This document contains a list of 33 questions related to cyber security and ethical hacking. The questions cover topics such as cyber crime classifications, cyber attack planning and execution, active and passive attacks, social engineering, botnets, denial of service attacks, privacy policies on mobile devices, identity theft, mobile attacks, proxy servers, cryptography, steganography, SQL injection, buffer overflows, wireless network attacks, digital forensics, ethical hacking, the Metasploit framework, cyber law, and various cyber attacks like malware, phishing, man-in-the-middle attacks, and password cracking. It also lists cryptography ciphers and encryption algorithms that should be studied.
This document contains a list of 33 questions related to cyber security and ethical hacking. The questions cover topics such as cyber crime classifications, cyber attack planning and execution, active and passive attacks, social engineering, botnets, denial of service attacks, privacy policies on mobile devices, identity theft, mobile attacks, proxy servers, cryptography, steganography, SQL injection, buffer overflows, wireless network attacks, digital forensics, ethical hacking, the Metasploit framework, cyber law, and various cyber attacks like malware, phishing, man-in-the-middle attacks, and password cracking. It also lists cryptography ciphers and encryption algorithms that should be studied.
This document contains a list of 33 questions related to cyber security and ethical hacking. The questions cover topics such as cyber crime classifications, cyber attack planning and execution, active and passive attacks, social engineering, botnets, denial of service attacks, privacy policies on mobile devices, identity theft, mobile attacks, proxy servers, cryptography, steganography, SQL injection, buffer overflows, wireless network attacks, digital forensics, ethical hacking, the Metasploit framework, cyber law, and various cyber attacks like malware, phishing, man-in-the-middle attacks, and password cracking. It also lists cryptography ciphers and encryption algorithms that should be studied.
2. Differentiate between cyber and network security 3. Why cyber security is needed in digital era. 4. Write down different classification of cyber crime.( individual topic may come in examination) 5. How does criminal plan for attack, write with example ( reconnaissance , scanning and execution should be mentioned). 6. Write and give the example of active and passive attack. 7. Write the names of tools used in active and passive attack. 8. What is social engineering and its type. Write an example. 9. Describe one example of credit card fraud. 10. Describe about botnet and how the nodes of botnet are compromised explain it with diagram. 11. Differentiate between Dos and DDos attack. 12. Write and explain about the credit card fraud technique and its precautionary measure. 13. Draw and explain about zombie computer and attack vector. 14. What types of privacy and security policy are maintained in mobile devices? 15. Write down different types of identity theft and explain any two types with example 16. Write with example different types of mobile attack. 17. Write down the concept and application of proxy server. 18. What is the concept of plain text and cipher text, explain it with context of cryptography. 19. Write the advantage of steganography over cryptpgraphy. 20. What is the concept of SQL injection, how the database is affected in sql injection, explain. 21. What is bufferoverflow concept. Which precautionary measurement is taken to minimize bufferoverflow, explain. 22. Write down the traditional techniques of attack on wireless network. 23. What is the concept of digital forensic network forensic and computer forensic 24. Write down the concept of chain of custody. 25. Write and explain with diagram of digital forensic life cycle with suitable example. 26. Write down the concept of relevancy of OSI 7 layer model with computer forensic. 27. If any person finds the evidence of transmitting malicious content through email what will be the forensic measure to analysis the email. ( Describe with reason) 28. During forensic investigation which types of measure and steps should be followed for analyzing of mobile or iphone. 29. What is ethical hacking , why we address it as “ethical” Differentiate between white ,black and gray hat hacker 30. Write down different steps of ehical hacking with example. 31. What is metesploit. Write some module of metasploit with example. 32. What is cyber law and cyberspace, write briefly. 33. Write down the need of IT act. 34. From IT act which verdicts have been discussed in class from that section question will come.
Short note with example
Malware, adware, spyware, ransom ware with example. Different types of phishing. MITM with example Password cracking concept Keyloggers with example. Example and types on social engineering. Example of maladvertising Concept of cyberstalking with example. Concept of bruit force hcking. Concept of content injection. Concept of webbased delivery Concept of session hijacking, spear phishing Concept of salami attack Concept of shoulder surfing Concept of dumpster diving Concept of zeroday attack Dragnet, faraday bag
***Caeser cipher , monoalphabetic cipher and vernem cipher is also
included and algorithm should be studied. ( Plain text to cipher text by encryption and cipher text to plain text by decryption )