Explain Vulnerability Probe.
[3 marks]What is meant by a vulnerability? List and explain the major types of vulnerabilities in computer systems.
[4 marks]Explain OpenVAS in Details.
[7 marks]How SQLMap is used in Cybersecurity.
[3 marks]Explain Zed Attack Proxy in Details.
[4 marks]Describe Password Cracking tools in Details.
[7 marks]Explain Application Inspection tools in Details.
Write Difference Between Stateless Vs Stateful Firewalls.
[3 marks]What is a packet filtering firewall? Describe its features and how it functions in detail.
[4 marks]What is Network Address Translation (NAT)? What is Port Forwarding? Explain with examples.
[7 marks]What is port forwarding? Describe its working mechanism and applications with examples.
[3 marks]What is a firewall and its types?.
[4 marks]Describe Snort as an Intrusion Detection System. Explain how it detects and analyzes network traffic for security threats.
[7 marks]What is meant by contemporary crime in the field of cybersecurity? Explain with examples.
[3 marks]What are the different realms of the cyber world?
[4 marks]Explain the different types of contaminants that affect data and the techniques used for its destruction.
[7 marks]List and explain three typical attack vectors used in cybersecurity.
[3 marks]What are the main traditional problems associated with computer crime? Provide an explanation for each.
[4 marks]What is cybercrime? Describe the various types of cybercrime.
[7 marks]What is an SQL Injection attack? Explain how it works.
[3 marks]What is the difference between a virus and a worm?
[4 marks]Explain in detail the concepts of DoS and DDoS attacks.
[7 marks]What is steganography and Explain types of steganography.
[3 marks]What are attacks on wireless networks? Describe the different types of attacks that can target wireless networks.
[4 marks]Describe what a Trojan and a backdoor are, and give the differences between them.
[7 marks]