Cyber crime Recollected Questions date-08/07/18
Q1.what is honey pot. Q2. What are steps involved in a Ecommerce transactions. Q3. Difference between durability and consistency. Q4. What is firewell. Q5 .what is wankworm and NASA. Q6. Eucp published in which year. Q7.OLA is not a popular app store. Q8.what is circumstantial evidences. Q9.BOSS (Bharat operating system solution was developed by which organizations -CDAC Q10.what is malicious code writer's. Q11.What is multylayered security Q12. What is data. Q13.blackmailing is an example of cyber extortion. Q14 what is SCADA. Q15.what is cryptolocker Q16.smart card in metrorailway stations are examples Q17.packet filter firewall. Q18.micro ATM. Q19.cross site Scripting. Q20. What is A hectivist...
Q21 . Rupay card is issued in which year. Q22 what is Trojan hourse. Q23. What is malware. Q.24.data backup is an example of which type of control. Q25.what is Lebance loop modulas oprendi in atm card frauds. Q26.CCTV is an example of which control. Q27.what is Cyber Smearing. Q28.what is operating system vulnerability Q29.what is full form of CISA cyber security information sharing Act. Q30 what is zeus viruses. Q31.what is hashh value and integrity. Q32.w difference between Authirization and Authentication. Q33. What is INFO stealer. Q34.e.what is A beck End Access. Q35.what is meaning of phrase of "Ab initio Unlawfully or Unlegally. Q36.what is security Administration and Quality Assurance. Q37.what is CAPTCHA. Q38.Intentionally misrepresentation of Data is called A Fraud. Q39. What is definition of Control. Q40.What is A John Deo Order. ...
Q41.what is payment walked and digital wallet Q42 what is Anonymous. Q43. What is trapdoor access. AQ44..Total branch automation TMA. Q45. .com and .org are TLD. Q46. TCS fraud in Andhra Pradesh is an example of reasonable security practises and procedures. Q47. The PVCL case in India refers to which Act of IT act Act_69 power to moniter,intercept or Block URL. Q48.one question on CBS and TBA total branch Automations. Q49. Sysadmin sysuser or teller all are examples of Spoofing. Q50.what is A network Analysis. Q51.what is vulnerability Q52.what is DNS sinkholding. Q53.e.Contactless smart card are example of which. Q54 .Lebance Loop card fraud rubber band type material inside Atm Fraud. Q55.what is Contigency pkanning. Q56.what is Nigrean 419 Fraud. Q57.Dumpster Diving. Q58.what is diffrence between Steersman and script kiddle Q59.Staganography. Q60. What is SSL injections and Cross Site Scripting......
Recollected questions from prevention of cyber crimes and fraud management...
Script kiddie
Prevention control, deterrent control,
Interpol (which indian agency co-ordinate with it)
Zeus
From which year UCP is effective
UTM
Asymmetric and symmetric encryption(2 questions )
Cert
I4C
IT act and IT amendment act(3 questions approx)
Blue hat hacker
Eavesdropping
Mitm
Didi
Digital signature
How to make email secure---SSL, SHA like tech
Q1.what is honey pot. Q2. What are steps involved in a Ecommerce transactions. Q3. Difference between durability and consistency. Q4. What is firewell. Q5 .what is wankworm and NASA. Q6. Eucp published in which year. Q7.OLA is not a popular app store. Q8.what is circumstantial evidences. Q9.BOSS (Bharat operating system solution was developed by which organizations -CDAC Q10.what is malicious code writer's. Q11.What is multylayered security Q12. What is data. Q13.blackmailing is an example of cyber extortion. Q14 what is SCADA. Q15.what is cryptolocker Q16.smart card in metrorailway stations are examples Q17.packet filter firewall. Q18.micro ATM. Q19.cross site Scripting. Q20. What is A hectivist...
Q21 . Rupay card is issued in which year. Q22 what is Trojan hourse. Q23. What is malware. Q.24.data backup is an example of which type of control. Q25.what is Lebance loop modulas oprendi in atm card frauds. Q26.CCTV is an example of which control. Q27.what is Cyber Smearing. Q28.what is operating system vulnerability Q29.what is full form of CISA cyber security information sharing Act. Q30 what is zeus viruses. Q31.what is hashh value and integrity. Q32.w difference between Authirization and Authentication. Q33. What is INFO stealer. Q34.e.what is A beck End Access. Q35.what is meaning of phrase of "Ab initio Unlawfully or Unlegally. Q36.what is security Administration and Quality Assurance. Q37.what is CAPTCHA. Q38.Intentionally misrepresentation of Data is called A Fraud. Q39. What is definition of Control. Q40.What is A John Deo Order. ...
Q41.what is payment walked and digital wallet Q42 what is Anonymous. Q43. What is trapdoor access. AQ44..Total branch automation TMA. Q45. .com and .org are TLD. Q46. TCS fraud in Andhra Pradesh is an example of reasonable security practises and procedures. Q47. The PVCL case in India refers to which Act of IT act Act_69 power to moniter,intercept or Block URL. Q48.one question on CBS and TBA total branch Automations. Q49. Sysadmin sysuser or teller all are examples of Spoofing. Q50.what is A network Analysis. Q51.what is vulnerability Q52.what is DNS sinkholding. Q53.e.Contactless smart card are example of which. Q54 .Lebance Loop card fraud rubber band type material inside Atm Fraud. Q55.what is Contigency pkanning. Q56.what is Nigrean 419 Fraud. Q57.Dumpster Diving. Q58.what is diffrence between Steersman and script kiddle Q59.Staganography. Q60. What is SSL injections and Cross Site Scripting......
Recollected questions from prevention of cyber crimes and fraud management...
Script kiddie
Prevention control, deterrent control,
Interpol (which indian agency co-ordinate with it)
Zeus
From which year UCP is effective
UTM
Asymmetric and symmetric encryption(2 questions )
Cert
I4C
IT act and IT amendment act(3 questions approx)
Blue hat hacker
Eavesdropping
Mitm
Didi
Digital signature
How to make email secure---SSL, SHA like tech
Integrity
Authentication
No comments:
Post a Comment