CYBERSECURITY IMP Qs

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

CYBER SECURITY IMPORTANT QUESTIONS

UNIT – 1
Q) What is Cyber Security? Explain its importance.
Q) What is Internet Governance? Explain the challenges and constraints of Internet Governance.
Q) What are Cyber Threats? Explain the different types of Cyber Threats.
Q) Is there any need for Comprehensive Cyber Security Policy.
Q) Is there any need for International Convention on cyberspace.
Q) What are Vulnerabilities? Describe the main causes of Vulnerabilities.
Q) Write a short note on
i) System Administration Vulnerability. II)Complex Network Architecture.
iii)Open Access to Organizational Data iv)Weak Authentication.
Q) What are Cyber Security Safeguards?
UNIT – 2
Q) Describe basic security for HTTP Applications and Services.
Q) What is SOAP? Explain the message structure and features of SOAP?
Q) Explain the Authorization Patterns in Cyber Security?
UNIT – 3
Q) What is IDS? Explain the types of Intrusion Detection System.
Q) What is IPS? Explain the types of Intrusion Prevention System.
Q) What is Antimalware? Discuss the working of Antimalware Software.
UNIT – 4
Q) What is Asymmetric Key Cryptography? Explain with a neat diagram
Q) What is Symmetric Key Cryptography? Explain with a neat diagram
Q) Write a short note on a) Firewalls b) Digital Signatures. c)Message Authentication.
Q) Explain VPN Security Protocol at Application Layer.
(or)
Q) Explain PDG Protocol and S / MIME Protocol.
Q) Explain VPN Security Protocol at Transport Layer.
(or)
Q) Explain SSL Protocol and TLS Protocol.
Q) Explain VPN Security Protocol at NETWORK Layer.
(or)
Q) Explain IPSec Protocol.
UNIT – 5
Q) Discuss the importance of CYBER LAW.
Q) What is National Cyber Security Policy 2013?
Q) What do you mean by Cyber Forensics? Explain the types of Cyber Forensics.
Q) How preliminary investigation can be handled?
Q) Explain the Investigating Information Hiding technique in Cyber Forensics.
Q) How to validate e-mail header information?
Q) Write a detailed note on Tracing Internet Access.

You might also like