0% found this document useful (0 votes)
25 views16 pages

Sem-6, Cyber Security

The document contains multiple choice questions, fill-in-the-blank exercises, and short answer questions related to cyber security topics for a B.Com Computer Applications course. It covers various aspects of cyber security including definitions, types of malware, security policies, and intrusion detection systems. The document also provides answers to the questions, reinforcing the educational content presented.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views16 pages

Sem-6, Cyber Security

The document contains multiple choice questions, fill-in-the-blank exercises, and short answer questions related to cyber security topics for a B.Com Computer Applications course. It covers various aspects of cyber security including definitions, types of malware, security policies, and intrusion detection systems. The document also provides answers to the questions, reinforcing the educational content presented.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Aurora’s Degree & P.

G College (Reaccredited
by NAAC with ‘B’ grade) Department of
computer sciences
B.com Computer Applications III
Year VI- Semester
Subject: - CYBER SECURITY

UNIT: 1
MULTIPLE CHOICE QUESTIONS:
1.What words consist in hacktivism? [ ]
(a) Hack acknowledge (b) hack active acknowledge ( c )
Hack N activism (d) Hack N acknowledge
2.What malware program demands ransome from victims? [ ]
(a) Ransomeware (b) Ransome trojan
( c ) virus money (d) active ransome
3.Which of the following refers to the violation of the principles if a computer is no more accessible?
[c]
(a) Access control (b) confidentiality
( c) Availability (d) information of things
4.Which of the following is not a cyber threat? [ ]
(a) Cyber warfare (b) cyber crime
( c ) cyber terrorism (d) none of the above
5.Which of the following is not a vulnerable software? [ ]
(a) Virus (b) worm
( c ) winrar (d) trojan horse
6.Bot is short form of [ ]
(a) Battery (b) boot
( c ) best of technology (d) robot
7.Firewalls are to protect against [ ]
(a) Virus attack (b) unauthorized attacks
( c ) data driven attacks (d) fire attacks
8. In which of the following,a person is constantly followed/ chased by another person .
or group of several peoples? [ ] (a) Phishing (b) stalking
( c ) bulling (d) identity theft
9.Which of the following is considered as the unsolicited commercial email? . [ ] (a) Spam (b) virus
( c ) malware (d) worm
10.In which of the following refers to exploring the appropriate, ethical behaviours related to the online
environment and digital media platform? [ ] (a) Cyber law (b) cyber security
( c ) cyberethics (d) cyber safety
.Which of the following provides security at transport layer [ ] a. SSL b. TLS c.SSH
d.Both A & B
12.One security protocol for the E-Mail system is [ ] a.IPSec b. SSL c.PGP d.None of the
above
13. URL stands for – [ ] a) Universal Remote Locator
b) Universal Resource Language
c) Uniform Resource Locator
d) Uniform Resource Language
14.Number of phases in the handshaking protocol? [ ] a) 2 b) 3 c) 4 d) 5
15. S/MIME is abbreviated as __________________ [ ] a) Secure/Multimedia Internet
Mailing Extensions
b) Secure/Multipurpose Internet Mailing Extensions
c) Secure/Multimedia Internet Mail Extensions
d) Secure/Multipurpose Internet Mail Extensions

FILL IN THE BLANKS

1.____________is the convergence of cyberspace and terrorism.


2._________________blocks the unauthorized users from accessing the systems and networks that
connect to the internet.
3.which type of the following malware does not replicate or clone themselves through
infection___________.
4.__________is a self replicating malicious software program that spread through out the computer
files without the knowledge of a user.
5.____________is a type of independent malicious program that never requires any host program.
6.In order to ensure the security of the data/information, we need to __________ the data.
7.__________is a type of software designed to help the users computer detect viruses and avoid them.
8._________a method that bypasses the normal authentication process.
9._____________is an intrusion that may steal sensitive data such as password and credit card
numbers from your internal systems.
10._____________ refers to the process of proving an identity to an application or
system. 11. _______ is actually an IETF version of __________
12. In ______________ the cryptographic algorithms and secrets are sent with the message
13. HTTPS is abbreviated as _________
14. _________ is used for encrypting data at network level.
15. ________________ is the kind of firewall is connected between the device and the network
connecting to internet.
Short answer questions:
1. What is cyber security?

Ans. Cyber security can be broke down into two categories: cyber and security. The term cyber refers to a
wide range of technology, including systems, network, program and data. Security on the other hand is
concerned with the safeguarding of system, network, applications and data: - cyber security is the process
of safeguarding internet connected system such as computer, servers, mobile devices, electronic systems,
and network and data form malicious attacks
2. What is mobile malware?

Ans: - Mobile malware: it is malicious software that is designed to specifically target mobile operating
systems and disrupt their functionality. The most common cause is the insecure use of URLs over WIFI or
other internet network
3. What is a security policy?

Ans : - security policies are a formal set of rules which is issued by an organization to ensure that the user
who are authorized to access company technology and information assets comply with rules and
guidelines related to the security of information

4. What is the firewall policy?


Ans:- firewall policy is a policy automatically detects and blocks the network attacks and browser
attacks It detects the attacks by cybercriminals and removes the unwanted sources of network traffic

5. what is cyber warfare?


Ans :- cyber warfare refers to the use of digital attacks like computer viruses and hacking by one country
to disrupt the vital computer system of another , with the aim of creating damage , death and destruction .
future wars will see hackers using computer code to attack an enemy’s infrastructure

Key
MCQ's Answers:
1.c
2. a
3. c
4. d
5. d
6. d
7. b
8. b
9. a
10.c
11. d
12. c
13. c
14. c
15. d
Fill in the Blanks Answers:

1. Cyber terrorism
2. Firewall
3. Trojans
4. Virus
5. Worm
6. Encrypt
7. Antivirus
8. Backdoors
9. Spyware
10. Authenitication
11. TLS and SSL
12. PGP
13. Hyper Text Transfer Protocol Secure
14. IPsec
15. Hardware Firewall

UNIT: 2

MULTIPLE CHOICE QUESTIONS:


1.What does cyber security protect? [ ] (a)Cyber security protects
criminals
(b)Cyber security protects internet-connected systems
(c)Cyber security protects hackers
(d)None of the above
2.Who is the father of computer security? [ ] (a)August kerckhoffs
(b)Bob Thomas
(c)Robert
(d)Charles

3.Which of the following is not a cybercrime? [ ] (a)Denial of


service
(b)Man in the middle
(c)Malware
(d)Aes

4. “Cyberspace” was coined by [ ] (a)Richard stallman


(b)William Gibson
(c)Andrew Tannenbaum
(d)Scott Fahlman

5.Where did the term “hacker” originate? [ ] (a)Mit


(b)New York university
(c)Harvard university
(d)Bell’s lab

6.What is the existence of weakness in a system or network is known as?


. [ ] (a)Attack
(b)Exploit
(c)Vulnerability
(d)Threat
7.To retain a competitive advantage and to meet basic business requirements
. [ ] (a) Ensure the integrity of the information stored on their computer systems
(b)Preserve the confidentiality of sensitive data
(c)Ensure the continued availability of their information systems
(d) all the above
8. The key component of an information system security policy include [ ] (a)
Management support and commitment
(b) Access authorization
(c) Security awareness
(d) All the above
9. A number of different mechanisms are available for raising security awareness including: [ ]
(a) Distribution of a written security policy
(b) Training on a regular basis of new employees,users
(c) Both (a),(b)
(d) None
10. Data classification as a control measure should define: [ ] (a) Who has access rights
(b) Who is responsible for determining the access rights and access levels
(c) What approvals are needed for access
(d) All the above
11. is an attack type that tries to bring down a web host by overwhelming it with requests [ ]
(a) Dos
(b) Snif jacking
(c) Sql injections
(d) Man in the middle attack

12. is a process with which we can allow or restrict resources of a web services . [ ] (a)
Authentication
(b) Authorization
(c) Mandatory access control
(d) None of the above
13) _______ is a type of software designed to help the user's computer detect viruses and avoid them.

a) Malware b)Adware c)Antivirus d)Both B and C


14) When was the first computer virus created? [ ] a)1970 b)1971 c)1972 d)1969
15) Which of the following can be considered as the elements of cyber security? [ ]
a.Application Security b)Operational Security c)Network Security
d.All of the above

FILL IN THE BLANKS:


1. Full form of HTTP ____________________________
2. Full form of SOAP __________________
3. In SOAP, XML ______________introduce malicious code application or database. 4.
____________attacks overwhelm web services with overly many or long messages. 5. ____________is
a code injection , but happens from the web application side to the website. 6.______________is an
unauthorized user who obtains sessions ID , and that user gains full access to the application and /or
another users account.
7. Full form of RBAC ______________
8. Full form of ABAC ___________________________
9. Full form of RADAC ________________________
10. Full form of PBAC_________________.
11.__________________is an authorization mechanism that associates a set of access privileges with a
particular role, often corresponding to a job function.
12. An _____________________System defines and manages user identities and access permissions.
13.__________is a XML- based protocol for accessing web services.
14. _______________is a system for authenticating users and storing user data .
15. A firewall protects the ________ attack.

Short answer questions:

1. What is the enforcing HTTPS?


Ans :- HTTPS stands for hypertext transfer protocol secure is the secure version if HTTP, which is the
primary protocol used to send data between a web browser and a website. HTTP is encrypted in order to
increase security of data transfer. This is particularly important when users transmit sensitive data such as
by logging into bank account, email services or health insurance provider 2. Enabling XSS filtering?
Ans :- cross site scripting (XSS) is an attack in which an attacker injects malicious executable scripts into
the code of a trusted application or website attackers often initiate an xss ATTACK BY SENDING A
MALICIOUS LINK TO A USER AND ENTICING THE USER to click it . if the app or website lacks
proper data sanitization the malicious link executes the attacker’s chosen code on the user’s system
3. SOAP
ANS :- SOAP stands for simple object access protocol. It is an API messaging protocol, and SOAP
security is the strategy that prevents unauthorized access to soap messages and user information 4. SEO
ANS :- SEO stands for search engine optimization :- unusual links , pages and comments can be
populated on a site to confuse the visitors and drive traffic to malicious websites.

5. RBAC

ANS :- RBAC stands for role based access control . it is an authorization mechanism that associates a set
of access privileges with a particular role often corresponding to a jab function . with RBAC all user
access is mediated through role rbac simplifies security management by providing a role hierarchy
structure
MCQ’s
1.a
2. a
3. d
4.b
5.a
6.c
7.d
8.d
9.c
10. d
11. a
12.d
13.c
14. b
15.d

Fill in the blanks


1. Hyper text transfer protocol
2. Simple object access protocol
3. Code injection
4. Denial of service
5. Cross site scripting
6. Session hijacking
7. Roll based access control
8. Attribute based access control
9. Risk adaptive access control
10.Policy based access control
11.Role based access control
12.Identity and access management (IAM
13.SOAP
14.User management
15.Dos

UNIT-3
Multiple Choice Questions:
1. What are the major components of the intrusion detection system? [ ] [a] Analysis
Engine [b] Event provider
[c] Alert Database [d] All of the mentioned
2. What are the different ways to classify an IDS? [ ] [a] Zone-ased [b] Host and Network-
based
[c] Network and Zone-based [d] Level-based
3.What are the characteristics of anomaly-based IDS? [ ] [a] It models the normal usage of
network as a noise characterization
[b] It doesn’t detect novel attacks
[c] Anything distinct from the noise is not assumed to be intrusion
activity [d] It detects base on signature

4. What is the major drawback of anomaly detection IDS? [ ] [a] These are very slow at
detection
[b] It generates many false alarms
[c] It doesn’t detect novel attacks
[d] None of the mentioned
5. What are the characteristics of signature-based IDS? [ ] [a] Most are based on simple
pattern matching algorithms
[b] It is programmed to interpret a certain series of packets
[c] It models the normal usage of network as a noise characterization
[d] Anythning distinct from the noise is assumed to be intrusion activity
6. What are the characteristics of Host-based IDS? [ ] [a] The host operating system logs in
the audit information
[b] Lo3gs includes logins, file opens and program executions
[c] Logs are analysed to detect tails of intrusion
[d] All of the mentioned
7. What are the drawbacks of host-based IDS? [ ] [a] Unselective logging of
messages may increase the audit burdens
[b] Selective logging runs the risk of missed attacks
[c] They are very fast to detect
[d] They have to be programmed for new patterns
8. What are characteristics of Network based IDS? [ ] [a] They look for attack signatures
in network traffic
[b] Filter decides which traffic will not be discared or passed
[c] It is programmed to interpret a certain series of packet
[d] It models the normal usage of network as a noise characterisation
9. Where is an IPS commonly placed in a network? [ ] [a] In front of the firewall
[b] In line with the firewall
[c] Behind the firewall
[d] On the end users’ device
10. If it detects a threat, an IPS can: [ ] [a] Record the details of the threat
[b] Report the threat to security admins
[c] Take preventative action to stop the threat
[d] All of the above
11. Which of the following is not an advantage of cyber security?
a) Makes the system slower
b) Minimizes computer freezing and crashes
c) Gives privacy to users
d) Protects system against viruses
View Answer

12. “Cyberspace” was coined by _________


a) Richard Stallman
b) William Gibson
c) Andrew Tannenbaum
d) Scott Fahlman
View Answer

13. In which year has hacking become a practical crime and a matter of concern in the field of cyber
technology?[ ]
a) 1991
b) 1983
c) 1970
d) 1964
View Answer
14. Governments hired some highly skilled hackers for providing cyber security for the country or state.
These types of hackers are termed as _______[ ]
a) Nation / State sponsored hackers
b) CIA triad
c) Special Hackers
d) Government Hackers
View Answer

15. Which of the following act violates cyber security?[ ]


a) Exploit
b) Attack
c) Threat
d) Vulnerability

Fill in the blanks:


1. Full form of IDS is ______________________.
2.____________is used to prevent, detect, and more computer viruses, worms, Trojan horses
and any other type of malware.
3. Full form of IPS is ______________________
4. Full form of HIPS is _________________________
5._____________audits host log files, host file system, and resources.
6. The features of traditional IPS are found in all of these modern systems, except____________.
7.______________is used to keep subjects accountable for their actions while they are authenticated
to a system.
8.______ tool is the most useful in sorting through large log files when searching for
intrusion-related events.
9._______________ type of IDS can be considered an expert system.
10.___________________ attacks is an attempt to test every possible combination against a security
feature in order to bypass it.
11. A firewall protects the ________ attack.
12. There are ________ major types of passwords.
13. The combination of key exchange, hash and encryption algorithm defines a _ _________ for each
SSL session.
14. The full form of SSL is ________________
15. _____________ is not a higher –layer SSL protocol?

Short answer questions:

1. PHYSICAL THEFT

Ans :- cyber security begins with strong physical security lapses I physical security can expose
sensitive company data to identity theft, with potentially serious consequences

2. MALWARE INFECTION
Ans :- malware or malicious is an umbrella term that describes any malicious program or code that is
harmful to computer system. Hostile, intrusive, and intentionally nasty , malware seeks to invade ,
damage , or disable computers , computer systems , networks, tablets , and mobile devices , often by
taking partial control over a device’s operations.
3. ARTIFICIAL INTELLIGENCE
Ans :- it is the branch of computer technology that develops intelligent machines, which include
reasoning logical manipulation , probability and many other there are various methodologies under
artificial intelligence that are used to implement IDS
4. SOFTWARE APPROACH
Ans :- this approach is used to implement IDS with state transition analysis . here intrusion undergoes
different states there are two states in which number of transaction take place; these states correspond to
the state before attack is done on system and the other state is known as compromised state that
corresponds to the state after the system is attacked
5. VIRUSES
Ans :- a computer virus is a malicious application or authored code used to perform destructive activity on
a device or local network. The code’s malicious activity could damage the local file system, steal data,
interrupt services, download additional malware or any other actions coded into the programs to trick users
into executing them on their device, delivering the computer virus payload MCQ’s
1. d
2. b
3. a
4. b
5. a
6. d
7. c
8. a
9. b
10. d
11. a
12. b
13. c
14. a
15. b

Fill in the blanks


1. Intrustion Detection system
2. Anti malware program
3. Intrusion prevention system
4. Host based prevention system
5. Host based intrusion prevention system
6. Anti malware
7. Monitoring
8. IDS
9. Behavior based
10. Brute force attack
11. Dos
12. 7
13. Cipher suite
14. Secure Socket Layer
15. Alarm Protocol
UNIT-4
Multiple Choice Questions:
1. The process of transmitting data in a form so that only intended users can only intended
users can access it, is [ ] (a) Cryptography
(b) Morphing
(c) Monography
(d) None of these
2. A software program or a hardware device that filters all data packets coming [ ]

through a network is known as


(a) Antivirus
(b) Firewall
(c) Cookies
(d) Malware
3. To protect the computer system against the hacker, one must always keep on in the
computer system. [ ] (a) Antivirus
(b) Firewall
(c) VLC player
(d) Script
4. In the computer networks, the encryption techniques are primarily used for
improving the (a) Security (b) Performance (c) Reliability (d) Longevity
[]

5. Which of the following statements is true about the VPN in Network security? [ ] (a)
It is a type of device that helps to ensure that communication between a device and a
network is secure.
(b) It is usually based on the IPsec (IP Security) or SSL (Secure Sockets Layer)
(c) It typically creates a secure, encrypted virtual "tunnel" over the open
internet (d) All of the above
6. If the same pair of keys are used for encryption and decryption, it is called . . [ ] (a)
Asymmetric cryptography
(b) Symmetric cryptography
(c) Public cryptography
(d) None of these
7. VPN is abbreviated as
(a) Visual Private Network
(b) Virtual Protocol Network
(c) Virtual Private Network
(d) Virtual Protocol Networking
8. A can hide a user's browsing activity. [ ] (a) Firewall
(b) Antivirus
(c) Browser
9. VPN are also used for hides user's physical location. [ ] (a) Firewall
(b) Antivirus
(c) VPN
(d) Incognito mode
10. What are the protocols used for creating VPNs? [ ] (a) Layer 2 Tunneling Protocol
(L2TP)
(b) Secure Socket Tunneling Protocol (SSTP)
(c) Point-to-Point Tunneling Protocol (PPTP)
(d) All the above
11. Packet filtering firewalls are deployed on ___ [ ] (a) Routers
(b) Switches
(c) Hubs
(d) Repeaters
12. ACL stands for [ ] (a) Access Condition List
(b) Anti-Control List
(c) Access Control Logs
13. Access Control List The approved general-purpose MAC algorithm is are [ ] (a)
HMAC
(b) KMAC
(c) CMAC
(d) All the above
14. is a popular program used to encrypt and decrypt email over the Internet [ ] (a)
SMTP
i. (b)FTP
ii. (c)PGP
iii. (d)None of these

15. SSL is abbreviated as [ ] (a) Security Socket Layer


(b) Session Security Layer
(c) Security Session Layer
(d) Socket Security Layer

Fill in the Blanks:


1. A _____________cipher processes the input one block of elements at a time,
producing an output block for each input block.
2. A __________cipher processes the input elements continuously, producing output
one element at a time as it goes along.
3. The ______________ cipher processes the input elements continuously, producing
output one element at a time as it goes along.
4. A _____________firewall applies a set of rules to each incoming and outgoing IP
packet and then forwards or discards the packet.
5. A ______________ uses encryption and authentication in the lower protocol layers to
provide a secure connection through an otherwise insecure network , typically the internet.
6. ____________ software is used to protect the company’s information from external and
internal threats.
7. ___________________ensures that the document originated with the person
signing it.
8. Conversion of data into secured format is known as ____________
9. _______________ means protecting information, equipment devices, computer, computer
resource, communication device and information stored.
10. A ______________ serves as a barrier between a LAN and the Internet.
11. ______________ is a method of converting data to a smaller fixed value known as the
key, which is then used to represent the original data.
12. In _____________, both encryption and decryption can be done using just one key.
13. In ___________________, it uses two keys to encrypt and decrypt data
respectively. 14. IPSEC VPNS are operated at the ___________ level.
15. The privacy of the data is safeguarded in IPSec using _________
Key/Asymmetric encryption.

Short answer questions :

1. What is cryptography?

Ans :- cryptography is a method of storing and transmitting data in a particular form so that only those for
whom it is intended can read and process it . crypt means hidden and graphy stands for writing .
cryptography can reformat andtransform the data , making it safer on its tri[ between computers 2. What
is DES ?
Ans :- DES stands for data encryption standard . it is a symmetric-key method of data encryption. DES
works by using the same key to encrypt and decrypt a message , so both the sender and the receiver must
know and use the same private key .

3. What is mean by message authentication ?

Ans :- message authentication is a technique used to ensure that the message has been sent by a genuine
identity and not by an impersonatora message authentication code is a tag, or a hash value attached to
message to ensure the integrity and authenticity if the message the tag or hash value attached to message

4. Digital signatures

Ans :- a digital signature is basically a way to ensure the authenticity and integrity of an electronic
document the document can be an e-mail , spreadsheet , pdf or text file .

5. FIREWALL

Ans :- a firewall is a network security system that monitors incoming and outgoing network trffic
and decides whether to allow or block specific traffic based on a defined set of security rules. A
firewall is a system that enforces an access control policy between two networks such as a private
LAN and the unsafe , public internet
MCQ’s
1. a
2. b
3. b
4. a
5. a
6. b
7. c
8. d
9. c
10. d
11. a
12. d
13. d
14. c
15. a

Fill in the blanks:


1. Block
2. Stream
3. Firewall
4. Packet filtering
5. VPN
6. Firewall
7. Digital signature
8. Encryption
9. Cyber Security
10. Firewall
11. Hashing
12. Symmetric Encryption
13. Asymmetric Encryption
14. Network
15. Public key/Asymmetric
UNIT-5
Multiple choice questions:
1. refers to an electronic medium that is used to facilitate online
communication. [ ]
[a] Cyber space
[b] E-Commerce
[c] E-Payment
[d] None of these
2. is a legal system designed to deal with the internet, computing, Cyberspace, and related
legal issues [ ] [a] Communication law
[b] Cyber law
[c] Computer law
[d] None of these
3. Information Technology Act (IT Act) was []

enacted in year [a] 1998 [b] 2010


[c] 2000
[d] 2005
4.CERT stands for [a] [a] Computer Emergency Response Team
[b] Computer Emergency Rapid Team
[c] Cyber Emergency Response Team
[d] None of the above
5. Registry in WINDOWS operating system contains the information from non
volatile devices is called [a] OS installation date [b] [c] Files that are used recently [d] All of the above
User name []

6. The tool which is used to extract information from non-volatile devices


is called
[]
[a] Digger
[b] Envelope
[c] Recover
[d] Imager
7. An E-Mail contains [ ] [a] Header
[b] Body
[c](a) and (b)
[d] None of these
8. Email headers are organised [ ] [a] Bottom-up
[b]Top-Bottom
[c] Horizontal
[d] Vertical
9. is the technology that helps to reduce spam and phishing of emails [ ]
[a] RAM
[b]DKIM
[c]IEEE
[d]MIIN
10. is the command to get IP address of your computer [ ] [a] Ipcoan
[b]ipconfig
[c]getip
[d]traceip
11. IP address of IPv4 are long [ ] [a] 28 bit
[b]30 bit
[c]48 bit
[d]32 bit
12. is a special script executed to collect enough information about the user [ ]
[a] Chatbot
[b] Beacon
[c] Cookies
[d] wed fingerprinting.

FILL IN THE BLANKS :

1. A policy, which demand that certain kinds of data must be stored in servers located
physically within India, termed as ___________________
2.______________is referred to as the Law of the internet.
3. ___________is the ISO standard containing the specification for security
management systems for the supply chain
4. ______________is the ISO standard containing guidelines for the identification,
collection, acquisition, and preservation of digital evidence.
5. The process of gathering and documenting proof from a computer or a computing device
by applying the techniques of investigation and analysis is called ______________ 6.
Collecting, preserving, Analysing, and presenting digital artifacts are the primary goals of
______________
7. The____________ file system for Microsoft’s Windows 7 which is used to manage files
present on disk.
8. ___________________is a technical standard and email authentication technique that
helps protect email sender and recipients from spam , spoofing and phishing.
9. _____________provides an encryption key and digital signature that verifies that an
email message was not faked or altered.
10.An ________________is a unique address that identifies a device on the internet or a
local network.
11.IP address pf IPv6 are__________ long.
12.______________are small text files placed on a user’s computer, which are
commonly used to collect personal data.
13.A __________ is a hidden, transparent graphic image that is used to read user
behaviour on user’s computer.
14._____ refers to the analysis of volatile data in a computer’s memory dump.
15.A snapshot capture of computer memory data from a specific instant is called a
_____________

Short answer questions:

1.Cyber space

Ans :- the term cyberspace refers to the virtual computer world and more specifically an electronic medium
that is used to facilitate online communication . cyberspace typically involves a large computer network
made up of many worldwide computer subnetworks that employ TCP/IP protocol to aid in communication
and data exchange activities

2. Cyber law

Ans :- Cyber law is referred to as the law of the internet . The cyber law definition says it is a legal system
designed to deal with the internet , computing , cyberspace, and related legal issues

3. E-MAIL header

Ans : - The e-mail header is a code snippet in an HTML e-mail that contains information about the sender,
recipient , e-mail’s route to get the in box and various authentication details . the email header always
precedes the email body or text

4 Cookies

Ans :- cookies are small text files placed on a user’s computer which are commonly used to collect
personal data . Most website operators place cookies on the browser or hard drive we of their user’s
computer. Cookies can gather information about the use of a website or enable the website to recognize the
user as an existing customer when they return to the website next time.
MCQ’s
1. a
2. b
3. c
4. c
5. d
6. d
7. c
8. a
9. b
10. b
11. d
12. d
Fill in the blanks
1. Data localization
2. Cyber law
3. ISO 28000
4. ISO/IEC 27037
5. Cyber Foreniscs.
6. Cyber investigation
7. NTFS file system
8. Sender policy framework,SPF
9. DKIM
10. IP address
11. 128 bit
12. Cookies
13. Web beacon
14. Memory tracing
15. Memory dump

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy