menu
search
person
Login
Register
search
Email or Username:
Password:
Remember
brightness_auto
edit
Ask a Question
HOME
QUESTIONS
RECENT ANSWERS
TOPICS
BLOG
ASK BOX FOR YOUR BLOG
ASK A QUESTION
User ns224
Recent activity
All questions
All answers
Ask or Answer anything Anonymously! No sign-up is needed!
Answers by ns224
in
Softwares+OS
answered
6 days
ago
Examples of Remdiations to prevent an SQL Injection Attack?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Apr 17
Provide an example of a 2024 Cybersecurity issue that needs to be mitigated in a big corporation? Scenario #6?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Apr 8
Provide to me the steps of identifying malicious processes running on a Windows or Linux computer?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Apr 1
Provide an example of a 2024 Cybersecurity issue that needs to be mitigated in a big corporation? Scenario #2?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Mar 29
Provide an example of a 2024 Cybersecurity issue that needs to be mitigated in a big corporation? Scenario #5?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Mar 21
How to remove malware or unauthorized activity on a Windows or Linux Computer?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Mar 19
How to quickly tell if an email is a phishing email?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Mar 6
What are the common steps that companies follow when malware or unauthorized activity is happening on a server or computer?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Feb 29
Why is it important for companies to think about prioritizing Cybersecurity when they hire outside vendors?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Feb 29
Why do companies hire outside helpers (third-party vendors) to do some of their work?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Feb 24
Provide an example of a 2024 Cybersecurity issue that needs to be mitigated in a big corporation? Scenario #3?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Feb 22
Provide to me the hands-on steps on how Cyber Security professionals review system logs?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Feb 17
Provide examples of business applications that require the rotation of cryptographic keys?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Feb 14
Why are rotating cryptographic keys important? Is this a routine cybersecurity task?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Feb 6
Provide an example of a 2024 Cybersecurity issue that needs to be mitigated in a big corporation?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Jan 27
How to examine if software has malware before installing it?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Jan 20
What are the common vulnerabilities that can lead to a data breach?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Computers+Laptops
answered
Jan 18
How do you make sure that your internet router has the latest encryption standard?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Jan 11
Give me a step-by-step, hands-on example of a company testing its critical services during a patch testing procedure.?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Jan 3
What are examples of critical applications and services that a company tests when experimenting with a security patch or update?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Dec 29, 2023
What are the step-by-step procedures for how companies test critical security patches or updates?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Dec 14, 2023
How do I make sure my NetBios service is secure when I use it for file sharing or printer sharing?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Dec 11, 2023
What is Port Triggering? Why is it important in Cybersecurity?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Nov 22, 2023
How do I make sure that UPnP (Universal Plug and Play) ports are protected from malware and hackers?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
in
Softwares+OS
answered
Nov 15, 2023
What is UPnP (Universal Plug and Play - Various Ports)?
thumb_up_off_alt
0
like
thumb_down_off_alt
0
dislike
Page:
1
2
next »
Welcome to Answeree, where you can ask questions and receive answers from other members of the community.
...