A to Z Infosec Awareness Titles and Mottos

Today’s interconnected world makes everyone vulnerable to cyber attacks. Information Security is the protection of systems connected to the Internet, including hardware, software, and data from cyber attacks. It is…

[8] CISSP – MCQ – Business Continuity Planning and Disaster Recovery Planning

This article offers you a solid foundation for the Certified Information Systems Security Professional (CISSP) exam. This article is designed for readers and students who want to study for the…

[#8] – Input-Output Devices – Questions

To be useful, a computer system needs to communicate with its external environment. The input-output devices provide the capability to a computer system. They are also known as peripheral devices…

Information Security and Risk Assessment MCQ With Answers – Part 4

Strong security can be used to gain a competitive advantage in the marketplace. Having secured systems that are accessible 24/7 means that an organization can reach and communicate with its…

[7] CISSP – MCQ – Applications and Systems Development

This article offers you a solid foundation for the Certified Information Systems Security Professional (CISSP) exam. This article is designed for readers and students who want to study for the…

[#7] – Secondary Storage Devices – Questions

Primary storage of a computer system has the following limitations: Limited Capacity – It is often necessary to store many millions, sometimes billions, and even trillions of bytes of data…

[#2] – Preparing and Running C++ Program – Questions

C++ is a successful and most widely used Object Oriented Programming language. It is an extension of C language that not only adds Object Oriented concepts but also readdress some…

[Technology] Stack Overflow Similar Sites List

Stack Overflow is a QA based site for professional programmers. It’s an independently held website, the front runner website of the Stock Exchange Network, owned by Jeff Atwood and Joel…

List of Popular and Famous CSS Frameworks

Nowadays, there are many device categories (desktop, laptop, mobile, tablet, iPad etc) used to browse webpages on the Internet. Usage of mobile devices drastically changed requirements for the website development.…

[Compilation] List of Famous Internet Speed Test Websites

Whether you surf online occasionally or spend hours downloading streaming movies and gaming, you should always check your internet speed to measure your Internet connection and see if there are…

How To Install WordPress – Step By Step Tutorial

When developing sites for clients, WordPress is often asked for. This is no surprise as the CMS currently powers more than 50% of the web, which means a lot of…

Possible Sensitive Files – Vulnerability Scanning Checklist

Vulnerability Assessment is the process of evaluating the efficiency of the security controls of a system by measuring its security level. The scope of the process is to uncover all…

[Top 60] List of MySQL Repositories, GUI, Backup and Analysis Tools

Most interactive websites nowadays require information to exist dynamically and interactively based upon input from the user. So there are basically two ways to store the data i.e. in Files…

[6] CISSP – MCQ – Operations Security

This article offers you a solid foundation for the Certified Information Systems Security Professional (CISSP) exam. This article is designed for readers and students who want to study for the…

[#6] – Processor and Memory – Questions

CPU is the brain of a computer system. All major calculations and comparisons performed by a computer are carried out inside its CPU. CPU is also responsible for activating and…

Information Security and Risk Assessment MCQ With Answers – Part 3

Many businesses believe that if they purchase enough equipment like Firewalls, IPS/IDS, Antivirus’s etc, they can create a secure infrastructure. These type of security products are just some of the…

[5] CISSP – MCQ – Security Architecture and models

This article offers you a solid foundation for the Certified Information Systems Security Professional (CISSP) exam. This article is designed for readers and students who want to study for the…

[#5] – Computer Arithmetic – Questions

As we know that, the use of a smaller base often requires more positions to represent a given value, for example 910 = 10012. Hence, four positions are required instead…

[#4] – Computer Codes – Questions

Numeric data is not the only form of data handled by a computer. We often require to process alphanumeric data also. An alphanumeric data is a string of symbols, where…

[4] CISSP – MCQ – Cryptography

This article offers you a solid foundation for the Certified Information Systems Security Professional (CISSP) exam. This article is designed for readers and students who want to study for the…

Information Security and Risk Assessment MCQ With Answers – Part 2

Security, by its very nature, is inconvenient, and the more robust the security mechanisms, the more inconvenient the process becomes. Even now, despite the stories of compromised data, people still…