Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Some sample question bank

Cyber security and ethical hacking TIU-UCA _T215

1. What is cyber and network security


2. Differentiate between cyber and network security
3. Why cyber security is needed in digital era.
4. Write down different classification of cyber crime.( individual topic may come in examination)
5. How does criminal plan for attack, write with example ( reconnaissance , scanning and execution
should be mentioned).
6. Write and give the example of active and passive attack.
7. Write the names of tools used in active and passive attack.
8. What is social engineering and its type. Write an example.
9. Describe one example of credit card fraud.
10. Describe about botnet and how the nodes of botnet are compromised explain it with diagram.
11. Differentiate between Dos and DDos attack.
12. Write and explain about the credit card fraud technique and its precautionary measure.
13. Draw and explain about zombie computer and attack vector.
14. What types of privacy and security policy are maintained in mobile devices?
15. Write down different types of identity theft and explain any two types with example
16. Write with example different types of mobile attack.
17. Write down the concept and application of proxy server.
18. What is the concept of plain text and cipher text, explain it with context of cryptography.
19. Write the advantage of steganography over cryptpgraphy.
20. What is the concept of SQL injection, how the database is affected in sql injection, explain.
21. What is bufferoverflow concept. Which precautionary measurement is taken to minimize
bufferoverflow, explain.
22. Write down the traditional techniques of attack on wireless network.
23. What is the concept of digital forensic network forensic and computer forensic
24. Write down the concept of chain of custody.
25. Write and explain with diagram of digital forensic life cycle with suitable example.
26. Write down the concept of relevancy of OSI 7 layer model with computer forensic.
27. If any person finds the evidence of transmitting malicious content through email what will be
the forensic measure to analysis the email. ( Describe with reason)
28. During forensic investigation which types of measure and steps should be followed for analyzing
of mobile or iphone.
29. What is ethical hacking , why we address it as “ethical” Differentiate between white ,black and
gray hat hacker
30. Write down different steps of ehical hacking with example.
31. What is metesploit. Write some module of metasploit with example.
32. What is cyber law and cyberspace, write briefly.
33. Write down the need of IT act.
34. From IT act which verdicts have been discussed in class from that section question will come.

Short note with example


Malware, adware, spyware, ransom ware with example.
Different types of phishing.
MITM with example Password cracking concept
Keyloggers with example.
Example and types on social engineering.
Example of maladvertising
Concept of cyberstalking with example.
Concept of bruit force hcking.
Concept of content injection.
Concept of webbased delivery
Concept of session hijacking, spear phishing
Concept of salami attack
Concept of shoulder surfing
Concept of dumpster diving
Concept of zeroday attack
Dragnet, faraday bag

***Caeser cipher , monoalphabetic cipher and vernem cipher is also


included and algorithm should be studied. ( Plain text to cipher text by encryption
and cipher text to plain text by decryption )

You might also like