1. Write properties and differences between Proxy Servers and Anonymizers. Give some examples of each.
2. What are Keyloggers, malwares and spywares. Differentiate between their properties.
3. What is common between Works and Trojan Horses. Give examples of each.
4. What are Backdoors. How you can obtain it. Explain with examples.
5. What is DoS and DDoS Attack. Write tools which perform these tacks.
6. What is Phishing. Explain difference types of phishing methods.