وستان این 11 سوال رو براتون میزارم مربوط میشه به اطلاعات عمومی .
اگه کسی جوابشون رو داره بزاره برای من .
اگه هم ندارید یا سر در نمیارید لطفا اسپم نزنید . :32:
Trivia
1:Because any patches has not been released for this type of vulnerabilities، they are prone to exploitation. What are these vulnerabilities called?
2:In year 2012, …. received the largest number of updates released for a software in the entire software development history.
3:According to the latest G Data security report, how many malwares target MS Windows PCs for every hundred thousand cases of malware?
4:One of the most important books written about ICS cyber security. It detailes most common problems in the cyber aspects of ICS installations and suggests some solutions for their robustification. Also it gives numerous examples about cyber weaknesses of ICS installations (in face of Stuxnet, in particular), then explains that best practice for robustification of ICS installations is reduction of variation. What is the name of this book?
5:Name the malware which searches for Virtual Machine Disks images on a system and infects them, then steals information
6:…. is the act of targeting individuals or corporations using an email, encouraging them to reveal personal information.
7:We need information about PLCs in a specified geographical region! Name the service which fulfills this task.
8:An open source operating system with preinstalled utilities for active defense, aimed at helping people in charge of defense by providing them with tools needed for making a counterattack against the attackers. What is the name of this OS?
9:A free software for controlling network with abilities including: registration, detection of suspicious activities on the network, vulnerability analysis, BYOD management, bandwidth control.
10:The most famous German-made instrument which it's vulnerabilities was exploited to attack Natanz FEP.
11:Name owner of the most famous industrial IT web site
اگه کسی جوابشون رو داره بزاره برای من .
اگه هم ندارید یا سر در نمیارید لطفا اسپم نزنید . :32:
Trivia
1:Because any patches has not been released for this type of vulnerabilities، they are prone to exploitation. What are these vulnerabilities called?
2:In year 2012, …. received the largest number of updates released for a software in the entire software development history.
3:According to the latest G Data security report, how many malwares target MS Windows PCs for every hundred thousand cases of malware?
4:One of the most important books written about ICS cyber security. It detailes most common problems in the cyber aspects of ICS installations and suggests some solutions for their robustification. Also it gives numerous examples about cyber weaknesses of ICS installations (in face of Stuxnet, in particular), then explains that best practice for robustification of ICS installations is reduction of variation. What is the name of this book?
5:Name the malware which searches for Virtual Machine Disks images on a system and infects them, then steals information
6:…. is the act of targeting individuals or corporations using an email, encouraging them to reveal personal information.
7:We need information about PLCs in a specified geographical region! Name the service which fulfills this task.
8:An open source operating system with preinstalled utilities for active defense, aimed at helping people in charge of defense by providing them with tools needed for making a counterattack against the attackers. What is the name of this OS?
9:A free software for controlling network with abilities including: registration, detection of suspicious activities on the network, vulnerability analysis, BYOD management, bandwidth control.
10:The most famous German-made instrument which it's vulnerabilities was exploited to attack Natanz FEP.
11:Name owner of the most famous industrial IT web site