What are keyloggers and spyware? Explain their role in cybercrime.
[3 marks]Explain how Trojans and backdoors are used by attackers to compromise systems.
[4 marks]Explain what SQL Injection is. Describe How it works, Describe techniques used to prevent SQL Injection attacks.
[7 marks]What is the purpose of web application vulnerability scanning?
[3 marks]What is OpenSSL? Explain its uses in securing communications.
[4 marks]Explain the working principles of the following tools: John the Ripper, L0phtCrack, Pwdump, and HTC‑Hydra.
[7 marks]What is DVWA? Explain its purpose in web security training. Describe any three vulnerabilities featured in DVWA.
[7 marks]Explain the role and importance of SQLMap in Cyber Security.
[3 marks]What are the key characteristics used to filter network traffic in packet filtering firewalls?
[4 marks]What is Network Address Translation (NAT)? Explain its types with suitable diagrams.
[7 marks]What is a Firewall? Explain its types and how it helps in securing a network.
[3 marks]Differentiate between Stateless and Stateful Firewalls.
[4 marks]What is Snort? Explain how Snort works as a Network Intrusion Detection System (NIDS).
[7 marks]Write Features of cyberspace that promote criminal behavior.
[3 marks]Explain various types of cybercrime with suitable examples.
[4 marks]Explain the concept of data contaminants and methods of data destruction in cyberspace. Provide suitable examples. Page 1 of
[2 marks]Discuss the role of the Information Technology Act, 2000 in combating cybercrime in India.
[3 marks]Define contemporary cybercrimes. Explain their impact on society and legal systems.
[4 marks]Discuss in detail the various realms of the cyber world.
[7 marks]Define network sniffer and injection tool with one example each.
[3 marks]What is network reconnaissance? Explain its types and significance in the context of cybersecurity.
[4 marks]Explain SQL injection tools in brief.
[7 marks]What is WinRelay? How does it differ from Fpipe in functionality and usage?
[3 marks]Compare Tcpdump and Windump.
[4 marks]Describe the key components of OpenVAS and their roles. Page 2 of
[2 marks]