CYBER SECURITY (3150714) - IMPORTANTS
- What is Vulnerability Scanning in Cyber Security?
- What is Probe. Explain its different types.
- What are the different usages of Network Sniffers? List out it.
- Define Denial-of-Service (DoS).
- How do you protect Wireless Network?
- Illustrate the aim and objective of Indian IT ACT 2000.
- Define the term: Trojan Horse ,Spyware, Open Port Identification, Banner Check.
- Differentiate between Packet Filter and Firewall.
- What are honeypots in cybersecurity?
- What are the different kinds of Web Vulnerabilities Tools available? Explain any two in brief.
- Define Network Address Translation.
- List out various Application Inspection tools. Explain any two.
- Describe Network Sniffers and Injection Tool. Explain any two injection tools in brief.
- Explain hacking and its types.
- How does SQL Injection attack work?
- Explain Incident response and digital forensics.
- Explain the role of encryption in cybersecurity.
- Difference between Antivirus and Firewall.
- Difference between IDS and IPS.
- List three contemporary crimes?
- Explain Curl, OpenSSL and Stunnel.
- Features of Trojan virus.
- What do you mean by Password cracking and brute force tools? Explain any one in brief.
- What are the Cyber-Crime Scenarios and explain its applicability for Legal Sections?
- Explain how SQL Injection attacks can be prevented.
- Explain the tools for attacking wireless Networks.
- List out different types of Traditional Problems Associated with Computer Crime.
- What is Stegnography and list two examples.
- Difference between Symmetric and Asymmetric Encryption.