Cyber UK - For Cyber and Tech Exam Questions and Answers

Since 2016

Welcome to Cyber UK

A central source for top UK Cyber and Tech Related Exams.

Please feel free to share your opinions

    client1

    Susan Carruthers - IT Security Consultant -

    "An excellent website and ideal for students wiishing to study and learn for these very important exams."

    client3

    Carla Coombes- IT Journalist -

    "Always excellent quality material, keep it up!"

      Popular questions

      Cyber UK Blog

      Cyber related exam questions and answers for free.

      Popular in CEH v10

      23
      Sep
      Certified Ethical Hacker v10 Question of the Day #79

      You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion

      26
      Aug
      Certified Ethical Hacker v10 Question of the Day #50

      You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration?

      22
      Sep
      Certified Ethical Hacker v10 Question of the Day #78

      A company recently hired your team of Ethical Hackers to test the security of their network systems. The company wants to have the attack be as realistic as possible

      Popular in (ISC)2 CISSP

      23
      Sep
      (ISC)2 CISSP (2018) Question of the Day #74

      Which one of the following tools is most often used for identification purposes and is not suitable for use as an authenticator?

      21
      Sep
      (ISC)2 CISSP (2018) Question of the Day #72

      Rick is a risk manager with a large-scale enterprise. The firm recently evaluated the risk of Scotland heavey rainfalls on its operations in the region and determine

      12
      Aug
      (ISC)2 CISSP (2018) Question of the Day #33

      George is the security administrator for a public school district. He is implementing a new student information system and is testing the code to ensure that student

      Popular in (ISC)2 SSCP

      23
      Sep
      (ISC)2 SSCP (2019) Question of the Day #57

      When a user attempts to log into their online account, Google sends a text message with a code to their mobile phone. What type of verification is this?

      22
      Sep
      (ISC)2 SSCP (2019) Question of the Day #56

      Kathleen is implementing an access control system for her organisation and builds the following array:Reviewers: update files, delete filesSubmitters: upload filesEd

      19
      Sep
      (ISC)2 SSCP (2019) Question of the Day #53

      Jack’s organisation is a government agency that handles very sensitive information. They need to implement an access control system that allows administrators to set

      itsec2

      We cyber and tech related questions and answers.

      IT Security Centre UK

      Rugeley, England

      Rugeley, Staffordshire

      07948 570815

      info@cyberuk.co.uk

      Site Links

      CEH v10

      CISSP

      SSCP