Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
125 views3 pages

Cybersecurity Question Bank

Uploaded by

samhithasuresh15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views3 pages

Cybersecurity Question Bank

Uploaded by

samhithasuresh15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Unit 3

1. Define proxy servers and anonymizers. Explain how cybercriminals use


these tools to protect their identities.
2. Describe DoS and DDoS attacks, their impact on network security, and the
common methods used in such attacks.
3. Explain the process of data exfiltration and the role of ransomware in
cybercrime.
4. What is steganography? Discuss its use in cybercrime and how it differs
from other forms of data hiding.
5. What is identity theft, and what are the standard methods used? Briefly
discuss its impact on victims.
6. Discuss password cracking and its methods
7. Describe SQL injection and its use in cyber-attacks
8. What are botnets, and how are they created?
9. What is keystroke logging? How is it used in cyber-attacks? Describe the
different types of spyware used in cybercrime.
10.Discuss ransomware and its impact on organizations. Explain the concept
of malware and its different types.
11.What are Trojan Horses and Backdoors? How can you protect yourself
from Trojan Horses and backdoors?
12.With example discuss the different stages of attacks through which attacker
target the computer system/network.
13.What is the difference between a virus and a worm? List the types of virus
14.and explain.
15.Explain the following
i) Scareware, ii) Malvertising, iii). Clickjacking, iv). Ransomware
16.What are the different components of wireless network?
17.Differentiate between WEP and WPA2?
Unit 4
1. Define computer forensics. Explain the need for computer forensics in the
modern digital world.
2. Explain how a computer forensics lab is set up and managed, highlighting
the importance of forensic readiness in organizations.
3. Describe the digital evidence lifecycle and explain the significance of the
chain of custody.
4. What are anti-forensics techniques, and how do they challenge forensic
investigations?

5. With neat diagram explain process model for understanding a seizure and
handling of forensics
6. evidence legal framework.
7. Discuss the OSI 7 Layer Model and its relevance in network forensic
investigations.
8. Differentiate between Forensics Policy and Security Policy? List various
Computer Forensics services available, and explain any two of them.
9. Define Computer Forensics. Briefly explain its challenges.
10.Discuss the precautions to be taken when collecting electronic evidence

11.Describe how data recovery is conducted in forensic labs.


12.How does digital evidence analysis differ from physical evidence analysis?
13.Explain forensics methods for investigating social networking sites.
14.Explain the significance of operating system forensics. Describe the
process of imaging and analysis in digital forensics.
Unit 5

1. Discuss intellectual property protection under cyber law and explain


copyright and patent laws in the context of digital content.
2. Explain various security policies.
3. Differentiate between Patentable Invention and Nonpatentable Invention.
4. Explain the IPR issues with appropriate laws related to it.
5. Explain the need for an information security policy in organizations and
describe the main objectives of the Information Technology Act of 2000.
6. Explain the procedure for obtaining a patent.
7. Discuss Software Licensing.
8. Define Copyright and explain exclusive rights given to authors.
9. Briefly explain IPR in the field of Semiconductor Integrated Circuit Layout
Design.
10.Describe the various information security standards (e.g., ISO) and their
importance.
11.Define security policy. Discuss the role of security policies in protecting
sensitive data.
12.Who can claim Copyright? Which works are protected and unprotected?
13.Describe the legal aspects of data sharing in cloud computing. Discuss the
role of digital signatures in secure communications.

You might also like