Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

DAV INSTITUTE OF ENGINEERING AND TECHNOLOGY

Palamu, Jharkhand-8220102

Branch: CSE Subject: Cyber Security Submission Date:25/7/2024

Assignment No. :1
What are the common Cyberattacks?
What are the elements of cyber security?
Define DNS?

Assignment No. :2
What is a Firewall?
What is a VPN?
What are the different sources of malware?

Assignment No. :3
How does email work?
What is the difference between active and passive cyber-attacks?
What is a social engineering attack?

Assignment No. :4
What do you mean by System Hardening?
What is a Distributed Denial of Service attack (DDoS)?
What is a proxy firewall?

Assignment No. :5
Explain SSL Encryption.
Who are black hat hackers and white hat hackers?
Define encryption and decryption?

Assignment No. :6
What is the difference between plaintext and cleartext?
What is a block cipher?
What is the CIA triangle?

Assignment No. :7
What is the Three-way handshake?
How can identity theft be prevented?
What are some common hashing functions?

Assignment No. :8
What do you mean by two-factor authentication?
What does XSS stand for? How can it be prevented?
What do you mean by Shoulder Surfing?

Assignment No. :9
What is the difference between hashing and encryption?
Differentiate between Information security and information assurance.
Write a difference between HTTPS and SSL.
Assignment No. :10
What do you mean by penetration testing?
What are the risks associated with public Wi-Fi?
Explain the main difference between Diffie-Hellman and RSA.

Assignment No. :11


Give some examples of asymmetric encryption algorithms.
Explain social engineering and its attacks.
State the difference between a virus and worm.

Assignment No. :12


Explain the concept of session hijacking.
Explain the honeypot and its types.
What is IP blocklisting?

Assignment No. :13


What are Polymorphic viruses?
What is a Botnet?
What is an Eavesdropping Attack?

Assignment No. :14


What is the man-in-the-middle attack?
What is a traceroute? Why is it used?
What is RSA?

Assignment No. :15


What is the Blowfish algorithm?
What is the difference between a vulnerability and an exploit?
What do you understand by Risk, Vulnerability and threat in a network?

Assignment No. :16


Explain Phishing and how to prevent it.
What do you mean by Forward Secrecy and how does it work?
What is cryptography?

Assignment No. :17


What is a traceroute? Mention its uses.
Define firewall, and why is it used?
Why is a firewall used?

Assignment No. :18


What is a three-way handshake?
What is a response code?
What is SQL injection?

You might also like