QUESTION BANK
INFORMATION SECURITY AND CYBER LAW
1. What are the five 5 basic principles of cyber security?
2. What Is The Cybercrime How This Crime Is A Distinct From Other Types Of
Crime.
3. Explain the difference between asymmetric and symmetric encryption.
4. Explain the brute force attack. How to prevent it?
5. What is the difference between hashing and encryption?
6. What is two-factor authentication and how it can be implemented for public
websites?
7. Write A Detail Note Of Cyber Defamation
8. . What is a DDOS attack and how to stop and prevent them?
9. Discuss The Nature Of The Liability Of Internet Service Provider And What
Is The Cyber Crime Prevention Discuss In Details
10. Define Active and Passive Attacks? And Also define their Types.
11. Define Sniffing, Spoofing and Phishing Attack in detail.
12. Define CIA TRAID in detail? And also draw its diagram.
13. Define Needs and Goals of Network Security.
14. Define the Programs that attacks on network?
15. Give the Brief Introduction about Virus, Worm and Trojan Horse.
16. Define Encryption and Decryption in detailed.
17. Define Symmetric key and Assymetric Key Cryptography in detailed.
18. How substitution cipher is different from transposition cipher. Give example
for each method and also Convert the Given Text “ALL THE BEST FOR
EXAM” into cipher text using Rail fence Technique with depth 3.
19. How substitution cipher is different from transposition cipher. Give example
for each method and also Convert into Cipher Text using Row Transposition
cipher using the Key 4312567 and Plain Text is “Attack Postponed Until two
am”.
20. List some Transposition techniques and also Convert into Cipher Text using
Row Transposition cipher using the Key HACK and Plain Text is “Geeks For
Geeks”.
21. List some Transposition techniques and also Convert into Cipher Text using
Double Transposition cipher using the Key 4312567 and Plain Text is “Attack
Postponed Until two am”.
22. Define the roles / functions of firewall? What are the types of firewalls?
23. What is PGP? Examine how authentication and confidentiality is maintained
in PGP.
24. What is digital signature? Explain the approaches for digital signature based
on public key encryption.