cybersecurity cybersecurity 24 Questions Ask question Search Order By: ActiveCategoryClear Filter 5 Votes 10 Ans What should children know about the risks of online gaming ? Featured471 viewsAryan Karki Answered question 5 days agoCybersecurityCyber Education cybersecurity online gaming 1 Votes 3 Ans What is the role of penetration testing in cybersecurity? 36 viewsBhudki Changed status to publish 2 days agoCybersecurityCyber Security cybersecurity 1 Votes 3 Ans What does the term “zero-day vulnerability” refer to? 38 viewsBhudki Changed status to publish 2 days agoCybersecurityCyber Security cybersecurity 0 Votes 1 Ans What is the main purpose of two-factor authentication (2FA) 21 viewsBhudki Changed status to publish 2 days agoCybersecurityCyber Security cybersecurity 1 Votes 2 Ans Which type of attack involves guessing a password repeatedly until the correct one is found? 40 views2xm Answered question 3 days agoCybersecurityCyber Security cybersecurity 0 Votes 0 Ans What is the weakest link in any cybersecurity system? 16 viewsAman Sharma Asked question 3 days agoCybersecurityCyber Security cybersecurity 0 Votes 0 Ans Which type of malware is designed to replicate itself and spread to other systems? 15 viewsAman Sharma Asked question 3 days agoCybersecurityCyber Security cybersecurity 0 Votes 0 Ans What does the acronym “DDoS” stand for? 14 viewsAman Sharma Asked question 3 days agoCybersecurityCyber Security cybersecurity 0 Votes 0 Ans What is the primary purpose of a firewall in a network security system? 13 viewsAman Sharma Asked question 3 days agoCybersecurityCyber Security cybersecurity 4 Votes 1 Ans How can school kids learn to spot fake news or manipulation? 142 viewsbjacharya Answered question December 4, 2024CybersecurityCyber Education cybersecurity 2 Votes 7 Ans Cybersecurity / Ethical Hacking / Digital Forensics Updates ? 172 views2xm Answered question December 3, 2024Cybersecuritycybersecurity digital forensics ethical hacking 2 Votes 2 Ans How can schools help kids talk about online dangers safely? 176 viewsbjacharya Posted new comment November 15, 2024CybersecurityCyber Education cybersecurity 1 Votes 2 Ans What habits can help school kids stay safe online long-term? 155 viewsW@nihon1 Answered question November 11, 2024CybersecurityCyber Education cybersecurity 2 Votes 2 Ans How can schools teach their kid to learn / recognize and report phishing? 194 viewsBrother Anna Answered question November 11, 2024CybersecurityCyber Education cybersecurity 0 Votes 0 Ans How to use theHarvester to discover subdomains and email addresses associated with a company? 91 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint theharvester 0 Votes 0 Ans How to save and analyze theHarvester output in formats compatible with other OSINT tools? 90 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint theharvester 0 Votes 0 Ans How to set up Shodan alerts to monitor for specific IP addresses or network vulnerabilities? 91 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint shodan 0 Votes 0 Ans How to search for unsecured IoT devices on Shodan and filter by location or device type? 85 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint shodan 0 Votes 0 Ans How to automate scans with SpiderFoot and export the data to external platforms? 89 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint 0 Votes 0 Ans How to set up and use custom transforms in Maltego for more specific OSINT needs? 84 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint 0 Votes 0 Ans How to create a relationship map in Maltego between a person and multiple organizations? 86 viewsBhudki Asked question November 6, 2024Cybersecuritycybersecurity osint 1 Votes 1 Ans Explain Trojan Virus in context of cybersecurity. 93 viewsBhudki Answered question October 24, 2024Otherscybersecurity Trojan 2 Votes 2 Ans What is pretexting in social engineering, how do attackers use it to gather sensitive information? 238 viewsRojan Adhikari Answered question October 19, 2024Cybersecuritycybersecurity social engineering 1 Votes 1 Ans What are the common emotional triggers that social engineers use to manipulate their targets? 184 viewsAnonymous Posted new comment October 19, 2024CybersecurityCyber Security cybersecurity social engineering