|
Question |
Rating |
View Answer |
|
What are the types of Cookies? |
|
View Answer |
|
What are the most important steps you would recommend for securing a new web server? |
|
View Answer |
|
What?s the difference between Symmetric and Asymmetric encryption? |
|
View Answer |
|
What is the difference between a Vulnerability and an Exploit? |
|
View Answer |
|
How much will the new export process for data cost? |
|
View Answer |
|
Why was Proofpoint selected? |
|
View Answer |
|
What's better, a red team or a blue team, in penetration testing scenarios? |
|
View Answer |
|
What is the difference between Information Protection and Information Assurance? |
|
View Answer |
|
How do you protect your home Wireless Access Point? |
|
View Answer |
|
What is data protection in transit vs data protection at rest? |
|
View Answer |
|
Why to do need to be concerned about our Mail Security? |
|
View Answer |
|
How would you find out what a POST code means? |
|
View Answer |
|
How would you lock down a mobile device? |
|
View Answer |
|
What is a Cookie? |
|
View Answer |
|
What is Exfiltration? |
|
View Answer |
|
How to judge if a remote server is running IIS or Apache? |
|
View Answer |
|
List the components used in SSL? |
|
View Answer |
|
What is SSL connection and an SSL session? |
|
View Answer |
|
What is the difference between an HIDS (Host Intrusion Detection System) and a NIDS (Network Intrusion Detection System)? |
|
View Answer |
|
What is Port Scanning? |
|
View Answer |