Topics
Products
Follow Us:

Internet Security Questions and Answers (Q&A)

John Smith
Answered: Apr 02, 2020
False

Password hints and reminders can help to jog your memory and help to avoid creating another password. If you can create your own password hint make sure it only makes sense to...Read More

2 Answers

313 views
John Smith
Answered: Apr 02, 2020
123456

According to recent analysis 123456 is the most commonly used password[1], however; these passwords all appear on Twitters list of 370 banned passwords[2] and should be avoided at...Read More

2 Answers

300 views
John Smith
Answered: Apr 02, 2020
True

If you save your password on a public computer the next person to use that computer may access your accounts. This might also apply to your home computer or laptop; if curious siblings...Read More

1 Answer

273 views
Vadnaisk
Answered: Apr 02, 2020
A standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target...Read More

1 Answer

264 views
John Smith
Answered: Apr 02, 2020
All of the above-all of these techniques can be used to create a strong password. mnemonics can be used to make your password easy to remember (e.g. condense a rude phrase or a funny joke into a...Read More

2 Answers

254 views
SecurityQuizmaster
Answered: Apr 02, 2020
Choose something you can remember, but modify it with a complex pattern that only you know

Use a password strategy to create a memorable, unique password

1 Answer

231 views
John Smith
Answered: Apr 02, 2020
As long as possible-contrary to popular belief, a lengthy password can be as secure, if not more, than a complex password. A lengthy password should be used to increase the amount of time it could...Read More

1 Answer

228 views
John Smith
Answered: Apr 02, 2020
Them(12)[email protected] a memorable phrase and using a mixture of special characters, alternate spellings, and varying cases (upper and lower case letters) in a memorable way is an...Read More

1 Answer

221 views
John Smith
Answered: Apr 02, 2020
Using manipulation to deceive people that you are someone you are not to gain access to the information you need

The correct answer is c). Social Engineering uses influence and persuasion...Read More

1 Answer

215 views
SecurityQuizmaster
Answered: Apr 02, 2020
It depends!

There are variables other than length that determine how quickly a password can be cracked. The types of characters used, whether or not the password is based on a common word...Read More

1 Answer

210 views
Islas
Answered: Nov 02, 2017
In short, “OTP” stands for “One True Pairing.” It's used in fandoms to describe any given participant's favorite couple — or couples, because, perhaps contrary to...Read More

1 Answer

209 views
John Smith
Answered: Apr 02, 2020
It maintains a state table
It functions on the network layer

The Stateful inspection firewall, monitors connection status based on the state table. It functions on the network layer...Read More

1 Answer

208 views
John Smith
Answered: Apr 02, 2020
Keep shopping, banking, using every account about online activity.

1 Answer

207 views
Teleleng
Answered: Apr 02, 2020
Tell your family and friends about it, so they could be aware of it.

1 Answer

205 views
Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.