0% found this document useful (0 votes)
56 views4 pages

Question Bank - Cybersecurity

The document is a question bank for the Cybersecurity course (CCS340) for the third semester, detailing course outcomes and a variety of questions categorized by Bloom's Taxonomy. It includes questions on topics such as information gathering, intrusion detection systems, firewalls, and various scanning techniques. The question bank is structured into sections with different mark allocations, including 2-mark, 13-mark, and 16-mark questions.

Uploaded by

Jeffy Shiny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views4 pages

Question Bank - Cybersecurity

The document is a question bank for the Cybersecurity course (CCS340) for the third semester, detailing course outcomes and a variety of questions categorized by Bloom's Taxonomy. It includes questions on topics such as information gathering, intrusion detection systems, firewalls, and various scanning techniques. The question bank is structured into sections with different mark allocations, including 2-mark, 13-mark, and 16-mark questions.

Uploaded by

Jeffy Shiny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Department of Artificial Intelligence and Data Science

Question Bank- Internal II

Semester/Year 03/III
Course Code&
CCS340& Cybersecurity
Course Title
Credits 3
Course Type Theory and Lab
Nature of the
Elective Course
Course

Course Outcomes (COs) BT


level
CO3To understand information gathering UN
CO4To learn how to detect a cyber attack. UN
CO5To learn how to prevent a cyber attack UN
CL-Cognitive Level; R-Remember; Un-Understand; Ap-Apply; An-Analyze; Ev-
Evaluate; Cr-Create

2-Marks

Blooms Unit.
Sl.No Question CO
Taxonomy No
CO 3
1. Define scanning and its types UN 3

CO 3
2. Define Banner Grabbing UN 3

CO 3
3. Define OS footprinting UN 3

CO 3
4. Explain ping UN 3

CO 3
5. Explain Nmap UN 3

CO 4
6. What is an intrusion detection system UN 4
CO 4
7. Define passive sensor and inline sensor UN 4

CO 4
8. Recall the concept of honeypot and its role in IDS UN 4

CO 4
9. What is snort UN 4

CO 4
What is the purpose of intrusion detection exchange
10. UN 4
message format
CO
11. What are the types of IDS UN 4
4
CO
12. Define Security Intrusion UN 4 4

CO
13. What are the two analysis approach of IDS UN 4 4

CO
14. What are the components of Snort UN 4 4

CO
15. Explain the Components of IDS UN 4 4

CO
16. Discuss the need for firewall in cybersecurity UN 5 5

CO
17. Define IPS UN 5 5

CO
18. List out the characteristics of IPS R 5 5

CO
19. Differentiate IDS and IPS AN 5 5

CO
20. Define intruder UN 5 5

CO
21. What are the types of firewall R 5
5
CO
22. Define Firewall biasing UN 5 5

CO
23. What are the types of IPS UN 5 5

CO
24. Define UTM UN 5 5
CO
25. Define SPI firewall UN 5 5

13-Marks

Blooms
Unit.
Sl.No Question Taxonom CO
No
y
CO
1. Briefly explain the Scanning methodology. UN 3
3
CO
2. Define Scanning and Define the types of Scanning UN 3
3

CO
3. Explain Banner Grabbing and OS Fingerprinting UN 3
3

CO
Explain Host based Intrusion Detection System with a 4
4. UN 4
neat diagram
CO
Explain Network based Intrusion Detection System with 4
5. UN 4
a neat diagram
CO
6. Define IDEF and Briefly explain its working. UN 4
4
CO
7. Give a brief note on honeypot with a diagram UN 4
4

CO
8. Explain Snort Architecture UN 4
4

CO
9. Briefly explain the Firewall location and Configuration UN 5
5

CO
10. Define IPS and types of IPS UN 5
5

CO
Briefly explain about Unified Thrat management 5
11. UN 5
Products
Analyze a case study where a firewall misconfiguration CO
led to a security breach in a corporate 5 5
12. UN
network.Investigate the impact of the breach and
propose measures to prevent similar incidents in future
CO
Explain Packet filtering firewall and Statefull Inspection 5
13. UN 5
firewall with diagram.

16-Marks
Blooms
Sl.N Unit.
Question Taxono CO
o No
my
Explain SYN Scan, Stealth scan, XMAS Scan, NULL
1 Un CO3 3
Scan ,IDLE Scan and FIN Scan
Design a intrusion detection system architecture for a large
enterprise network. Evaluate the advantages and
2 UN CO4 4
disadvantages of host based network based and hybrid
intrusion detection approaches in the context
3 Briefly explain about Snort Architecture UN CO4 4
4 Define firewall and explain the types of firewall UN CO5 5
5 Briefly explain about UTM-Unified Threat Management UN CO5 5

You might also like