The document contains a comprehensive list of questions related to various aspects of cybersecurity, including key concepts like the CIA triad, types of cyber threats, and security measures such as authentication and encryption. It also covers specific attacks, malware types, and preventive strategies, providing a broad overview of the field. This resource serves as a practice guide for understanding fundamental cybersecurity principles and challenges.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
34 views2 pages
Questions For Practice
The document contains a comprehensive list of questions related to various aspects of cybersecurity, including key concepts like the CIA triad, types of cyber threats, and security measures such as authentication and encryption. It also covers specific attacks, malware types, and preventive strategies, providing a broad overview of the field. This resource serves as a practice guide for understanding fundamental cybersecurity principles and challenges.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
NIS Questions for Practice
• What is the CIA triad in cybersecurity? Explain its significance.
• Explain the importance of confidentiality, integrity, and availability in information security. • Define and differentiate between vulnerability, threat, and risk in cybersecurity. • Describe the following terms: i) Security Policy ii) Security Control. • What are the different types of security breaches? Explain with examples. • Compare and contrast hackers and crackers (three points). • Define the terms: i) Cybercrime ii) Cybersecurity. • Explain the role of authentication and authorization in computer security. • What are assets in cybersecurity? How do organizations protect critical assets? • Explain different types of threats in cybersecurity with examples. • Describe any two of the following terms: i) Application patches ii) Hotfix iii) Upgrades. • Explain the importance of software updates and patches in cybersecurity. • Differentiate between bug fixes, patches, and service packs. • What is malware? Explain its different types with examples. • Define computer virus and explain its common characteristics. • What are the different phases of a virus life cycle? Explain in detail. • Differentiate between a virus, a worm, and a Trojan horse. • Describe the following attacks: i) Sniffing ii) Spoofing. • Explain the concepts of Phishing and Pharming attacks. • What are the common techniques used in Man-in-the-Middle (MitM) attacks? • What is a computer worm? How does it differ from a virus? • Explain the different types of worms and their impact on network security. • What is a password? Discuss different types of password attacks. • Explain the importance of strong passwords and password managers. • What is brute-force attack? How can it be prevented? • Explain piggybacking and shoulder surfing with examples. • What is social engineering? Explain different types of social engineering attacks. • Define dumpster diving and tailgating in the context of cybersecurity. • What is a biometric system? Explain its working with a diagram. • List and explain different biometric authentication techniques. • Compare fingerprint scanning and retina scanning in biometric authentication. • What are the advantages and disadvantages of biometric authentication? • Explain two-factor authentication (2FA) and multi-factor authentication (MFA). • What is a CAPTCHA? How does it help in security? • What is keylogging? How does it work, and how can it be prevented? • What is session hijacking? Explain its impact and prevention methods. • Explain Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. • Describe SQL Injection attacks and explain how to prevent them. • What are ransomware attacks? Explain their working mechanism. • Explain different types of cyber attacks: i) Insider Threats ii) Zero-day Exploits. • Differentiate between active and passive attacks with examples. • Explain the working of an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). • What is a honeypot in cybersecurity? How does it help detect cyber threats? • Describe different types of firewalls and their working mechanisms. • Explain the importance of encryption in cybersecurity. • Differentiate between symmetric and asymmetric encryption with examples. • What is digital signature? Explain its role in ensuring data integrity. • What are security tokens? Explain their use in authentication. • Describe the concept of data loss prevention (DLP) in cybersecurity. • What are different types of cybercrime? Explain with real-world examples.