What is cyber-attacks? Explain active and passive attack?
[7 marks]What is CIA Triad? Explain it in brief.
[7 marks]Discuss importance of Wireshark and its features in detail.
[7 marks]Explain types of Firewall with advantages and disadvantages.
[7 marks]Explain SNORT-IDS. How does snort work?
[7 marks]Describe Malware analysis in brief.
[7 marks]Explain in detail password cracking tool Hashcat.
[7 marks]Explain in detail password cracking tool John The Ripper (JTR)
[7 marks]What is Metasploit? Discuss Various components of Metasploit?
[7 marks]Explain Chain of Custody in Digital Forensics.
[7 marks]What is hashing in cryptography? List out hashing algorithm and Explain any one.
[7 marks]Discuss about Timeline Analysis & Why Does it matter in Digital Investigations?
[7 marks]What is FTK Imager? How to Create a Forensic Image with FTK Imager?
[7 marks]What is browsing forensics? List out the Challenges in browser forensics.
[7 marks]What is cyber security report? How to create it?
[7 marks]What is Email Forensics? How to conduct email forensics investigation?
[7 marks]Explain DNS Spoofing or DNS Cache poisoning. Page 1 of 1
[7 marks]