0% found this document useful (0 votes)
3K views2 pages

Cyber Security Question Papers

The document contains two question papers for a Cyber Security course, covering various topics such as cybersecurity fundamentals, account and data security, network and system security, ethical hacking, and cyber crime. Each unit includes questions that assess understanding of key concepts, definitions, and the implications of cybersecurity practices. The questions range in difficulty and require both theoretical knowledge and practical application.

Uploaded by

saumyashah2612
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3K views2 pages

Cyber Security Question Papers

The document contains two question papers for a Cyber Security course, covering various topics such as cybersecurity fundamentals, account and data security, network and system security, ethical hacking, and cyber crime. Each unit includes questions that assess understanding of key concepts, definitions, and the implications of cybersecurity practices. The questions range in difficulty and require both theoretical knowledge and practical application.

Uploaded by

saumyashah2612
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cyber Security Course - Question Papers

Question Paper 1

Unit I: Introduction to Cybersecurity & Cryptography

- Define cyber security and explain its importance in protecting digital assets. (3 marks)

- Explain the CIA triad and its significance in designing secure systems. (4 marks)

- Describe asymmetric encryption and discuss how it enhances data security. (7 marks)

Unit II: Account & Data Security

- What is authentication? Explain its significance in cybersecurity. (3 marks)

- Differentiate between various types of malicious software. (4 marks)

- Discuss the types of attacks on account and data. Provide examples. (7 marks)

Unit III: Network & System Security

- Explain the importance of ports and list key ports relevant to web security. (3 marks)

- Describe SSL and TLS protocols and how they secure data transmission. (4 marks)

- Discuss the role of VPNs in ensuring privacy and data protection. (7 marks)

Unit IV: Ethical Hacking

- What is the difference between ethical and unethical hacking? (3 marks)

- Explain vulnerability scanning and its significance in cybersecurity. (4 marks)

- Describe the five steps of hacking and discuss their ethical implications. (7 marks)

Unit V: Cyber Crime & Cyber Forensics

- What is cybercrime? Provide an example. (3 marks)

- Explain the different types of cybercrimes based on the crime's target. (4 marks)

- Discuss the concept of digital forensics and its importance in cyber investigations. (7 marks)
Question Paper 2

Unit I: Introduction to Cybersecurity & Cryptography

- Define the OSI security architecture and its components. (3 marks)

- Explain how hashing algorithms like MD5 and SHA ensure data integrity. (4 marks)

- Discuss various common security attacks and their mechanisms. (7 marks)

Unit II: Account & Data Security

- Define authorization and its role in cybersecurity. (3 marks)

- Describe CAPTCHA and firewalls and their application in security. (4 marks)

- Explain brute-force and credential stuffing attacks. How can they be mitigated? (7 marks)

Unit III: Network & System Security

- Explain the concept of digital signatures and digital certificates. (3 marks)

- Describe HTTPS and SSH and their role in web security. (4 marks)

- How do Secure Socket Layer (SSL) and Transport Layer Security (TLS) contribute to

cybersecurity? (7 marks)

Unit IV: Ethical Hacking

- Define the term 'vulnerability' in the context of hacking. (3 marks)

- Discuss basic commands used in Kali Linux for ethical hacking. (4 marks)

- Describe various types of attacks, such as phishing, brute-force, and injection attacks. (7 marks)

Unit V: Cyber Crime & Cyber Forensics

- What is social engineering in cybercrime? Give an example. (3 marks)

- Explain cyber defamation and how it impacts individuals. (4 marks)

- Discuss the challenges in preventing cybercrime and provide prevention techniques. (7 marks)

You might also like