1. Email spoofing
2. Spamming
3. Hacking
3. Vulnerability of computer
4. Password Sniffing
5. Cyber Stalking
6. Types of Stalker
7. Bonnet
8. Active Attack
19. Passive Attack
10. Phishing
11. DOS attack
12.DDos Attack
LONG Notes
1. What is SQL injection? Explain the methods of preventing SQL injection attack.
2. What is steganography ?explain its types in details
3. What is phishing and how it is done? Explain its various types
4. Explain IT ACT 2000 with its section
5. What is meant by Trojen Horse??
6. Explain the Digital Signature and public key certificate
7. What is Proxy Server ? What are the purposes of proxy server?
8. What is the difference between virus and worms?
9. Explain various types of viruses?
10. What is Antilogger? Write its advantages.
No comments:
Post a Comment
Like Dislike Helpful