College of Technology
Aditya Silver Oak Institute of Technology
                            Bachelor of Technology
                             Computer Engineering
Semester:                        5             Academic Year:              2023-24
Course Name:               Cyber Security      Course Code:               1010043362
                                          Question bank
Sr.
                             Question Text                           Marks      CO
No.
                      Unit 1 :Introduction to Cyber Crime
 1    What is Cyber Crime? Write down its type.                        3       CO - 1
 2    Define: Cyber Space and Cyber Security                           4       CO - 1
 3    Who are Cyber Criminals? Classify Cyber crimes.                  3       CO - 1
      Explain Basic Terminologies: Vulnerability, Threat, Exploit,     4       CO - 1
 4
      Attack.
 5    What is Attack? Explain in brief.                               3        CO - 1
 6    What is Hacking?                                                 8       CO - 1
 7    Explain types of Hacker.                                         8       CO - 1
 8    Phases of Hacking.                                              8        CO - 1
                         Unit-2 Basics of Cyber Attacks
11   What is malware? Types of malwares?                           3    CO2
12   How keylogger and spyware works?                              4    CO2
13   Write the difference between Virus and Warms.                 3    CO2
14   What is Proxy Server?                                         4    CO2
15   What is Trojan and backdoors?                                 4    CO2
16   Explain term Anonymizers,                                     3    CO2
17   How does Buffer Overflow work?                                4    CO2
     Explain terms : Cyber Defamation, Software                    3
17                                                                     CO -2
     Piracy, Computer Sabotage
                         Unit-3 Various Cyber Attacks
18   Give a brief example of Email Spoofing.                       2   CO -2
     Explain Following Terms: (Any three)                          3
     Salami Attack, Data Diddling, Forgery, Online Frauds, Email
19                                                                     CO -2
     Bombing, Computer Network Intrusion, Password Sniffing,
     Credit Card Frauds, Identity Theft.
20   What is Social Engineering and its types?                     3   CO -2
21   Explain Botnet and Botnet Architecture.                       4   CO -2
22   How does phishing work?                                       3   CO - 2
23   What is DOS? How does it work?                                3   CO -2
24   Explain: DDOS Attacks.                                        3   CO -2
25   Explain: SQL Injection.                                       3   CO -2
         Unit-4 Understanding Digital Forensics and Cyber Law
26   What is Cyber Crime? Write down its type.                     5   CO – 3
27   Why do we need forensic labs digitally?                       3   CO - 3
28   What do you mean by cybercrime investigator?                  7   CO - 3
29   Explain Digital Evidence and rules of Evidence.               4   CO - 3
30   Write a note on Digital Forensic Life Cycle.                 5     CO - 3
31   Why do we need cyber laws: The Indian IT ACT 2000?           1,2   CO - 3
32   Explain IT Act 2008 Amendments                               4     CO - 3
                        Unit-5 Introduction to Network Defense
33   What is Firewall? Need of Firewall.                          3     CO - 4
34   How a Firewall Protects a Network?                           3     CO - 4
35   Stateless Vs Stateful Firewalls.                             6     CO - 4
36   Packet Filter Vs Firewall.                                   6     CO – 4
37   IDS vs IPS.                                                  6     CO – 4
38   Explain Network Address Translation.                         3     CO – 4
39   What is Port Forwarding?                                     3     CO – 4
40   Explain basics of Virtual Private Networks.                  3     CO – 4
41   Explain : Snort.                                             2     CO - 4
42   What is an Intrusion Detection System?                       4     CO – 4
43   List out different VPNs.                                     3     CO - 4
                          Unit-6 Vulnerability Scanning
     Explain : Open Port/Service Identification, Banner/Version   7
44                                                                      CO - 5
     Check, Traffic-Probe, Vulnerability Probe
45   What is Network Reconnaissance?                              4     CO - 5
     Give the example of vulnerability. Explain Vulnerability     4
46                                                                      CO - 5
     scanning.
47   Explain : Network Sniffers and Injection tools               7     CO - 5
48   Use of Nmap.                                                 3     CO - 5
     Purpose for the use of Netcat in Networks Vulnerability      3
49                                                                      CO - 5
     Scanning
50   Explain how Tcpdump and Wireshark are used in the network.   4     CO - 5
51   What is Prob? Explain its type.                              3     CO - 5
52   Different Commands of Nmap                             4      CO - 5
                   Unit-7 Web Application Scanning tools
53   Write down web vulnerability tools.                    4      CO - 5
54   Explain OpenSSL and Stunnel                            4      CO - 5
55   How is the zed attack proxy used?                      3      CO - 5
56   What is DVWA? Explain.                                 6      CO - 5
57   How does John the Ripper work?                         4      CO - 5
58   Explain: L0phtcrack and Pwdump                         4      CO - 5
59   Explain Vega Scanner                                   5      CO - 5
60   Explain W3af and Nikto                                 4      CO - 5
Course Coordinator                                    Head of Department