You are on page 1of 2

Cyber Laws and Security Policies

Question Bank

Unit – I
Small Questions
What is Cyber security?
What is Cyber Space?
Need of Cyber security, why?
List out types of Cyber security.
What is Internet Governs?
How to overcome the cyber security problem?
How to achieve cyber security “success”?
What is Cybercrime?
List out any four cybercrime.
What are the advantages of cyber Security?
How to avoid cybercrime in internet?
What is Cyber terrorism?
How Does Cyber terrorism affect?
List out most common attack methods.
What is IP spoofing?
What is password cracking?
Define Denial-of–Service.
What is cyber warfare?
What is use of cyber security policy?
What is the national strategy for cyber security?
What is the international policy for cyber security?
Define Internet Governance.

Big Questions.
Explain in detail about Cyber security and functions.
Define Cybercrime. Explain in details.
How Cyber terrorism affect in world? Explain in details.
What is attack in computer? Explain in details.
Explain in detail about various attacks in Computer with example.
Discuss in detail about cyber warfare.
Explain cyber security policy in details.
Discuss about cybercrime protection in details.
Discuss in detail about Cyber Security issues.
Discuss various system attacks in details.
List the various cyber security policies.
Why need for international cyberspace? Explain.
Explain in detail about various safety measures are used to protect your information
system.
Write the short note on Cyber Warfare and Cyber terrorism.
Explain in detail about the need for international cyberspace?
Discuss in detail about functions of nodal authority in Cyber security.
Discuss in detail about cyber security policy.
Write the short notes about various system attacks.
Explain in detail about national strategy for cyber security.
Discuss in detail about cyber warfare.
What is cyber terrorism? Explain in detail.
What is Cyber Crime? Explain in detail.
Explain need for a Nodal Authority in cyber security.

Unit – II
Small Questions:

What is Cyber Security Vulnerabilities


Define vulnerabilities in software.
What is use of Complex Network Architecture?
What is the role of system administration?
List out functions of system administration.
Define weak authentication.
What is weak authentication?
Define Unprotected Broadband communications.
Define cyber security awareness.
Discuss vulnerability in cyber security.
What are vulnerabilities in software?
What is Unprotected Broadband communications?
What is use of Open Access to Organizational Data?
What is Biometric security?

Big Questions:

Explain in detail about Cyber Security Vulnerabilities.


Define vulnerabilities in software. Explain in details.
Explain in details about Complex Network Architecture?
What is the role of system administration? Explain.
Explain cyber security threads in detail.
Explain in detail about weak authentication.
Write the short note on (i) Thread (ii) Risk
Discuss in detail about Unprotected Broadband communications.
Explain in detail about cyber security awareness.
Explain in detail about Unprotected Broadband communications.
What is use of Open Access to Organizational Data? Explain.
Explain in detail about Poor Cyber Security Awareness.
Explain in detail Complex Network Architectures.

You might also like