Explain following terms : Vulnerability, Nmap, Netcat,Threat
Advantage and disadvantage of OpenVas
Explain benefits of Metasploit
What is 1. Datapipe 2. Fpipe 3.WinRelay 4.Traffic Probe
Describe what is the use of Network Sniffers with suitable example
Explain different function of Wireshark
Describe layers of the OSI model?
Explain Packet Filter and Firewall
What is Firewalls ? Difference between Stateless Vs Stateful Firewalls
Explain in details : Network Address Translation (NAT) with suitable diagram
What is Port Forwarding? Give real time example
What is Tcpdump and Windump
Explain Sqlmap
Explain Brute-Force Attack.How can you prevent it?
Explain MITM attack and how to prevent it?
What are the Application Inspection tools are available . Explain any two in details
What is Cyber Crime? Explain with example.
What are some of the common Cyberattacks?
Describe different types of Cyber Crimes
What is Hacking and Attack vectors.
What is Public and Private IP address
What is Cyberspace?
What is Digital Forensics?
List down and explain Contemporary Crimes
Describe DOS and DDOS attack with suitable example
What is Virus and Warms?
Explain in details : Buffer Overflow
Which types of attack possible on wireless Networks? Explain in details.
What is the difference between IDS and IPS
What is Cross-Site Scripting?
Explain CIA in details
What is the difference between VA(Vulnerability Assessment) and PT(Penetration Testing)?
What is a three-way handshake?
What are the steps to set up a firewall?
No comments:
Post a Comment