1. 2Q on Detection control & 1Q on prevention control- select which is detection control of these.
2. E governance- Many questions
3. Netra related to which org.
4. Case based questions of 2Mks
5. Cyber Crime Triangle
6. Given a statement- In which act it is included.
7. 1Q on a case related to cyber crime. For what the case is for.
Information Silo
DGCA
C-DAC
Satyam & Sify
PCIDSS
Lebanese Loop
Man in the Middle Attack
Sinkholding
UCP600 -July2007
SCADA
Cyber Stalking
TLD ( dot in )
mens rea
Dumpster Diving
BYOD (Bring your Own Device)
Installing CCTV & Fire Alaram is which type control
Tailgating
OLA is not a popular app store
multylayered security
what is data
prepaidcard
micro ATM
cross site Scripting.
hectivist.
Trojan hourse
Cyber Smearing
data backup is an example of which type of control
INFO stealer
CAPTCHA
definition of Control
why digital wallet being promoted by bank
Staganography
Blue hat hacker
CBI
packet filter firewall
2. E governance- Many questions
3. Netra related to which org.
4. Case based questions of 2Mks
5. Cyber Crime Triangle
6. Given a statement- In which act it is included.
7. 1Q on a case related to cyber crime. For what the case is for.
Information Silo
DGCA
C-DAC
Satyam & Sify
PCIDSS
Lebanese Loop
Man in the Middle Attack
Sinkholding
UCP600 -July2007
SCADA
Cyber Stalking
TLD ( dot in )
mens rea
Dumpster Diving
BYOD (Bring your Own Device)
Installing CCTV & Fire Alaram is which type control
Tailgating
OLA is not a popular app store
multylayered security
what is data
prepaidcard
micro ATM
cross site Scripting.
hectivist.
Trojan hourse
Cyber Smearing
data backup is an example of which type of control
INFO stealer
CAPTCHA
definition of Control
why digital wallet being promoted by bank
Staganography
Blue hat hacker
CBI
packet filter firewall
No comments:
Post a Comment