Home Members Notifications Clear all Advance Security Cyber Security Questions And Answers RSS Page 17 / 18 Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Next Votes & Answers Question Question Status 0 1 156 Which of the following is the main difference between a dos attack and a ddos attack? By Cyber Security Team, 3 years ago replies 1 0 1 392 Which of the following scenarios represents a phishing attempt? By Cyber Security Team, 3 years ago replies 1 0 1 161 Which type of malware self-replicates between computers (from one computer to another)? By Cyber Security Team, 3 years ago replies 1 0 1 139 Which encryption protocol does gre use to increase the security of its transmissions? By Cyber Security Team, 3 years ago replies 1 0 1 543 Which layer in the tcp/ip model is used for formatting, compressing, and encrypting data? By Cyber Security Team, 3 years ago replies 1 0 1 176 Which of the following is not a primary trait of malware? By Cyber Security Team, 3 years ago replies 1 0 1 369 Which of the following is the weakest symmetric encryption method? By Cyber Security Team, 3 years ago replies 1 0 1 327 Which of the following protocols can be enabled so email is encrypted on a mobile device? By Cyber Security Team, 3 years ago replies 1 0 1 178 Which of the following windows firewall profiles should a user configure if she is at the ... By Cyber Security Team, 3 years ago replies 1 0 1 170 Which of the following is not a technology typically used by spyware? By Cyber Security Team, 3 years ago replies 1 Page 17 / 18 Prev 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Next Share: