Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
Ask a Question
Recent questions tagged attack
1
answer
The two common denial-of-service attacks are
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
common-terminology
ddos
attack
botnet
1
answer
What is a Distributed Denial-of-Service attack?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
ddos
service-center
attack
machine
operation-plan
1
answer
Individual networks may be affected by DoS attacks without being directly targeted
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
true-or-false
networking
individual
ddos
attack
1
answer
Are website defacement and DoS possible cyberattacks against websites?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
true-or-false
website
defacement
ddos
attack
1
answer
Select all factors that are ways in which you might become the victim of a terrorist attack.
asked
in
Jobs & Employment
by
voice
(
263k
points)
jobs-n-employment
anti-terrorism
awareness
training
best-way
victim
terror
attack
opportunity
location
1
answer
Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport
asked
in
Jobs & Employment
by
voice
(
263k
points)
jobs-n-employment
anti-terrorism
awareness
training
september
attack
attempt
airport
airline
1
answer
Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.
asked
in
Jobs & Employment
by
voice
(
263k
points)
jobs-n-employment
anti-terrorism
awareness
training
risk-avoidance
terror
attack
location
association
1
answer
Early symptoms of a biological attack may appear the same as common illnesses. True or False?
asked
in
Jobs & Employment
by
voice
(
263k
points)
jobs-n-employment
anti-terrorism
awareness
training
symptoms
biology
attack
physical-illness
appear
true-or-false
1
answer
What is a possible indication of a malicious code attack in progress?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
threat-indicator
malicious-code
attack
computer
1
answer
What type of phishing attack targets particular individuals, groups of people, or organizations?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
phishing
attack
individual
organisation
1
answer
You receive a call on your work phone and you're asked to participate in a phone survey. As part of the survey
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
work
participant
address
attack
social
engineer
1
answer
Which of the following makes Alex's personal information vulnerable to attacks by identity thieves?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
alex
personal-insurance
information
attack
identity
security
1
answer
Of the following, which is NOT a characteristic of a phishing attempt?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
character
phishing
attack
website
redirect
1
answer
P2P (Peer-to-Peer) software can do the following except:
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
p2p
peer-to-peer
software
attack
networking
access-code
1
answer
Spear Phishing attacks commonly attempt to impersonate email from trusted entities. What security device is used
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
phishing
attack
email
security
device
certificate
1
answer
Which is a way to protect against phishing attacks?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
protect
phishing
attack
certificate
cyber-attack
1
answer
Which of the following is true of Internet hoaxes?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
true-statement
internet-hoax
ddos
attack
1
answer
What is TRUE of a phishing attack?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-awareness
true-or-false
phishing
attack
hyperlink
email
bait
1
answer
What is the primary method of terrorist attack according to NCTC?
asked
in
Education
by
voice
(
263k
points)
education
education-quiz
fema
design
homeland-security
nctc
attack
building
arson
1
answer
Which item is an example of a threat and/or hazard that could potentially impact a building or site?
asked
in
Education
by
voice
(
263k
points)
education
education-quiz
fema
design
homeland-security
threat
potential-hazards
building
attack
1
answer
The geographical isolation of the United States is a sufficient barrier to prevent terrorist attacks?
asked
in
Education
by
voice
(
263k
points)
education
education-quiz
fema
design
homeland-security
true-or-false
geography
united-states
attack
1
answer
Risk is a combination of: The probability that an event will occur, and the probability that a terrorist will be
asked
in
Education
by
voice
(
263k
points)
education
education-quiz
fema
design
homeland-security
true-or-false
risk-management
special-events
attack
1
answer
Another driver verbally attacking you would be considered:
asked
in
Education
by
voice
(
263k
points)
education
education-quiz
traffic-school-test
distraction
driver
attack
fatigue
road-rage
aggressive-driving
1
answer
Which of these attributes are consistent with a passive communicator?
asked
in
People & Society
by
voice
(
263k
points)
people
people-quiz
attribute
consistent
passive
communication
criticize
blame
attack
1
answer
Which of the following statements about Sucrose is false?
asked
in
Games
by
voice
(
263k
points)
game
game-quiz
false-statement
sucrose
attack
aoe
anemo
passive-talent
character
Page:
1
2
next »
...