Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
12 views2 pages

FILE1

The document is a question bank focused on information security and cyber law, covering various topics such as cyber security principles, types of cybercrime, encryption methods, and attacks like DDoS and phishing. It also includes questions about network security, digital signatures, and the roles of firewalls. Overall, it serves as a comprehensive guide for understanding key concepts in the field of cyber security and law.

Uploaded by

Anuradha Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views2 pages

FILE1

The document is a question bank focused on information security and cyber law, covering various topics such as cyber security principles, types of cybercrime, encryption methods, and attacks like DDoS and phishing. It also includes questions about network security, digital signatures, and the roles of firewalls. Overall, it serves as a comprehensive guide for understanding key concepts in the field of cyber security and law.

Uploaded by

Anuradha Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

QUESTION BANK

INFORMATION SECURITY AND CYBER LAW


1. What are the five 5 basic principles of cyber security?
2. What Is The Cybercrime How This Crime Is A Distinct From Other Types Of
Crime.
3. Explain the difference between asymmetric and symmetric encryption.
4. Explain the brute force attack. How to prevent it?
5. What is the difference between hashing and encryption?
6. What is two-factor authentication and how it can be implemented for public
websites?
7. Write A Detail Note Of Cyber Defamation
8. . What is a DDOS attack and how to stop and prevent them?
9. Discuss The Nature Of The Liability Of Internet Service Provider And What
Is The Cyber Crime Prevention Discuss In Details
10. Define Active and Passive Attacks? And Also define their Types.

11. Define Sniffing, Spoofing and Phishing Attack in detail.

12. Define CIA TRAID in detail? And also draw its diagram.

13. Define Needs and Goals of Network Security.

14. Define the Programs that attacks on network?

15. Give the Brief Introduction about Virus, Worm and Trojan Horse.

16. Define Encryption and Decryption in detailed.

17. Define Symmetric key and Assymetric Key Cryptography in detailed.


18. How substitution cipher is different from transposition cipher. Give example
for each method and also Convert the Given Text “ALL THE BEST FOR
EXAM” into cipher text using Rail fence Technique with depth 3.

19. How substitution cipher is different from transposition cipher. Give example
for each method and also Convert into Cipher Text using Row Transposition
cipher using the Key 4312567 and Plain Text is “Attack Postponed Until two
am”.

20. List some Transposition techniques and also Convert into Cipher Text using
Row Transposition cipher using the Key HACK and Plain Text is “Geeks For
Geeks”.

21. List some Transposition techniques and also Convert into Cipher Text using
Double Transposition cipher using the Key 4312567 and Plain Text is “Attack
Postponed Until two am”.

22. Define the roles / functions of firewall? What are the types of firewalls?

23. What is PGP? Examine how authentication and confidentiality is maintained

in PGP.

24. What is digital signature? Explain the approaches for digital signature based

on public key encryption.

You might also like