CYBER SECURITY QUESTION BANK
CYBER SECURITY QUESTION BANK
CYBER SECURITY QUESTION BANK
QUESTION BANK
1. Explain the Basic Stage of an attacker on how an attacker can Compromise a Network
(Jan/Feb 2023)
2. Define the Following
a) Scareware
b) Malvertising
c) Click Jacking
d) Ransomware
3. What are Proxy Servers and Anonymizers? Difference Between Proxy server and
Anonymizer
4. What is Proxy Server? What is its Purpose? (MP Question)
5. What is Phishing? How Phishing Works?
6. What is Password Cracking? Explain in Detail about Password Cracking and its types?
7. Explain Strong, Weak and Random Passwords
8. What are Keyloggers? Explain the types of Keyloggers.
9. What are Spywares
10. Define Virus and Explain about the Typical Actions Performed by viruses?
11. Discuss various types of viruses categorized based on attacks on various elements of the
system (MP Question)
12. What is the difference between a virus and a worm ?
13. What are Trojan Horses? Mention the Threats caused by Trojan Horses.
14. What are Backdoors and what does it do?
15. What is Trojan Horses and Backdoor? How to protect from Trojan horses and Backdoor?
(Jan/Feb 2023)
16. What is Steganography? How does it work? What is Steganalysis?
17. What are DOS and DDOS Attacks? Explain
18. Explain the Classification of DOS Attacks
19. How to Protect from DOS/DDOS Attacks
20. Explain about the types and Levels of DOS Attacks.
21. Explain about Attacks on Wireless Networks
22. What are the traditional Techniques of Attacks on Wireless networks? Explain
23. Write about Theft of Internet Hours
24. Write about Wi-Fi Based frauds and misuses
25. How to Secure Wireless Networks
26. What are the difference between Proxy Server and anonymizer? (Jan/Feb 2023)
27. What are the Different ways of password cracking? (Jan/Feb 2023)
MODULE 4
1. Explain about the four tactics employed by the phishers to entice neitizens?
2. What is Phishing? (Jan/Feb 2023)
3. What are Spam E-Mails and Hoax E=Mails? Explain
4. Explain the Methods of Phishing attacks used by Phishers to reveal personal information
on internet (Jan/Feb 2023)
5. Discuss the various techniques used by Phishers to launch Phishing Attacks (MP
Question)
6. What is spear phishing> Explain with Example (Jan/Feb 2023)
7. Explain Whaling
8. List and Explain Types of Phishing Scams (Jan/Feb 2023)
9. How to avoid Phishing Scams
10. What is Distributed Phishing Attack (DPA)
11. Explain about the Types of Phishing Toolkits
12. Explain Phishing Countermeasures
13. Explain SPS Algorithm to Thwart Phishing Attacks
14. what is Identity Theft? Give Example (Jan/Feb 2023)
15. Briefly Explain about the Types of Identity Theft (Jan/Feb 2023) (MP Question)
16. Explain the two different techniques of ID Theft (Jan/Feb 2023)
17. Explain the countermeasures of ID Theft
18. How to efface ID Theft?
MODULE 5