January 19, 2025Cybersecuritycybersecurity 0 Votes 1 Ans What is Cross Site Scripting (XSS)? 46 viewsBibek Baniya Answered question January 18, 2025CybersecurityCyber Education 0 Votes 1 Ans What is SQL injection in Computer Network? 46 viewsBibek Baniya Answered question January 18, 2025CybersecurityCyber Education 0 Votes 0 Ans What is the role of an antivirus program, and how often should you scan your devices? 33 viewsBibek Baniya Asked question January 17, 2025CybersecurityCyber Security 0 Votes 0 Ans How can you spot a fake or malicious website designed to steal your information? 73 viewsBibek Baniya Asked question January 17, 2025Cybersecuritycybersecurity 0 Votes 0 Ans What should you do if you suspect your personal data has been leaked in a data breach? 30 viewsBibek Baniya Asked question January 17, 2025Cybersecuritycybersecurity 0 Votes 0 Ans How can you safely dispose of an old computer or smartphone without exposing your personal data? 38 viewsBibek Baniya Asked question January 17, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What is the principle of least privilege, and how does it enhance security in a network? 38 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What are the key differences between a virus, a worm, and a Trojan horse in malware? 37 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What are zero-day vulnerabilities, and why are they particularly dangerous for organizations? 33 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What is ransomware, and what steps can organizations take to defend against ransomware attacks? 36 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What is the difference between symmetric and asymmetric encryption? 33 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 1 Ans What is IP spoofing? 29 viewsBibek Baniya Answered question January 16, 2025CybersecurityCyber Education 1 Votes 1 Ans What is the significance of Secure Sockets Layer(SSL)? 34 viewsBibek Baniya Answered question January 16, 2025CybersecurityCyber Education 2 Votes 2 Ans What is Payload in Cyber Security? 74 viewsKrishna Poudel Answered question January 15, 2025CybersecurityCyber Education 1 Votes 1 Ans Is it important to set difficult password ? 50 viewsKrishna Poudel Answered question January 15, 2025Cybersecuritycybersecurity 0 Votes 1 Ans What is Remote Access Trojan (RAT)? 29 viewsBibek Baniya Answered question January 15, 2025CybersecurityCyber Education 0 Votes 0 Ans what is phishing ? 31 viewsBibek Baniya Asked question January 15, 2025Cybersecuritycybersecurity 0 Votes 0 Ans what is cyber security ? 33 viewsBibek Baniya Asked question January 15, 2025CybersecurityCyber Security website security 1 Votes 1 Ans What is OSINT in Cyber Security? 58 viewsKrishna Poudel Answered question January 14, 2025CybersecurityCyber Education Cyber Security 1 Votes 3 Ans What is DLP in Cyber Security? 79 viewsKrishna Poudel Answered question January 14, 2025CybersecurityCyber Security 1 Votes 2 Ans What is Zero-day in Cyber Security? 63 viewsRojan Adhikari Answered question January 13, 2025CybersecurityCyber Security 1 Votes 3 Ans What is APT in Cyber Security? 76 viewsManish Ruchal Answered question January 13, 2025CybersecurityCyber Security 0 Votes 0 Ans What are CVE’s in Cyber Security? 24 viewspraxantp Asked question January 12, 2025CybersecurityCyber Education Cyber Security 2 Votes 3 Ans What skills are important for an ethical hacker? 97 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 1 Votes 2 Ans What are some social engineering attacks? 81 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 2 Votes 3 Ans What’s footprinting? 98 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 1 Votes 3 Ans What are some challenges faced by ethical hackers? 102 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 1 Votes 2 Ans What’s the difference between ethical and malicious hacking? 78 viewsAman Sharma Answered question January 9, 2025Cybersecuritybest books 2 Votes 6 Ans Is this site (bhudki) safe for using in daily basis? 256 viewsbjacharya Answered question December 26, 2024Cybersecuritybhudki 1 Votes 0 Ans What is the primary function of a Virtual Private Network (VPN)? 75 viewsManish Ruchal Posted new comment December 26, 2024CybersecurityCyber Security vpn 3 Votes 8 Ans Cybersecurity / Ethical Hacking / Digital Forensics Updates ? 373 viewsBrother Anna Answered question December 24, 2024Cybersecuritycybersecurity digital forensics ethical hacking 2 Votes 3 Ans Does this site (bhudki) have permission to sent unusual mails? 143 viewsRojan Adhikari Answered question December 24, 2024Cybersecuritybhudki 1 Votes 2 Ans What is the weakest link in any cybersecurity system? 109 viewsRojan Adhikari Answered question December 24, 2024CybersecurityCyber Security cybersecurity 1 Votes 4 Ans What does the term “zero-day vulnerability” refer to? 161 viewsRojan Adhikari Answered question December 22, 2024CybersecurityCyber Security cybersecurity 1 Votes 3 Ans What is the role of penetration testing in cybersecurity? 136 viewsBhudki Changed status to publish December 19, 2024CybersecurityCyber Security cybersecurity 0 Votes 1 Ans What is the main purpose of two-factor authentication (2FA) 91 viewsBhudki Changed status to publish December 19, 2024CybersecurityCyber Security cybersecurity 1 Votes 2 Ans Which type of attack involves guessing a password repeatedly until the correct one is found? 134 views2xm Answered question December 18, 2024CybersecurityCyber Security cybersecurity 0 Votes 0 Ans Which protocol is used to securely transfer data over the internet? 64 viewsAman Sharma Asked question December 18, 2024CybersecurityCyber Security 0 Votes 0 Ans Which type of malware is designed to replicate itself and spread to other systems? 68 viewsAman Sharma Asked question December 18, 2024CybersecurityCyber Security cybersecurity 0 Votes 0 Ans What does the acronym “DDoS” stand for? 63 viewsAman Sharma Asked question December 18, 2024CybersecurityCyber Security cybersecurity 0 Votes 0 Ans What is the primary purpose of a firewall in a network security system? 68 viewsAman Sharma Asked question December 18, 2024CybersecurityCyber Security cybersecurity 5 Votes 1 Ans How can school kids learn to spot fake news or manipulation? 205 viewsbjacharya Answered question December 4, 2024CybersecurityCyber Education cybersecurity 4 Votes 5 Ans What’s a trojan, and why should kids stay away from it ? 244 viewsBrother Anna Posted new comment November 29, 2024Cybersecuritykid safety online kids cybersecurity 1 Votes 3 Ans What should a kid do if a pop-up says to click a link? 205 viewsAman Sharma Answered question November 14, 2024Cybersecuritychild safety online kid safety online kids cybersecurity 3 Votes 3 Ans Why is it safer for kids to download apps only from trusted stores? 210 viewsAnzeena Ghimire Posted new comment November 14, 2024Cybersecuritychild safety online kid safety online kids cybersecurity 2 Votes 3 Ans Why should kids be careful with links in emails? 197 viewsBrother Anna Answered question November 13, 2024Cybersecuritychild safety online kid safety online kids cybersecurity 2 Votes 4 Ans What should kids know about free apps that ask for personal information? 350 viewsBinita Bhattarai Answered question November 13, 2024Cybersecuritychild safety online kid safety online kids cybersecurity 2 Votes 2 Ans Why should kids avoid downloading “free cheats” for games? 195 viewsAnzeena Ghimire Answered question November 13, 2024Cybersecuritychild safety online kid safety online kids cybersecurity 3 Votes 2 Ans How can schools help kids talk about online dangers safely? 229 viewsbjacharya Posted new comment November 15, 2024CybersecurityCyber Education cybersecurity 0 Votes 0 Ans What are warning signs that a kid’s device might have spyware? 140 viewsbjacharya Asked question November 11, 2024Cybersecuritychild safety online kid safety online 2 Votes 2 Ans What habits can help school kids stay safe online long-term? 223 viewsW@nihon1 Answered question November 11, 2024CybersecurityCyber Education cybersecurity 3 Votes 2 Ans How can schools teach their kid to learn / recognize and report phishing? 270 viewsBrother Anna Answered question November 11, 2024CybersecurityCyber Education cybersecurity 3 Votes 3 Ans What are the key risks associated with online gaming and online friendships for children ? 305 viewsBrother Anna Posted new comment November 11, 2024Cybersecuritykid safety online online gaming 1 Votes 1 Ans How can OSINT techniques gather info from social media legally? 163 viewsAnonymous Posted new comment November 6, 2024Cybersecurityosint 3 Votes 2 Ans How do OSINT tools track digital footprints? 192 viewsAnonymous Posted new comment November 6, 2024Cybersecurityosint 1 Votes 0 Ans How to use theHarvester to discover subdomains and email addresses associated with a company? 133 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint theharvester 1 Votes 0 Ans How to save and analyze theHarvester output in formats compatible with other OSINT tools? 134 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint theharvester 0 Votes 0 Ans How to set up Shodan alerts to monitor for specific IP addresses or network vulnerabilities? 125 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint shodan 0 Votes 0 Ans How to search for unsecured IoT devices on Shodan and filter by location or device type? 125 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint shodan 0 Votes 0 Ans How to automate scans with SpiderFoot and export the data to external platforms? 129 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint 0 Votes 0 Ans How to set up and use custom transforms in Maltego for more specific OSINT needs? 126 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint 0 Votes 0 Ans How to create a relationship map in Maltego between a person and multiple organizations? 128 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint 1 Votes 3 Ans How to explain to kids why they should avoid clicking unknown links online? 255 viewsBhudki Changed status to publish November 1, 2024Cybersecuritykids cybersecurity 4 Votes 4 Ans How to teach kids the importance of keeping personal information private online? 318 viewsLazy GPT Answered question October 28, 2024Cybersecuritykids cybersecurity 2 Votes 2 Ans What role do ethical hackers play in enhancing cybersecurity? 170 viewsRojan Adhikari Answered question October 27, 2024CybersecurityCyber Education 1 Votes 2 Ans In your opinion, how important is digital literacy in preventing cyber threats? 182 viewsLazy GPT Answered question October 26, 2024CybersecurityCyber Education 1 Votes 1 Ans Describe a situation where sharing too much information online might put someone at risk? 168 viewsW@nihon1 Answered question October 26, 2024CybersecurityCyber Education 1 Votes 2 Ans How can you explain the concept of a “digital footprint”in simple words? 167 viewsBhudki Answered question October 26, 2024CybersecurityCyber Education 5 Votes 4 Ans How to create engaging cybersecurity awareness activities for children? 348 viewsBhudki Posted new comment October 22, 2024Cybersecuritychild safety online Cyber Security 9 Votes 4 Ans What is social engineering, and how does it exploit human behavior in cybersecurity? 311 viewsBhudki Changed status to publish October 22, 2024CybersecurityCyber Security social engineering 2 Votes 2 Ans What is pretexting in social engineering, how do attackers use it to gather sensitive information? 288 viewsRojan Adhikari Answered question October 19, 2024Cybersecuritycybersecurity social engineering 1 Votes 1 Ans What are the common emotional triggers that social engineers use to manipulate their targets? 238 viewsAnonymous Posted new comment October 19, 2024CybersecurityCyber Security cybersecurity social engineering 3 Votes 4 Ans What age is appropriate for a child to start using social media? 289 viewsRojan Adhikari Answered question October 11, 2024CybersecurityCyber Education Cyber Security 1 Votes 1 Ans What are some effective ways to protect children from online cyberbullying? 166 viewsAman Sharma Answered question October 7, 2024CybersecurityCyber Education 0 Votes 0 Ans What steps can be taken to prevent children from accessing inappropriate content online? 146 viewspraxantp Asked question October 7, 2024CybersecurityCyber Security 4 Votes 4 Ans What are the top parental control tools for child safety online in 2024? 319 viewspraxantp Answered question October 7, 2024Cybersecuritychild safety online 4 Votes 5 Ans What are the best practices for ensuring child safety online? 358 viewspraxantp Answered question October 7, 2024Cybersecuritychild safety online 5 Votes 5 Ans How can we monitor our child’s online activity without invading their privacy? 321 viewsKrishna Poudel Answered question October 6, 2024Cybersecuritychild safety online 3 Votes 4 Ans How to help children recognize and avoid online scams and phishing attempts? 326 viewsKrishna Poudel Answered question October 6, 2024Cybersecuritychild safety online Cyber Security 4 Votes 4 Ans What are the biggest risks children face online and how to prevent them? 331 viewsbjacharya Posted new comment October 6, 2024Cybersecuritychild safety online 0 Votes 1 Ans How to educate children about the dangers of cyberbullying and safe online behavior? 188 viewsAman Sharma Answered question October 5, 2024Cybersecuritychild safety online Cyber Security 0 Votes 0 Ans How to teach children the importance of online privacy and protecting personal information? 161 viewsbjacharya Asked question October 5, 2024Cybersecuritychild safety online Cyber Security 3 Votes 2 Ans How can we protect our child from cyberbullying and online predators? 241 viewsBhudki Edited answer October 5, 2024Cybersecuritychild safety online