0% found this document useful (0 votes)
39 views2 pages

Cyber Security 2 Marks Unitwise All Years

The document provides a series of 2-mark questions and answers related to Cyber Security, covering topics such as cybercrime, information security, cyber law, data privacy, and digital forensics. It explains key concepts like the difference between security and privacy, the nature of cybercrime, and the importance of data protection. Additionally, it outlines various cyber threats and legal frameworks relevant to digital activities.

Uploaded by

23bcs139
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views2 pages

Cyber Security 2 Marks Unitwise All Years

The document provides a series of 2-mark questions and answers related to Cyber Security, covering topics such as cybercrime, information security, cyber law, data privacy, and digital forensics. It explains key concepts like the difference between security and privacy, the nature of cybercrime, and the importance of data protection. Additionally, it outlines various cyber threats and legal frameworks relevant to digital activities.

Uploaded by

23bcs139
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cyber Security - 2 Marks Questions (All Year Papers, Unit-wise)

UNIT 1: Cybercrime & Information Security

1. What is the difference between security and privacy?

-> Security protects data from threats; privacy ensures user control over data.

2. What is meant by information security?

-> It is the protection of information from unauthorized access or alterations.

3. How does cybercrime differ from traditional crime?

-> Cybercrime is technology-driven and borderless, unlike traditional crimes.

4. Define Cyber Crime.

-> Any illegal activity using computers or networks is cybercrime.

5. Why is cyber needed?

-> To protect sensitive data, maintain privacy, and prevent online threats.

6. What is Botnet?

-> A group of infected computers controlled remotely to launch attacks.

7. What is virus and worms?

-> Virus needs a host to replicate; worm spreads independently.

8. What is keylogger and how does it capture keystrokes?

-> It records user keystrokes using malicious software to steal data.

9. What is a keylogger?

-> Malicious software that logs what a user types on their keyboard.

10. Who are cybercriminals (in terms of demographics and skills)?

-> Vary from teenagers to professionals; skilled in coding, hacking, etc.

UNIT 2: Cyber Law & Data Privacy

1. What is the scope of cyber law?

-> It governs digital activities, e-commerce, online crimes, and data protection.

2. What is the importance of data privacy?

-> Protects user rights, builds trust, and prevents data misuse.

3. How are financial institutions adapting to mobile credit card fraud?

-> By using encryption, biometric verification, and fraud detection tools.

4. How do registry settings differ in Android and iOS?

-> Android allows deeper file system access; iOS is more restrictive and sandboxed.

5. What is a patent and its criteria in India?


-> A legal right over inventions; criteria: novelty, inventiveness, and industrial use.

UNIT 3: Attacks & Tools (Phishing, DoS, Malware, Keyloggers)

1. Define phishing and give a common example.

-> Fraud to steal credentials. Example: Fake bank email asking for login info.

2. What is digital evidence?

-> Any electronic data that can be used in court to prove cyber activity.

3. What is Authentication and Authorization?

-> Authentication verifies identity; Authorization grants access rights.

4. What is Identity Theft?

-> Stealing personal info to impersonate someone for fraud.

UNIT 4: Digital Forensics & Investigation

1. What is the 'chain of custody' in forensics?

-> A record of evidence handling from collection to presentation in court.

2. What is digital forensics and how is it different from traditional forensics?

-> Digital forensics deals with electronic data; traditional is physical evidence.

UNIT 5: Cyber Security Policies, IPR, and Legal Frameworks

1. What is the difference between copyright and patent?

-> Copyright protects expression; patent protects inventions.

2. What is a patent and what are its criteria in India?

-> Patent protects inventions; must be novel, non-obvious, and useful.

3. What is Cyber Law?

-> A legal framework to deal with crimes and transactions in cyberspace.

You might also like