0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
86 Ansichten4 Seiten
Cyber security is the protection of internet-connected systems, including hardware, software and data, from cyber attacks. It involves protecting networks, computers, programs and data from unauthorized access, destruction or manipulation. Some key aspects of cyber security covered are network security vs cyber security, vulnerabilities, ports, tools like Nmap, openVAS, metasploit, firewalls, intrusion detection and prevention systems, cyber crimes, hacking, malware, encryption, ethical hacking and recent trends. Cyber security also encompasses recovery from cyber incidents like restoring systems and data that have been compromised or damaged.
Cyber security is the protection of internet-connected systems, including hardware, software and data, from cyber attacks. It involves protecting networks, computers, programs and data from unauthorized access, destruction or manipulation. Some key aspects of cyber security covered are network security vs cyber security, vulnerabilities, ports, tools like Nmap, openVAS, metasploit, firewalls, intrusion detection and prevention systems, cyber crimes, hacking, malware, encryption, ethical hacking and recent trends. Cyber security also encompasses recovery from cyber incidents like restoring systems and data that have been compromised or damaged.
Cyber security is the protection of internet-connected systems, including hardware, software and data, from cyber attacks. It involves protecting networks, computers, programs and data from unauthorized access, destruction or manipulation. Some key aspects of cyber security covered are network security vs cyber security, vulnerabilities, ports, tools like Nmap, openVAS, metasploit, firewalls, intrusion detection and prevention systems, cyber crimes, hacking, malware, encryption, ethical hacking and recent trends. Cyber security also encompasses recovery from cyber incidents like restoring systems and data that have been compromised or damaged.
2) What do you mean by cyber? 3) What is security? 4) Difference between network security and Cyber security. 5) What is vulnerability? 6) What do you mean by port? 7) Full form of openVAS and use of openVAS tool. 8) Use of metasploit. 9) Full form of NMAP and Working of NMAP 10) Use of wireshark. 11) What do you mean by network? 12) What is sniffer? 13) What is network sniffer? 14) What is firewall? Use of firewall? 15) Types of firewalls 16) Full form of VPN and use of VPN 17) Full form of Netcat and use of it. 18) What is network injection? 19) Difference between packet filter vs firewall. 20) What do you mean by traffic probe? 21) What is banner grabbing? 22) Difference between stateless and statefull 23) Full form NAT and its use. 24) What is snort? 25) Difference between linux firewall and windows firewall 26) What do you mean intrusion? 27) What is intrusion detection system? 28) What is intrusion prevention system? 29) Types of intrusion detection system 30) Full form of DVWA and its use. 31) What is brute force attack? How it performs. 32) Platform for DVWA tool. 33) What is cyber crime? 34) Types of cyber crime 35) Types of hacking. 36) What is hacker? 37) Types of Hackers 38) What is Attack? 39) Types of attack. 40) Which os is mostly used in hacking and why? 41) What is cyber space? 42) What is incident response? 43) What is digital forensics? 44) What is computer forensics? 45) Difference between digital forensics and computer forensics 46) Difference between computer language and network language 47) What is internet? 48) What is intranet? 49) What is extranet? 50) Difference between internet, intranet and extranet 51) What is destruction of data? 52) What is password cracking? 53) Techniques of password cracking? 54) What is keylogger? 55) Work of keylogger 56) Types of keylogger? 57) What is spyware? 58) What is virus? 59) Which is self replicated virus or warm? 60) What is warms? 61) Difference between viruses and warms. 62) What is malware? 63) Types of malware. 64) What is Adware? 65) What is crimeware? 66) What is anti-virus? How it works? 67) What is Trojans? 68) What is backdoors? 69) What do you mean by steganography? 70) Full form of DOS and DDOS attack 71) Difference between DOS and DDOS attack 72) What is SQL injection? 73) What is buffer overflow? 74) Attack on wireless network 75) How firewalls protect a network? 76) Indian IT act 2000. 77) Commands explanation of manual and basic commands. 78) Real time examples of crimes. 79) Name of Top Indian hacker. 80) What are the principles of security? 81) Full form of TCP, UDP and HTTP, WWW. 82) What is ethical hacking? 83) how can you Recognize and Define Computer Crime 84) Tcpdump and Windump, Wireshark, Ettercap, Hping Kismet use for ? 85) Explain risk, vulnerability and threat. 86) What is encryption and what is the difference between Asymmetric and Symmetric encryption and which one is better? 87) What is a firewall and how do you keep yourself updated with the information security news. 88) What is an IPS and how does it differs from IDS? 89) What is vulnerability scanning, Traffic Probe, Vulnerability Probe, OpenVAS, Metasploit. 90) Explain Networks Vulnerability Scanning tools. 91) Purpose and use of Netcat, Socat and Nmap. 92) What are the Port and Services tools. 93) Datapipe, Fpipe, WinRelay tools used for ? 94) what is steganography? 95) Define Cryptojacking and Ransomware. 96) What is momo watsapp challenge? 97) Password cracking tools(Any 10) 98) How many passwords can a computer guess per second? 99) Recent trends in cyber security