Qs are from almost all chapters for module A some are
Like
Which of the options are correct for fraud triangle
Cyber word origin from
APT (Advanced persistent threat)
Spammers
Script kiddies
Phishing vishing
Cyber stalking
Threat vector
Threat landscape
John doe order
Dos ddos attack
Fast flux
Ip spoofing
Cyber squatting
Term key logger other similar term is form grabber
Cryptography encryption decryption
ICANN (PAGE 27 GOOD READ)
INDRP
cyber extortion ransomware
Zeus trojan
One qs like which is not malware
SCADA full form
Three stakeholder of Information
Pillars of Information security(read in detail)
Non repudiation
Authorisation and authentication
2FA -ATM Transaction
Difference between digital and electronic signature
Tailgating
Masquerading
UTM
BOTS botnet zombies
Man in middle attack
Trojan
Adware
Types of malwareModule B
cyber crime and fraud difference relationship
Types of controls
2D bar coding
RFID
Software security controls
Case study qs based on front end validation
Database schema based qs
DDL DML
Intrusion prevention
Detection control
Mens rea
White collar offense
Page91 stages
93 all frauds are incidents but all incidents need not be frauds
Reporting Investigation
NTP
PAGE 96 ITIL important phases in detail
Digital evidence vs physical evidence
Evidence collection
Locard exchange principle
SIM IMSI
CDAC
Object of cyber evidence
Cyber forensic
Wearable technology
Chain of custody
DigitalForensic lab in Hyderabad
Spyware
UAV
PAGE 53 most used passwords
Firewall
Types of hackers read in detail
Backend access
Hacker tools
Ethical attack Ethical hacking
Anonymous
69 page q9
Suggest to read each chapter qs and answer also
Module C
OLTP
PAGE111 Which of following not online transaction technology they will give some different term
BPSS
PSS act
Page113 115 116117
119 I agree
UCP Letter of credit
TLD
Payment wallet
IP spoofing
Payment system page 128
PSDG
BUDAPEST CONVENTION
sinkholing
Federal reserve
SWIFT
Module D
Page 157
ISMS
CERT
Page 162 Anwar vs pk basheer
Skimmer
NCRB
IT related legislation in india page164
Page 166 authentication of records
NTRO comes under PMO
Qs on page 167 need to read
Page171
Vodafone case and page 173
Advance fee
3D
ecommerce
Tax haven
HUMAN TRAIT (Sigmun Freud)is result of childhood
Computer Addiction
Page185 186
information silo
Stylometry
Qs on page 191
196 Deity
RBI BFS
Page 198 G GopalaKrishna qs can be like which are it cover from multiple options most probably a choice given so Answer should be all
NABARD
IDRBT INFINET
NET NEUTRALITY
204 205
Chief compliance officer
Different National level institutions
NTRO
NIA
DSCI
CERT
Page 216 cert instructions on blocking of urls
CBI
IB is world oldest
directorate of enforcement includes fema and PMLA
US initiative is CISA
CDAC own operating system BOSS
prepaid card limit 50000
Page 139 140 141
carders
Cloning and Skimming
NFC
PCI- DSS
Rupay card
Investigation scene of crime
G gopalakrishna
EMV(EURO PAY MASTER VISA)
Thank u so much sir
ReplyDelete