0% found this document useful (0 votes)
137 views3 pages

IMP Questions

Uploaded by

gawalismitesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
137 views3 pages

IMP Questions

Uploaded by

gawalismitesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

2 marks

 Who is the father of cyber security


 What is Cryptography?
 What is the name of IT Act?
 What is information security in cyber law?
 Which act is useful in cyber law?
 What is an intrusion detection system (IDS)?
 What are the types of attacks ?
 What are the primary goals of information security?
 Define 'steganography'?,
 What are the three main types of attacks on the confidentiality. integrity,
and availability of data?
 Outline one key component of the Information Technology Act, 2000?
 Define 'ethical hacking'?
 Define 'information security architecture.'
 What is symmetric key cryptography?
 What is ethical hacking?
 Define cryptography and its primary purpose in data security.
 What is a 'trojan horse' in the context of malware?
 What role does information security play in the context of cyber law?
4 marks
o Define Information Security and explain its three primary goals.
o What is a digital signature, and how does it contribute to information
security?
o What is a denial-of-service (DoS) attack? Describe its potential impact
on network security.
o Describe the various forms of cyber security threats and their potential
effects on information systems?
o What is malware? Discuss different types of malware?
o What is ethical hacking, and why is it important in the context of
information security?
o What are the main types of security attacks, and how do they
differ from each other?
o Explain Cyber Security Threats ?
o Explain the concept of 'ethical hacking'. What is its primary purpose?
o What is the difference between 'white hat' hackers and 'black hat'
hackers?
o Explain how cyber law impacts the handling and investigation of online
fraud.
o Explain the various types of security attacks and highlight the key
differences between them.?
o Mention the difference between symmetric and asymmetric key.
o What are the different types of cyber security threats, and how do
they impact digital systems?
o What are the main differences between data theft and identity theft?
o In what ways does cyber law influence the processes involved in
addressing and investigating online fraud
o Explain the concept of ethical hacking

6 marks
 Give An Overview Of The Information Technology Act 2000?
 What is phishing, and what measures can individuals and organizations
take to protect against it?
 List and briefly describe at least three common hacking techniques. For
each technique, explain how it works?
 Discuss the various types of cryptographic techniques?
 What is the use of a firewall and how it can be implemented?
 Describe the architecture of information security and its role in
preventing cyberattacks.
 what is the cryptography & Explain features & types of cryptography
 How does phishing work as a cyber threat, and what are its effects on
both individual and organizational security?
 What are the primary functions of a firewall, and what are the different
methods of implementing it in a network?
 Describe the network security model and how it helps protect data.
 Briefly explain the concept of phishing and its impact on personal and
organizational security.
 How does a firewall function as a security measure, and what are the
different ways it can be implemented ?
 What is malware? Discuss different types of malware such as viruses,
worms, and Trojan horses.
 What is identity theft, and what measures can be taken to prevent it?
 What is the Android security model? How does it protect against security
threats?

You might also like