0% found this document useful (0 votes)
47 views4 pages

Question Bank

Uploaded by

Kushal Nagar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views4 pages

Question Bank

Uploaded by

Kushal Nagar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

College of Technology

Aditya Silver Oak Institute of Technology


Bachelor of Technology
Computer Engineering

Semester: 5 Academic Year: 2023-24

Course Name: Cyber Security Course Code: 1010043362

Question bank

Sr.
Question Text Marks CO
No.
Unit 1 :Introduction to Cyber Crime
1 What is Cyber Crime? Write down its type. 3 CO - 1

2 Define: Cyber Space and Cyber Security 4 CO - 1

3 Who are Cyber Criminals? Classify Cyber crimes. 3 CO - 1

Explain Basic Terminologies: Vulnerability, Threat, Exploit, 4 CO - 1


4
Attack.

5 What is Attack? Explain in brief. 3 CO - 1

6 What is Hacking? 8 CO - 1

7 Explain types of Hacker. 8 CO - 1

8 Phases of Hacking. 8 CO - 1
Unit-2 Basics of Cyber Attacks
11 What is malware? Types of malwares? 3 CO2

12 How keylogger and spyware works? 4 CO2

13 Write the difference between Virus and Warms. 3 CO2

14 What is Proxy Server? 4 CO2

15 What is Trojan and backdoors? 4 CO2

16 Explain term Anonymizers, 3 CO2

17 How does Buffer Overflow work? 4 CO2

Explain terms : Cyber Defamation, Software 3


17 CO -2
Piracy, Computer Sabotage

Unit-3 Various Cyber Attacks


18 Give a brief example of Email Spoofing. 2 CO -2

Explain Following Terms: (Any three) 3


Salami Attack, Data Diddling, Forgery, Online Frauds, Email
19 CO -2
Bombing, Computer Network Intrusion, Password Sniffing,
Credit Card Frauds, Identity Theft.

20 What is Social Engineering and its types? 3 CO -2

21 Explain Botnet and Botnet Architecture. 4 CO -2

22 How does phishing work? 3 CO - 2

23 What is DOS? How does it work? 3 CO -2

24 Explain: DDOS Attacks. 3 CO -2

25 Explain: SQL Injection. 3 CO -2

Unit-4 Understanding Digital Forensics and Cyber Law


26 What is Cyber Crime? Write down its type. 5 CO – 3

27 Why do we need forensic labs digitally? 3 CO - 3

28 What do you mean by cybercrime investigator? 7 CO - 3

29 Explain Digital Evidence and rules of Evidence. 4 CO - 3


30 Write a note on Digital Forensic Life Cycle. 5 CO - 3

31 Why do we need cyber laws: The Indian IT ACT 2000? 1,2 CO - 3

32 Explain IT Act 2008 Amendments 4 CO - 3

Unit-5 Introduction to Network Defense


33 What is Firewall? Need of Firewall. 3 CO - 4

34 How a Firewall Protects a Network? 3 CO - 4

35 Stateless Vs Stateful Firewalls. 6 CO - 4

36 Packet Filter Vs Firewall. 6 CO – 4

37 IDS vs IPS. 6 CO – 4

38 Explain Network Address Translation. 3 CO – 4

39 What is Port Forwarding? 3 CO – 4

40 Explain basics of Virtual Private Networks. 3 CO – 4

41 Explain : Snort. 2 CO - 4

42 What is an Intrusion Detection System? 4 CO – 4

43 List out different VPNs. 3 CO - 4

Unit-6 Vulnerability Scanning


Explain : Open Port/Service Identification, Banner/Version 7
44 CO - 5
Check, Traffic-Probe, Vulnerability Probe

45 What is Network Reconnaissance? 4 CO - 5

Give the example of vulnerability. Explain Vulnerability 4


46 CO - 5
scanning.

47 Explain : Network Sniffers and Injection tools 7 CO - 5

48 Use of Nmap. 3 CO - 5

Purpose for the use of Netcat in Networks Vulnerability 3


49 CO - 5
Scanning

50 Explain how Tcpdump and Wireshark are used in the network. 4 CO - 5

51 What is Prob? Explain its type. 3 CO - 5


52 Different Commands of Nmap 4 CO - 5

Unit-7 Web Application Scanning tools


53 Write down web vulnerability tools. 4 CO - 5

54 Explain OpenSSL and Stunnel 4 CO - 5

55 How is the zed attack proxy used? 3 CO - 5

56 What is DVWA? Explain. 6 CO - 5

57 How does John the Ripper work? 4 CO - 5

58 Explain: L0phtcrack and Pwdump 4 CO - 5

59 Explain Vega Scanner 5 CO - 5

60 Explain W3af and Nikto 4 CO - 5

Course Coordinator Head of Department

You might also like