CA-501 Cyber Security (BBACA) || Question Bank

CA-501 Cyber Security (BBACA) || Question Bank



2 Marks Questions: 
 1. What is cybersecurity? 
 2. Explain the CIA triad. 
 3. What is hacking? Explain different types of hacking. 
 4. What are Cyber offense and cyberstalking?  
 5. Differentiate between Active attack and Passive attack. 
 6. Explain methods of phishing attacks. 
 7. Explain the working of proxy servers and anonymizers. 
 8. Discuss various password-cracking techniques. 
 9. How to prevent SQL injection attacks?
 10. Explain various laws in place to combat cybercrime. 
 11. Why do we need Cyber laws: The Indian Context?  
 12. Explain the Indian IT Act. 
 13. What are the challenges of Indian Law?
 14. Explain various types of cyber forensics. 
 15. Explain the advantages and disadvantages of digital forensics. 
 16. Explain email architecture.
 17. What is Intellectual Property? 
 18. Discuss IPR issues. 
 19. Explain Software Piracy and its consequences on the organization
 
 
 
4 Marks Questions: 
 1. Explain domains of cybersecurity policies in detail. 
 2. Compare Insider attacks and Outsider attacks. 
 3. Explain cybercriminals in detail.
 4. What is a Social Engineering attack? 
 5. What should be included in the security awareness training of an organization that will help users to keep away from social engineering attacks? Explain attacks on mobile/cell phones in detail. 
 6. Explain Authentication Service Security in detail.
 7. Explain phishing scams in detail. 
 8. Define phishing. Explain in detail the classification of phishing scams. 
 9. Differentiate between Trojan, Virus, and Worm. 
 10. Discuss different password-cracking tools.
 11. Explain the cybercrime scenario in India.
 12. Explain the consequences of not addressing the weakness of the Indian Technology Act. Discuss digital signature and the Indian IT Act. 
 13. Explain the scheme of the IT Act.  
 14. Define Computer forensics. Explain the need for computer forensics in detail. 
 15. Discuss how emails are used in forensics analysis. 
 16. Explain the process of cyber forensics in detail.
 17. Discuss web threats for organizations. Explain social computing and the associated challenges for organizations. Explain organizational guidelines for internet usage.
 18. Is permission from copyright owners needed in order to disseminate their work via the internet? Discuss. 
 19. Discuss famous cybercrime cases in India and their judgment. 
 20. Is COVID-19 Changing the Cybercrime Landscape? 
 21. Prepare a case study with its implication on "Maharashtra Government Website Hacked".
 
 
 
 
Define the term: 
 1. Web jacking 
 2. Cyber defamation 
 3. Phishing 
 4. Botnet 
 5. Cybercafe and Cybercrime 
 6. Network Spoofing 
 7. The P2P botnet 
 8. Denial of Service 
 9. Pharming DNS 
 10. DoS and DDoS 
 11. Dictionary attack 
 12. Spywares 
 13. SQL Injection 
 14. Backdoors 
 15. Steganography
 16. Data Protection Act
 17. Mobile forensics 
 18. Disk forensics 
 19. Server investigation
 20. Copyright 
 21. Social media marketing
 
 

Post a Comment

0 Comments