CYBER CRIME QUESTIONS OF 15 SEPTEMBER PAPER...
Shared by Praveen Kachhwaha
Q1.what is honey pot. Q2. What are steps involved in a Ecommerce transactions. Q3. Difference between durability and consistency. Q4. What is firewell. Q5 .what is wankworm and NASA. Q6. Eucp published in which year. Q7.OLA is not a popular app store. Q8.what is circumstantial evidences. Q9.BOSS (Bharat operating system solution was developed by which organizations -CDAC Q10.what is malicious code writer's. Q11.What is multylayered security Q12. What is data. Q13.blackmailing is an example of cyber extortion. Q14 what is SCADA. Q15.what is cryptolocker Q16.smart card in metrorailway stations are examples Q17.packet filter firewall. Q18.micro ATM. Q19.cross site Scripting. Q20. What is A hectivist...
Q21 . Rupay card is issued in which year. Q22 what is Trojan hourse. Q23. What is malware. Q.24.data backup is an example of which type of control. Q25.what is Lebance loop modulas oprendi in atm card frauds. Q26.CCTV is an example of which control. Q27.what is Cyber Smearing. Q28.what is operating system vulnerability Q29.what is full form of CISA cyber security information sharing Act. Q30 what is zeus viruses. Q31.what is hashh value and integrity. Q32.w difference between Authirization and Authentication. Q33. What is INFO stealer. Q34.e.what is A beck End Access. Q35.what is meaning of phrase of "Ab initio Unlawfully or Unlegally. Q36.what is security Administration and Quality Assurance. Q37.what is CAPTCHA. Q38.Intentionally misrepresentation of Data is called A Fraud. Q39. What is definition of Control. Q40.What is A John Deo Order. ...
Q41.what is payment walked and digital wallet Q42 what is Anonymous. Q43. What is trapdoor access. AQ44..Total branch automation TMA. Q45. .com and .org are TLD. Q46. TCS fraud in Andhra Pradesh is an example of reasonable security practises and procedures. Q47. The PVCL case in India refers to which Act of IT act Act_69 power to moniter,intercept or Block URL. Q48.one question on CBS and TBA total branch Automations. Q49. Sysadmin sysuser or teller all are examples of Spoofing. Q50.what is A network Analysis. Q51.what is vulnerability Q52.what is DNS sinkholding. Q53.e.Contactless smart card are example of which. Q54 .Lebance Loop card fraud rubber band type material inside Atm Fraud. Q55.what is Contigency pkanning. Q56.what is Nigrean 419 Fraud. Q57.Dumpster Diving. Q58.what is diffrence between Steersman and script kiddle , Q59.Staganography. Q60. What is SSL injections and Cross Site Scripting......
Q61. Preventive detective and compensating contol. Q62. DRONES ARE developed by Drdo. Q63.income tax. Q64.Director of DRDO and it's powers. Q65 .difference between Cert india and nasscom. Q66.TSP/IP. Q67.DDos Attack. Q68. Cyber Smearing and Cyber Defamation. Q69. Cyberwarfare and Cyber terrorism. Q70.BECKDOOR access. Q71.digital signature. Q72.symmetric and Asymmetric encrption. Q73.public and private keys. Q74.command Injections and SQL injections. Q75.details of Masquerding Attack. A76. Trapdoor access and BYOT device. Q77.Sec.43 and Sec 46 of IT act..... Q78.Sec. 69 B deals with...... Q79.Blue Hat hackers are a Part of testing team. Q80.what is crypyolocker and INFO Stealer
Q81.WHAT IS zeus virus Q82.What do you understand by Mean rea or destructive Mindset. Q83.what is DDL DATA definition language Q84.what is pecket filteration firewall Q85.what do you understand by the word ANONMOUS Q85.what is computer vandalism Q86.WHAT IS FRONT END validation control q87.what is DATA Q88.WHAT IS Locard Exchange PRINCIPLE Q89.WHAT is penalty under SECTION 46 AND 47 of IT AMENDMENT ACT Q90.What is xss cross site scripting Q91.what is TCS fraud IN andhrapredseh is EXAMPLE OF q92.WHAT is cybersmearing
Q93.what is STEERSMAN Q94.WHAT do you mean by ALITE HECKER Q95.IDS is palced between internet and firewell Q96.what is PCIDSS Q97.WHAT is Matrix code barcoding Q98.WHAT is software Piarcy Q99.what is DNS SINKHOLDING Q100.WHAT do you understand by traditional criminals
Q101.WHAT is beck end access Q102.IN WHICH year ekyc published and its detail Q103.BYOD DEVICE q Q104.WHAT is trapdoor Q105.what is PURPOSE OF FIREWELL Q106. BATCH processing is an example of oltp online transition precessing Q107.WHAT IS UTM Qq108. Loss of reputation is a serous adverse effect of DDOS ATTACK Q109.THE disciussion paper held on payment and settlement system of RBI held on 2013 was main focus on ENHANCED USE OF ENTERNET BANKING AND E COMMERCE q110.what is B2G business to government E COMMERCE TRANSCTION q111.boss was developed by cdac Q112.WHAT IS STAGANOGRAPHY Q113. WHAT IS ALGORITHM
Q114.WHT IS PKI Q.115 WHAT IS HONEY POT q116. WHAT IS MICROATM q117.DETAILS ABOUT I4C AND CERTIN Q118.SATYAM AND SIFY CASE q119.PUCL CASE IS AN example of sec.69 Q120.WHAT IS VBV THESE ARE RECOLLECTED QUESTION OF PAPER ON 15 SEPTEMBER 2018
Shared by Praveen Kachhwaha
Q1.what is honey pot. Q2. What are steps involved in a Ecommerce transactions. Q3. Difference between durability and consistency. Q4. What is firewell. Q5 .what is wankworm and NASA. Q6. Eucp published in which year. Q7.OLA is not a popular app store. Q8.what is circumstantial evidences. Q9.BOSS (Bharat operating system solution was developed by which organizations -CDAC Q10.what is malicious code writer's. Q11.What is multylayered security Q12. What is data. Q13.blackmailing is an example of cyber extortion. Q14 what is SCADA. Q15.what is cryptolocker Q16.smart card in metrorailway stations are examples Q17.packet filter firewall. Q18.micro ATM. Q19.cross site Scripting. Q20. What is A hectivist...
Q21 . Rupay card is issued in which year. Q22 what is Trojan hourse. Q23. What is malware. Q.24.data backup is an example of which type of control. Q25.what is Lebance loop modulas oprendi in atm card frauds. Q26.CCTV is an example of which control. Q27.what is Cyber Smearing. Q28.what is operating system vulnerability Q29.what is full form of CISA cyber security information sharing Act. Q30 what is zeus viruses. Q31.what is hashh value and integrity. Q32.w difference between Authirization and Authentication. Q33. What is INFO stealer. Q34.e.what is A beck End Access. Q35.what is meaning of phrase of "Ab initio Unlawfully or Unlegally. Q36.what is security Administration and Quality Assurance. Q37.what is CAPTCHA. Q38.Intentionally misrepresentation of Data is called A Fraud. Q39. What is definition of Control. Q40.What is A John Deo Order. ...
Q41.what is payment walked and digital wallet Q42 what is Anonymous. Q43. What is trapdoor access. AQ44..Total branch automation TMA. Q45. .com and .org are TLD. Q46. TCS fraud in Andhra Pradesh is an example of reasonable security practises and procedures. Q47. The PVCL case in India refers to which Act of IT act Act_69 power to moniter,intercept or Block URL. Q48.one question on CBS and TBA total branch Automations. Q49. Sysadmin sysuser or teller all are examples of Spoofing. Q50.what is A network Analysis. Q51.what is vulnerability Q52.what is DNS sinkholding. Q53.e.Contactless smart card are example of which. Q54 .Lebance Loop card fraud rubber band type material inside Atm Fraud. Q55.what is Contigency pkanning. Q56.what is Nigrean 419 Fraud. Q57.Dumpster Diving. Q58.what is diffrence between Steersman and script kiddle , Q59.Staganography. Q60. What is SSL injections and Cross Site Scripting......
Q61. Preventive detective and compensating contol. Q62. DRONES ARE developed by Drdo. Q63.income tax. Q64.Director of DRDO and it's powers. Q65 .difference between Cert india and nasscom. Q66.TSP/IP. Q67.DDos Attack. Q68. Cyber Smearing and Cyber Defamation. Q69. Cyberwarfare and Cyber terrorism. Q70.BECKDOOR access. Q71.digital signature. Q72.symmetric and Asymmetric encrption. Q73.public and private keys. Q74.command Injections and SQL injections. Q75.details of Masquerding Attack. A76. Trapdoor access and BYOT device. Q77.Sec.43 and Sec 46 of IT act..... Q78.Sec. 69 B deals with...... Q79.Blue Hat hackers are a Part of testing team. Q80.what is crypyolocker and INFO Stealer
Q81.WHAT IS zeus virus Q82.What do you understand by Mean rea or destructive Mindset. Q83.what is DDL DATA definition language Q84.what is pecket filteration firewall Q85.what do you understand by the word ANONMOUS Q85.what is computer vandalism Q86.WHAT IS FRONT END validation control q87.what is DATA Q88.WHAT IS Locard Exchange PRINCIPLE Q89.WHAT is penalty under SECTION 46 AND 47 of IT AMENDMENT ACT Q90.What is xss cross site scripting Q91.what is TCS fraud IN andhrapredseh is EXAMPLE OF q92.WHAT is cybersmearing
Q93.what is STEERSMAN Q94.WHAT do you mean by ALITE HECKER Q95.IDS is palced between internet and firewell Q96.what is PCIDSS Q97.WHAT is Matrix code barcoding Q98.WHAT is software Piarcy Q99.what is DNS SINKHOLDING Q100.WHAT do you understand by traditional criminals
Q101.WHAT is beck end access Q102.IN WHICH year ekyc published and its detail Q103.BYOD DEVICE q Q104.WHAT is trapdoor Q105.what is PURPOSE OF FIREWELL Q106. BATCH processing is an example of oltp online transition precessing Q107.WHAT IS UTM Qq108. Loss of reputation is a serous adverse effect of DDOS ATTACK Q109.THE disciussion paper held on payment and settlement system of RBI held on 2013 was main focus on ENHANCED USE OF ENTERNET BANKING AND E COMMERCE q110.what is B2G business to government E COMMERCE TRANSCTION q111.boss was developed by cdac Q112.WHAT IS STAGANOGRAPHY Q113. WHAT IS ALGORITHM
Q114.WHT IS PKI Q.115 WHAT IS HONEY POT q116. WHAT IS MICROATM q117.DETAILS ABOUT I4C AND CERTIN Q118.SATYAM AND SIFY CASE q119.PUCL CASE IS AN example of sec.69 Q120.WHAT IS VBV THESE ARE RECOLLECTED QUESTION OF PAPER ON 15 SEPTEMBER 2018
This comment has been removed by a blog administrator.
ReplyDelete