0% found this document useful (0 votes)
13 views1 page

IA-1question Bank

Question Bank ML

Uploaded by

vishalpatil5666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views1 page

IA-1question Bank

Question Bank ML

Uploaded by

vishalpatil5666
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

1.

Explain active and passive Reconnaissance


2. List General guidelines for password policies.
3. What is Social Engineering? Explain with an example.
4. List various threats associated with cloud computing and briefly explain any one.
5. Explain trends in mobility.
6. Discuss steps involved in planning cyberattacks by criminal
7. What is Botnets? Explain how it is exploited by the attackers to cause cyber attack.
8. What are different Security Risks for Organizations?
9. Difference between virus and worms
10. Define i) Cyberstalking ii) Email Bombing
11. Define i) Cyber Terrorism ii) Phishing
12. Explain triangulation attack
13. Explain how cyber attack can happen in cloud computing.
14. What do you understand by DoS and DDoS attack
15. What illegal activities are observed in cyber cafes? What safety and security measures need
to be taken while using the computer in the Cyber Cafe?
16. Describe the attack vector.
17. State different countermeasures to prevent the SQL injection attack

18. Discuss types of cyber stalkers and their mitigation technique.


19. What is a vishing attack? How it works? How to protect from vishing attack?
20. Explain any one the classification of the cybercrime with an example.
21. write a short note on keylogger
22. How attack vector is used by attacker to gain access of system

You might also like