0% found this document useful (0 votes)
50 views4 pages

Cyber Question Bank 1

cyber security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views4 pages

Cyber Question Bank 1

cyber security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Question Bank ( Unit 1 to Unit 5)

Long Questions (5 to 8 Marks)

Explain in detail components of information system?


Give a brief about Types of information system?
Explain development of information system?
Explain the risk control cycle or Risk mitigation Cycle for Cyber security.
What does vulnerability mean? Provide some examples of different types of
vulnerabilities?
What is the tool used for network vulnerability scanning? Explain.
What is diffrence between Vulnerability Scanning vs Penetration Testing?
What is the purpose of Netcat?
What is TCP/IP model explain with diagram?
What is Nmap and what are its uses?
Describe the functionalities of open source network sniffers Wireshark.
What are the modes of operation offered by Ettercap?
Explain Netcat.
Explain the various types of attacks with examples and how to prevent it.
What is firewall explain types of firewall? What is NAT, explain modes of NAT?
What are the tools that you can use for port forwarding? Explain any one.
Draw a difference between linux firewall and windows firewall.
What is VPN and Explain Types?
Differentiate the term FIREWALL, IPS and IDS?
What is SNORT? Explain the modes of SNORT.
Explain in detail cyber crime classification.
Explain in detail Incidence Response.
What do you mean by Attack vectors? Explain it with some examples.
What is Hacking ? explain types of Hackers.
What are the amendments in IT Act 2008?
Explain detail Password Cracking and its types.
Give a brief about Keyloggers and Anti-keyloggers.
Differentiate the terms : Virus and worms
Explain in Detail Attacks on Wireless network.

Short Questions ( 2 to 4 Marks)

What is information security? why we need information security?


Explain CIA.
What is Cyber Security?why we need Cyber Security?
Differentiate Information Security and Cyber Security
Give a difference between Data and Information?
What is information assurance and what is the goal of Information Assurence?
Explain the following
a)XSS
b)CSRF
c)Zero-day vulnerabilities
d)Hping
e)Ephemeral ports
f)Network reconnaissance
g)IP Address,MAC Address,DNS,Ports
Explain banner grabbing and also explains some examples?
Explain false negative and false positive.
different between risk,threat,vulnerabilities.
Explain DOS & DDOS Attack.
what is ICMP,HTTP,HTTPS.
Explain different types of probes ?
What are the functions of firewall?
What is a firewall and write its importance.
Differentiate between packet filters and firewalls, outlining their respective
functionalities.
Differentiate Stateless and Stateful Firewalls.
How port forwarding works?
What is port forwarding?
What are the protocols are used in VPN?
What is IDS (intrusion detection system)?
Explain types of SNORT rules?
What is the structure of SNORT rule?
What is cyber crime? Give any 5 examples for cyber crime.
What do you mean by term cyber space?
What is Digital Forensics?
What is the objective Indian IT Act 2000?
What is ERP?
What is MIS?
What do you mean authentication and non-repudiation?
What do you mean by event, incident and attack?
What do you mean by threat, vulnerability and attack?
Explain the following terms:
Logic bomb
Salami attack
Section 420 IPC
Webjacking
Defacement
Cyber Stalking
Cyber Harrasment
Child Pornography
Vishing, Smishing, phishing
Intranet,internet,Internet
Give a brief about Trogens.
Give a brief about Backdoors,
What do you mean by Spyware?
Write some important commands of Nmap.
Give any three Filters of Wireshark.
What are the crieteria for data Resourses?
What is the Difference between Staganography and cryptography?
What do you mean by SQL Injection discuss its impact.
What do you mean by SQL Injection discuss its impact.
Difference between IDS and IPS.

Very Short Questions ( 1 Mark)

What is information system?


MIS stands for _________ .
ERP stands for __________ .
OLAP stands for _________ .
_______ systems are used by the multi-national organizations.
Here are the steps for the development of an information system arranged in the
correct order: Analysis, Testing, implementation, Design, maintenance
What is Information Security?
What is Cyber Security?
What do you mean by Phishing attack?
Explain DDOS Attack.
What is Information Assurance?
Which tool is known as ‘Swiss army knife of hacking’ ?
Why open port/service identification is essential for Vulnerability Scanning?
Dynamic ports are also known as _______ .
What is authentication and non-repudiation.
Which tool is associated with Network Sniffing?
Which tool is associated with Network reconnaissances?
The purpose of a ____________ in vulnerability scanning is to identify the software
and its version running on a system.
________ is the port number for SMTP.
________ is the port number for HTTPS
________ is the port number for HTTP
________ is the port number for SSH (Secure Shell)
________ is the port number for FTP
________ is the port number for Telnet
For N map which command is associate with Service Version Detection.
Expert System is also known as _______.
What is Banner Grabbing?
Give any four examples of Vulnerability.
Give the name of firewall which is use in windows OS.
Give the name of firewall which is use in Linux OS.
Give the name of firewall which is use in Mac OS.
_________ is used as both IDS+IPS.
_________ is used for transfer public IP into private IP.
What is Port number?
_________ is the range for well-known ports.
L2TP stands for __________ .
What is Cyber Crime ?
What is the need for Cyber Law?
Which act gives legal recognisition to cyber crime?
What do you mean by intellectual property crime?
Give any example for IP crime.
Enlist the non Electronic Password sniffing method.
What do you mean by software piracy?
What could be purpose behind hacking?
Define the term: attack vectors.
What is foistware?
Define cookies and peckets
Which act define cyber cafe?
What is brute force attack ?

You might also like