CA-501 Cyber Security (BBACA) || Question Bank
2 Marks Questions:
1. What is cybersecurity?
2. Explain the CIA triad.
3. What is hacking? Explain different types of hacking.
4. What are Cyber offense and cyberstalking?
5. Differentiate between Active attack and Passive attack.
6. Explain methods of phishing attacks.
7. Explain the working of proxy servers and anonymizers.
8. Discuss various password-cracking techniques.
9. How to prevent SQL injection attacks?
10. Explain various laws in place to combat cybercrime.
11. Why do we need Cyber laws: The Indian Context?
12. Explain the Indian IT Act.
13. What are the challenges of Indian Law?
14. Explain various types of cyber forensics.
15. Explain the advantages and disadvantages of digital forensics.
16. Explain email architecture.
17. What is Intellectual Property?
18. Discuss IPR issues.
19. Explain Software Piracy and its consequences on the organization
4 Marks Questions:
1. Explain domains of cybersecurity policies in detail.
2. Compare Insider attacks and Outsider attacks.
3. Explain cybercriminals in detail.
4. What is a Social Engineering attack?
5. What should be included in the security awareness training of an organization that will help users to keep away from social engineering attacks? Explain attacks on mobile/cell phones in detail.
6. Explain Authentication Service Security in detail.
7. Explain phishing scams in detail.
8. Define phishing. Explain in detail the classification of phishing scams.
9. Differentiate between Trojan, Virus, and Worm.
10. Discuss different password-cracking tools.
11. Explain the cybercrime scenario in India.
12. Explain the consequences of not addressing the weakness of the Indian Technology Act. Discuss digital signature and the Indian IT Act.
13. Explain the scheme of the IT Act.
14. Define Computer forensics. Explain the need for computer forensics in detail.
15. Discuss how emails are used in forensics analysis.
16. Explain the process of cyber forensics in detail.
17. Discuss web threats for organizations. Explain social computing and the associated challenges for organizations. Explain organizational guidelines for internet usage.
18. Is permission from copyright owners needed in order to disseminate their work via the internet? Discuss.
19. Discuss famous cybercrime cases in India and their judgment.
20. Is COVID-19 Changing the Cybercrime Landscape?
21. Prepare a case study with its implication on "Maharashtra Government Website Hacked".
Define the term:
1. Web jacking
2. Cyber defamation
3. Phishing
4. Botnet
5. Cybercafe and Cybercrime
6. Network Spoofing
7. The P2P botnet
8. Denial of Service
9. Pharming DNS
10. DoS and DDoS
11. Dictionary attack
12. Spywares
13. SQL Injection
14. Backdoors
15. Steganography
16. Data Protection Act
17. Mobile forensics
18. Disk forensics
19. Server investigation
20. Copyright
21. Social media marketing
0 Comments