Question Bank - Cybersecurity
Question Bank - Cybersecurity
Semester/Year 03/III
Course Code&
CCS340& Cybersecurity
Course Title
Credits 3
Course Type Theory and Lab
Nature of the
Elective Course
Course
2-Marks
Blooms Unit.
Sl.No Question CO
Taxonomy No
CO 3
1. Define scanning and its types UN 3
CO 3
2. Define Banner Grabbing UN 3
CO 3
3. Define OS footprinting UN 3
CO 3
4. Explain ping UN 3
CO 3
5. Explain Nmap UN 3
CO 4
6. What is an intrusion detection system UN 4
CO 4
7. Define passive sensor and inline sensor UN 4
CO 4
8. Recall the concept of honeypot and its role in IDS UN 4
CO 4
9. What is snort UN 4
CO 4
What is the purpose of intrusion detection exchange
10. UN 4
message format
CO
11. What are the types of IDS UN 4
4
CO
12. Define Security Intrusion UN 4 4
CO
13. What are the two analysis approach of IDS UN 4 4
CO
14. What are the components of Snort UN 4 4
CO
15. Explain the Components of IDS UN 4 4
CO
16. Discuss the need for firewall in cybersecurity UN 5 5
CO
17. Define IPS UN 5 5
CO
18. List out the characteristics of IPS R 5 5
CO
19. Differentiate IDS and IPS AN 5 5
CO
20. Define intruder UN 5 5
CO
21. What are the types of firewall R 5
5
CO
22. Define Firewall biasing UN 5 5
CO
23. What are the types of IPS UN 5 5
CO
24. Define UTM UN 5 5
CO
25. Define SPI firewall UN 5 5
13-Marks
Blooms
Unit.
Sl.No Question Taxonom CO
No
y
CO
1. Briefly explain the Scanning methodology. UN 3
3
CO
2. Define Scanning and Define the types of Scanning UN 3
3
CO
3. Explain Banner Grabbing and OS Fingerprinting UN 3
3
CO
Explain Host based Intrusion Detection System with a 4
4. UN 4
neat diagram
CO
Explain Network based Intrusion Detection System with 4
5. UN 4
a neat diagram
CO
6. Define IDEF and Briefly explain its working. UN 4
4
CO
7. Give a brief note on honeypot with a diagram UN 4
4
CO
8. Explain Snort Architecture UN 4
4
CO
9. Briefly explain the Firewall location and Configuration UN 5
5
CO
10. Define IPS and types of IPS UN 5
5
CO
Briefly explain about Unified Thrat management 5
11. UN 5
Products
Analyze a case study where a firewall misconfiguration CO
led to a security breach in a corporate 5 5
12. UN
network.Investigate the impact of the breach and
propose measures to prevent similar incidents in future
CO
Explain Packet filtering firewall and Statefull Inspection 5
13. UN 5
firewall with diagram.
16-Marks
Blooms
Sl.N Unit.
Question Taxono CO
o No
my
Explain SYN Scan, Stealth scan, XMAS Scan, NULL
1 Un CO3 3
Scan ,IDLE Scan and FIN Scan
Design a intrusion detection system architecture for a large
enterprise network. Evaluate the advantages and
2 UN CO4 4
disadvantages of host based network based and hybrid
intrusion detection approaches in the context
3 Briefly explain about Snort Architecture UN CO4 4
4 Define firewall and explain the types of firewall UN CO5 5
5 Briefly explain about UTM-Unified Threat Management UN CO5 5