cybersecurity cybersecurity 37 Questions Ask question Search Order By: ActiveCategoryClear Filter 6 Votes 13 Ans What should children know about the risks of online gaming ? Featured779 viewsBibek Baniya Answered question January 18, 2025CybersecurityCyber Education cybersecurity online gaming 1 Votes 1 Ans Why is it risky to use public Wi-Fi, and how can you stay safe when using it? 47 viewspraxantp Answered question January 19, 2025Cybersecuritycybersecurity 1 Votes 1 Ans What is a firewall, and how does it help protect your devices? 40 viewspraxantp Answered question January 19, 2025Cybersecuritycybersecurity 1 Votes 1 Ans What is social engineering, and how do cybercriminals use it to trick people? 40 viewspraxantp Answered question January 19, 2025Cybersecuritycybersecurity 0 Votes 0 Ans How can you spot a fake or malicious website designed to steal your information? 77 viewsBibek Baniya Asked question January 17, 2025Cybersecuritycybersecurity 0 Votes 0 Ans What should you do if you suspect your personal data has been leaked in a data breach? 32 viewsBibek Baniya Asked question January 17, 2025Cybersecuritycybersecurity 0 Votes 0 Ans How can you safely dispose of an old computer or smartphone without exposing your personal data? 39 viewsBibek Baniya Asked question January 17, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What is the principle of least privilege, and how does it enhance security in a network? 41 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What are the key differences between a virus, a worm, and a Trojan horse in malware? 40 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What are zero-day vulnerabilities, and why are they particularly dangerous for organizations? 36 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What is ransomware, and what steps can organizations take to defend against ransomware attacks? 38 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 0 Ans What is the difference between symmetric and asymmetric encryption? 35 viewsBibek Baniya Asked question January 16, 2025Cybersecuritycybersecurity 1 Votes 1 Ans Is it important to set difficult password ? 50 viewsKrishna Poudel Answered question January 15, 2025Cybersecuritycybersecurity 0 Votes 0 Ans what is phishing ? 31 viewsBibek Baniya Asked question January 15, 2025Cybersecuritycybersecurity 3 Votes 8 Ans Cybersecurity / Ethical Hacking / Digital Forensics Updates ? 373 viewsBrother Anna Answered question December 24, 2024Cybersecuritycybersecurity digital forensics ethical hacking 1 Votes 2 Ans What is the weakest link in any cybersecurity system? 111 viewsRojan Adhikari Answered question December 24, 2024CybersecurityCyber Security cybersecurity 1 Votes 4 Ans What does the term “zero-day vulnerability” refer to? 162 viewsRojan Adhikari Answered question December 22, 2024CybersecurityCyber Security cybersecurity 1 Votes 3 Ans What is the role of penetration testing in cybersecurity? 138 viewsBhudki Changed status to publish December 19, 2024CybersecurityCyber Security cybersecurity 0 Votes 1 Ans What is the main purpose of two-factor authentication (2FA) 93 viewsBhudki Changed status to publish December 19, 2024CybersecurityCyber Security cybersecurity 1 Votes 2 Ans Which type of attack involves guessing a password repeatedly until the correct one is found? 135 views2xm Answered question December 18, 2024CybersecurityCyber Security cybersecurity 0 Votes 0 Ans Which type of malware is designed to replicate itself and spread to other systems? 70 viewsAman Sharma Asked question December 18, 2024CybersecurityCyber Security cybersecurity 0 Votes 0 Ans What does the acronym “DDoS” stand for? 63 viewsAman Sharma Asked question December 18, 2024CybersecurityCyber Security cybersecurity 0 Votes 0 Ans What is the primary purpose of a firewall in a network security system? 70 viewsAman Sharma Asked question December 18, 2024CybersecurityCyber Security cybersecurity 5 Votes 1 Ans How can school kids learn to spot fake news or manipulation? 205 viewsbjacharya Answered question December 4, 2024CybersecurityCyber Education cybersecurity 3 Votes 2 Ans How can schools help kids talk about online dangers safely? 229 viewsbjacharya Posted new comment November 15, 2024CybersecurityCyber Education cybersecurity 2 Votes 2 Ans What habits can help school kids stay safe online long-term? 223 viewsW@nihon1 Answered question November 11, 2024CybersecurityCyber Education cybersecurity 3 Votes 2 Ans How can schools teach their kid to learn / recognize and report phishing? 270 viewsBrother Anna Answered question November 11, 2024CybersecurityCyber Education cybersecurity 1 Votes 0 Ans How to use theHarvester to discover subdomains and email addresses associated with a company? 133 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint theharvester 1 Votes 0 Ans How to save and analyze theHarvester output in formats compatible with other OSINT tools? 134 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint theharvester 0 Votes 0 Ans How to set up Shodan alerts to monitor for specific IP addresses or network vulnerabilities? 125 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint shodan 0 Votes 0 Ans How to search for unsecured IoT devices on Shodan and filter by location or device type? 125 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint shodan 0 Votes 0 Ans How to automate scans with SpiderFoot and export the data to external platforms? 129 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint 0 Votes 0 Ans How to set up and use custom transforms in Maltego for more specific OSINT needs? 126 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint 0 Votes 0 Ans How to create a relationship map in Maltego between a person and multiple organizations? 128 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint 1 Votes 1 Ans Explain Trojan Virus in context of cybersecurity. 138 viewsBhudki Answered question October 24, 2024Otherscybersecurity Trojan 2 Votes 2 Ans What is pretexting in social engineering, how do attackers use it to gather sensitive information? 288 viewsRojan Adhikari Answered question October 19, 2024Cybersecuritycybersecurity social engineering 1 Votes 1 Ans What are the common emotional triggers that social engineers use to manipulate their targets? 238 viewsAnonymous Posted new comment October 19, 2024CybersecurityCyber Security cybersecurity social engineering