Cybersecurity Question Bank
Cybersecurity Question Bank
1. Who are Cyber Criminals? Describe the different categories of Cyber Criminals with an
example.
2. Summarize the importance of Information Security in Cyber Crime.
3. With an example explain the different classifications of Cyber Crime.
4. How are cybercrimes classified? Explain in detail.
5. Discuss the following with an example:
Email-Spoofing
Data Diddling Note: Q. No. 3, 4 and 5 are similar
Web Jacking questions, but asked in different ways.
Spamming
Password Sniffing
Internet Time Theft
Email-Bombing
Forgery
Credit Card Fraud
Identity Theft
6. Cybercrime as Indian Perspective.
Module 3
12. Write the closed loop environment for wireless transactions with schematic diagram.
13. Write the online environment for credit card transactions with schematic diagram.
14. With a suitable example, explain various types of mobile phone attack.
15. List and explain the popular types of attacks against 3G mobile network.
16. Explain the proliferation of mobile and wireless devices.
17. Illustrate the different types of mobile computers.
18. With a neat sketch explain the types of trends in mobility and its implications.
Module 4
19. Compare the functionalities of Proxy servers and anonymizers in Cyber
Security.
20. Outline the different ways in which the hacker carries out Phishing Attack.
21. List and explain computer viruses that attacks on various elements of the system.
22. List and explain different types of viruses.
23. List and explain, how an attacker can compromise the network or basic stages of an
attack.
Q. No. 20 and 24 are similar.
Q. No. 21 and 22 are similar.
24. Define Phishing. Explain the working of phishing.
25. Explain the different ways in which a hacker performs Password Attack.
26. With a neat diagram, explain how viruses spread through,
i)The Internet ii) Stand Alone System iii) Local Network.
27. Elucidate the guidelines for netizens to avoid being victim of getting their E-mail
accounts hacked by the attacker.
28. What do you mean by Proxy Servers? List the purposes of Proxy Server.
Module 5
29. Explain the techniques of Identity theft.
30. Illustrate the different techniques used by phishers to launch phishing attacks.
31. List and explain the frequent methods used by the phisher to entice the netizens to
reveal their personal information.
32. Identify the different types of Identity Theft and explain each with a suitable example.