🐷
Categories
Random
Search
My bookmarks
Explore
Log In
Sign up
Back to categories
Security
Page 1
Share
Why?
National Association of Regulatory Utility Commissioners
What is the purpose of the NARUC committee on Critical Infrastructure?
To examine consumer protection in the telecommunications industry
To promote renewable energy
To address security concerns surrounding utility infrastructure
Was this a good question?
👍
👎
Share
Why?
Access control
What is multi-factor authentication?
Authentication using only one factor
Authentication using two factors
Authentication using three or more factors
Was this a good question?
👍
👎
Share
Why?
Access control
What is the difference between physical and electronic access control?
Physical access control uses computers to solve the limitations of mechanical locks and keys, while electronic access control is achieved through mechanical or human means
Physical access control is achieved through mechanical or human means, while electronic access control uses computers to solve the limitations of mechanical locks and keys
Physical and electronic access control are the same thing
Was this a good question?
👍
👎
Share
Why?
Access control
What is access control?
The practice of restricting entrance to a property, a building, or a room to unauthorized persons
The practice of allowing entrance to a property, a building, or a room to unauthorized persons
The practice of restricting entrance to a property, a building, or a room to authorized persons
Was this a good question?
👍
👎
Share
Why?
XHamster
What was the reason for xHamster incorporating HTTPS encryption?
To protect user privacy
To protect against malware
To protect information exchange
To comply with regulations
Was this a good question?
👍
👎
Share
Why?
Open-source intelligence
What is the main hindrance to practical OSINT?
Lack of access to classified information
Lack of access to covert sources
Volume of information
Was this a good question?
👍
👎
Share
Why?
Open-source intelligence
What was the purpose of the creation of the DNI Open Source Center?
To collect classified information
To collect information from covert sources
To collect information available from various sources and train analysts to make better use of this information
Was this a good question?
👍
👎
Share
Why?
Open-source intelligence
What is the definition of OSINT according to NATO?
Intelligence derived from classified information
Intelligence derived from publicly available information
Intelligence derived from covert sources
Was this a good question?
👍
👎
Share
Why?
Hacker
What is the difference between a hacker and a cracker?
A hacker is someone who breaks into computer systems, while a cracker is someone who improves computer security
A hacker is someone who is skilled in computer technology, while a cracker is someone who is not
A hacker is someone who subverts computer security for malicious purposes, while a cracker is someone who does not
A hacker is someone who is interested in computer technology, while a cracker is someone who is not
Was this a good question?
👍
👎
Share
Why?
Hacker
What is the primary motive for state-sponsored cyber attacks?
Financial gain
Corporate espionage
Increasing reputation within the hacker subculture
Intelligence gathering and wartime purposes
Was this a good question?
👍
👎
Next