Sie sind auf Seite 1von 4

CYBER SECURITY SHORT QUESTION

1) What is Cyber Security?


2) What do you mean by cyber?
3) What is security?
4) Difference between network security and Cyber security.
5) What is vulnerability?
6) What do you mean by port?
7) Full form of openVAS and use of openVAS tool.
8) Use of metasploit.
9) Full form of NMAP and Working of NMAP
10) Use of wireshark.
11) What do you mean by network?
12) What is sniffer?
13) What is network sniffer?
14) What is firewall? Use of firewall?
15) Types of firewalls
16) Full form of VPN and use of VPN
17) Full form of Netcat and use of it.
18) What is network injection?
19) Difference between packet filter vs firewall.
20) What do you mean by traffic probe?
21) What is banner grabbing?
22) Difference between stateless and statefull
23) Full form NAT and its use.
24) What is snort?
25) Difference between linux firewall and windows firewall
26) What do you mean intrusion?
27) What is intrusion detection system?
28) What is intrusion prevention system?
29) Types of intrusion detection system
30) Full form of DVWA and its use.
31) What is brute force attack? How it performs.
32) Platform for DVWA tool.
33) What is cyber crime?
34) Types of cyber crime
35) Types of hacking.
36) What is hacker?
37) Types of Hackers
38) What is Attack?
39) Types of attack.
40) Which os is mostly used in hacking and why?
41) What is cyber space?
42) What is incident response?
43) What is digital forensics?
44) What is computer forensics?
45) Difference between digital forensics and computer forensics
46) Difference between computer language and network language
47) What is internet?
48) What is intranet?
49) What is extranet?
50) Difference between internet, intranet and extranet
51) What is destruction of data?
52) What is password cracking?
53) Techniques of password cracking?
54) What is keylogger?
55) Work of keylogger
56) Types of keylogger?
57) What is spyware?
58) What is virus?
59) Which is self replicated virus or warm?
60) What is warms?
61) Difference between viruses and warms.
62) What is malware?
63) Types of malware.
64) What is Adware?
65) What is crimeware?
66) What is anti-virus? How it works?
67) What is Trojans?
68) What is backdoors?
69) What do you mean by steganography?
70) Full form of DOS and DDOS attack
71) Difference between DOS and DDOS attack
72) What is SQL injection?
73) What is buffer overflow?
74) Attack on wireless network
75) How firewalls protect a network?
76) Indian IT act 2000.
77) Commands explanation of manual and basic commands.
78) Real time examples of crimes.
79) Name of Top Indian hacker.
80) What are the principles of security?
81) Full form of TCP, UDP and HTTP, WWW.
82) What is ethical hacking?
83) how can you Recognize and Define Computer Crime
84) Tcpdump and Windump, Wireshark, Ettercap, Hping Kismet use for ?
85) Explain risk, vulnerability and threat.
86) What is encryption and what is the difference between Asymmetric and
Symmetric encryption and which one is better?
87) What is a firewall and how do you keep yourself updated with the
information security news.
88) What is an IPS and how does it differs from IDS?
89) What is vulnerability scanning, Traffic Probe, Vulnerability Probe,
OpenVAS, Metasploit.
90) Explain Networks Vulnerability Scanning tools.
91) Purpose and use of Netcat, Socat and Nmap.
92) What are the Port and Services tools.
93) Datapipe, Fpipe, WinRelay tools used for ?
94) what is steganography?
95) Define Cryptojacking and Ransomware.
96) What is momo watsapp challenge?
97) Password cracking tools(Any 10)
98) How many passwords can a computer guess per second?
99) Recent trends in cyber security

Das könnte Ihnen auch gefallen