1.
Explain active and passive Reconnaissance
2. List General guidelines for password policies.
3. What is Social Engineering? Explain with an example.
4. List various threats associated with cloud computing and briefly explain any one.
5. Explain trends in mobility.
6. Discuss steps involved in planning cyberattacks by criminal
7. What is Botnets? Explain how it is exploited by the attackers to cause cyber attack.
8. What are different Security Risks for Organizations?
9. Difference between virus and worms
10. Define i) Cyberstalking ii) Email Bombing
11. Define i) Cyber Terrorism ii) Phishing
12. Explain triangulation attack
13. Explain how cyber attack can happen in cloud computing.
14. What do you understand by DoS and DDoS attack
15. What illegal activities are observed in cyber cafes? What safety and security measures need
to be taken while using the computer in the Cyber Cafe?
16. Describe the attack vector.
17. State different countermeasures to prevent the SQL injection attack
18. Discuss types of cyber stalkers and their mitigation technique.
19. What is a vishing attack? How it works? How to protect from vishing attack?
20. Explain any one the classification of the cybercrime with an example.
21. write a short note on keylogger
22. How attack vector is used by attacker to gain access of system