Session 1 (2022-2023)

Question-to-Syllabus Mapping

Group-A (Very Short Answer Type Question)

  • (i) “Cyberspace” was coined by ________.
    • Syllabus Topic: 1. Introduction Cyberspace
  • (ii) Which is the oldest techniques used by hackers for phone hacking to make free calls?
    • Syllabus Topic: 2. Hackers and Cyber Crimes Types of Hackers / Cyber-Attacks and Vulnerabilities
  • (iii) An attempt to steal, spy, damage or destroy computer systems, networks, or their associated information is known as ________.
    • Syllabus Topic: 1. Introduction Cyber threats
  • (iv) The Code Red is a sort of a ________.
    • Syllabus Topic: 2. Hackers and Cyber Crimes Worms, Trojans, Viruses, Backdoors
  • (v) Give an example of physical hacking.
    • Syllabus Topic: 2. Hackers and Cyber Crimes Cyber-Attacks and Vulnerabilities
  • (vi) What is the existence of weakness in a system or network is known as?
    • Syllabus Topic: 2. Hackers and Cyber Crimes Cyber-Attacks and Vulnerabilities
  • (vii) Which independent type of malicious program does not require any host program?
    • Syllabus Topic: 2. Hackers and Cyber Crimes Worms, Trojans, Viruses, Backdoors
  • (viii) What are Trojan-Horse programs?
    • Syllabus Topic: 2. Hackers and Cyber Crimes Worms, Trojans, Viruses, Backdoors
  • (ix) When there is an excessive amount of data flow, which the system cannot handle, ________ attack takes place.
    • Syllabus Topic: 2. Hackers and Cyber Crimes Cyber-Attacks and Vulnerabilities
  • (x) A ________ can be a hardware device or a software program that filters all the packets of data that comes through a network, the internet, etc.
    • Syllabus Topic: 3. Ethical Hacking and Social Engineering Enterprise Information Security Architecture
  • (xi) The Hacker who did break the SIPRNET system is ________.
    • Syllabus Topic: 2. Hackers and Cyber Crimes Types of Hackers
  • (xii) A cyber-criminal or penetration tester uses the additional data that stores certain special instructions in the memory for activities to break the system. Name the type of attack.
    • Syllabus Topic: 2. Hackers and Cyber Crimes Cyber-Attacks and Vulnerabilities (Specifically Buffer Overflow)

Group-B (Short Answer Type Question)

  • 2. Discuss Security Architecture.
    • Syllabus Topic: 3. Ethical Hacking and Social Engineering Enterprise Information Security Architecture
  • 3. Mention the difference between symmetric and asymmetric encryption.
    • Syllabus Topic: This is a foundational concept in cryptography, which underlies many security topics but is not explicitly listed as a standalone topic. It best fits within the context of protocols discussed in other units.
  • 4. Write the steps to analyze the E-Mail Application’s security vulnerabilities.
    • Syllabus Topic: 3. Ethical Hacking and Social Engineering Vulnerability Assessment and Penetration Testing
  • 5. What is a response code? List them.
    • Syllabus Topic: This is a core web technology concept, relevant to network security and hacking but not directly named in the syllabus. It relates to understanding network communication for vulnerability assessment.
  • 6. Discuss matrix mining.
    • Syllabus Topic: This topic does not appear to directly map to the provided Cyber Security syllabus. It may be an out-of-syllabus question or related to a very specific sub-field not listed.

Group-C (Long Answer Type Question)

  • 7. With a diagram, explain handshake protocol action. Explain SSL protocol stack.
    • Syllabus Topic: This relates to secure communications protocols. While SSL isn’t explicitly named, it’s a fundamental part of network security, fitting broadly under topics that require secure data transmission.
  • 8. Discuss security policy database. With a neat diagram, explain ip traffic processing.
    • Syllabus Topic: 5. Cyber Ethics and Laws at Network Layer-IPSec
  • 9. Explain the different Threats to Information System? What do you mean by Information Assurance?
    • Syllabus Topic: 1. Introduction Cyber threats AND 3. Ethical Hacking and Social Engineering Information Assurance
  • 10. What do you mean by packet filtering in Firewall? Explain Firewall and working of Firewall? Explain the need to take Backup?
    • Syllabus Topic: 3. Ethical Hacking and Social Engineering Enterprise Information Security Architecture
  • 11. Elaborate: “Cyber crime play a vital role against person, property and govt. to protect all valuable information and rights”.
    • Syllabus Topic: 5. Cyber Ethics and Laws Introduction to Cyber Laws / Offences under IT Act

Session 1 Analysis

  • Question Distribution by Module:
    • Unit 1 (Introduction): 3 questions (1A-i, 1A-iii, part of 9)
    • Unit 2 (Hackers and Cyber Crimes): 8 questions (1A-ii, 1A-iv, 1A-v, 1A-vi, 1A-vii, 1A-viii, 1A-ix, 1A-xi, 1A-xii)
    • Unit 3 (Ethical Hacking): 4 questions (1A-x, 2, 4, part of 9, 10)
    • Unit 4 (Cyber Forensics): 0 questions
    • Unit 5 (Cyber Ethics and Laws): 2 questions (8, 11)
    • Note: Some questions covered concepts not explicitly in the syllabus (Encryption, SSL, Response Codes).
  • Key Observations:
    • Most Important Module: Unit 2: Hackers and Cyber Crimes was heavily dominant, especially in the very short answer section. A thorough understanding of malware types (worms, trojans), attack vectors, and vulnerabilities was critical.
    • Second Most Important Module: Unit 3: Ethical Hacking and Social Engineering was the focus of the short and long answer questions, with emphasis on security architecture, firewalls, and vulnerability assessment.
    • Neglected Module: Unit 4: Cyber Forensics and Auditing was completely ignored in this paper.
    • Application & Foundational Knowledge: The paper included questions on foundational topics like SSL and encryption, which are essential for understanding security architecture, even if not listed as primary syllabus points.

Session 2 (2024-2025)

Question-to-Syllabus Mapping

Group-A (Very Short Answer Type Question)

  • (i) Which method of hacking will record all your keystrokes?
    • Syllabus Topic: 2. Hackers and Cyber Crimes Malware threats (Keyloggers)
  • (ii) Which malware does not clone or replicate itself through infection?
    • Syllabus Topic: 2. Hackers and Cyber Crimes Worms, Trojans, Viruses, Backdoors
  • (iii) Which of the following actions compromise cyber security? a) Vulnerability b) Attack c) Threat d) Exploit
    • Syllabus Topic: 1. Introduction Cyber threats
  • (iv) Write the utility of Passwords.
    • Syllabus Topic: This is a fundamental security concept related to 2. Hackers and Cyber Crimes Gaining Access.
  • (v) “Cyberspace” was coined by ______.
    • Syllabus Topic: 1. Introduction Cyberspace
  • (vi) Which of these is NOT a scanning type? a. Null Scan b. Xmas Tree Scan c. SYN Stealth d. Cloud Scan
    • Syllabus Topic: 3. Ethical Hacking and Social Engineering Vulnerability Assessment and Penetration Testing
  • (vii) Which type of attack is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information?
    • Syllabus Topic: 3. Ethical Hacking and Social Engineering Types of Social Engineering (Phishing)
  • (viii) Which port number is usually referred to as the port number (default) of several web servers like apache?
    • Syllabus Topic: This is a fundamental networking concept essential for 2. Hackers and Cyber Crimes Cyber-Attacks and Vulnerabilities.
  • (ix) Name a hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic.
    • Syllabus Topic: 3. Ethical Hacking and Social Engineering Types of Social Engineering (Phishing/Pharming)
  • (x) Which of the following is not a step followed by cyber-criminals in data breaching? a) Exfiltration b) Research and info-gathering c) Attack the system d) Fixing the bugs
    • Syllabus Topic: 2. Hackers and Cyber Crimes Broadly covers the hacking process (Gaining Access, etc.)
  • (xi) Name the world’s very first antivirus program.
    • Syllabus Topic: 2. Hackers and Cyber Crimes Malware threats
  • (xii) IT security in any firm or organization is maintained and handled by ______.
    • Syllabus Topic: 1. Introduction Cybersecurity - Organizational Implications

Group-B (Short Answer Type Question)

  • 2. Explain data leakage.
    • Syllabus Topic: 1. Introduction Cyber threats
  • 3. (i)Define Hacker. List Out the Types of hackers (ii)What is a Backdoor?
    • Syllabus Topic: 2. Hackers and Cyber Crimes Types of Hackers AND Worms, Trojans, Viruses, Backdoors
  • 4. What is the difference between vulnerability assessment (VA) and penetration testing (PT)?
    • Syllabus Topic: 3. Ethical Hacking and Social Engineering Vulnerability Assessment and Penetration Testing
  • 5. Describe briefly the CIA Triad and how to achieve it.
    • Syllabus Topic: 1. Introduction CIA Triad
  • 6. Explain the difference between hashing and encryption.
    • Syllabus Topic: Foundational cryptographic concept, essential context for the entire syllabus.

Group-C (Long Answer Type Question)

  • 7. (i)Explain briefly about the Forensics Investigation Process. (ii)Discuss the challenges in computer forensics.
    • Syllabus Topic: 4. Cyber Forensics and Auditing Forensics Investigation Process
  • 8. What do you mean by Information System? What is the need of Information System? What are the types of Information System?
    • Syllabus Topic: This question is very general. It best relates to the context of 3. Ethical Hacking and Social Engineering Enterprise Information Security Architecture.
  • 9. Write a short note on a) Patent Law b) Copy write Law c) IPR
    • Syllabus Topic: 5. Cyber Ethics and Laws Intellectual Property Rights in Cyberspace
  • 10. (i)Discuss cybercrime and the Indian ITA 2000. (ii) Explain in detail about architecture of IP Security
    • Syllabus Topic: 5. Cyber Ethics and Laws Offences under IT Act AND at Network Layer-IPSec
  • 11. With a neat diagrams, Explain PGP Cryptographic Functions or PGP Functions (Authentication, Confidentiality, Confidentiality and Authentication)
    • Syllabus Topic: This is a specific application of cryptography (like SSL in the previous paper). It is not explicitly named but falls under the general umbrella of securing communications.

Session 2 Analysis

  • Question Distribution by Module:
    • Unit 1 (Introduction): 5 questions (1A-iii, 1A-v, 1A-xii, 2, 5)
    • Unit 2 (Hackers and Cyber Crimes): 6 questions (1A-i, 1A-ii, 1A-iv, 1A-viii, 1A-x, 1A-xi, 3)
    • Unit 3 (Ethical Hacking): 4 questions (1A-vi, 1A-vii, 1A-ix, 4, 8)
    • Unit 4 (Cyber Forensics): 1 question (7)
    • Unit 5 (Cyber Ethics and Laws): 3 questions (9, 10)
    • Note: PGP and Hashing/Encryption are foundational topics not explicitly listed.
  • Key Observations:
    • Balanced Distribution: This paper shows a much more balanced distribution across all syllabus modules compared to the 2022-2023 paper.
    • All Modules Covered: Crucially, every single module from the syllabus was represented, including Unit 4: Cyber Forensics and Auditing, which was missing previously.
    • Conceptual Focus: There was a strong emphasis on core concepts like the CIA Triad (Unit 1), Types of Hackers (Unit 2), VA vs PT (Unit 3), Forensics Process (Unit 4), and IPR/IT Act (Unit 5).
    • Increased Legal Focus: Unit 5 had significant weight in the long answer section, covering both IPR and the IT Act/IPSec.

Session 3 (2023-2024)

Question-to-Syllabus Mapping

Group-A (Very Short Answer Type Question)

  • (i) What is the existence of weakness in a system or network is known as?
    • Syllabus Topic: 2. Hackers and Cyber Crimes Cyber-Attacks and Vulnerabilities
  • (ii) Which DDoS in mobile systems wait for the owner to trigger the cyber attack?
    • Syllabus Topic: 2. Hackers and Cyber Crimes Cyber-Attacks and Vulnerabilities
  • (iii) Why are the factors like Confidentiality, Integrity, Availability, and Authenticity considered as the fundamentals?
    • Syllabus Topic: 1. Introduction CIA Triad
  • (iv) What refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
    • Syllabus Topic: 5. Cyber Ethics and Laws Introduction to Cyber Laws
  • (v) What type of text is transformed with the help of a cipher algorithm?
    • Syllabus Topic: Foundational cryptographic concept.
  • (vi) “Cyberspace” was coined by ________.
    • Syllabus Topic: 1. Introduction Cyberspace
  • (vii) Network failure is primarily a ________ issue.
    • Syllabus Topic: 1. Introduction CIA Triad (Availability)
  • (viii) ________ means the security of data from tampering by unidentified users.
    • Syllabus Topic: 1. Introduction CIA Triad (Integrity)
  • (ix) Which is a sort of independent type of malicious program that would not require any host program?
    • Syllabus Topic: 2. Hackers and Cyber Crimes Worms, Trojans, Viruses, Backdoors
  • (x) An act to injure, corrupt, or threaten a system or network is characterized ________.
    • Syllabus Topic: 1. Introduction Cyber threats
  • (xi) What is security misconfiguration?
    • Syllabus Topic: 2. Hackers and Cyber Crimes Cyber-Attacks and Vulnerabilities
  • (xii) Differentiate Worm and Virus.
    • Syllabus Topic: 2. Hackers and Cyber Crimes Worms, Trojans, Viruses, Backdoors

Group-B (Short Answer Type Question)

  • 2. Describe Security risk and analysis.
    • Syllabus Topic: 3. Ethical Hacking and Social Engineering Threat Modelling
  • 3. Explain Data backup security, Data archival security, and Data disposal considerations.
    • Syllabus Topic: 1. Introduction Cybersecurity - Organizational Implications
  • 4. What is the use of policy?
    • Syllabus Topic: 1. Introduction Cybersecurity - Organizational Implications
  • 5. Define session hijacking and its various challenges.
    • Syllabus Topic: 2. Hackers and Cyber Crimes Gaining Access
  • 6. Explain the Feistel cipher in detail.
    • Syllabus Topic: A specific cryptographic algorithm, falls under the general need for understanding encryption.

Group-C (Long Answer Type Question)

  • 7. (a) Write short notes on: Firewall. (b) Backdoor. (c) Trapdoor.
    • Syllabus Topic: 3. Ethical Hacking Enterprise Information Security Architecture AND 2. Hackers and Cyber Crimes Worms, Trojans, Viruses, Backdoors
  • 8. (a) Discuss the SQL Injection in detail. (b) What is buffer overflow? (c) Discuss how to minimize Buffer Overflow.
    • Syllabus Topic: 2. Hackers and Cyber Crimes Cyber-Attacks and Vulnerabilities
  • 9. (a) How VoIP hacking is done by attackers? (b) What are the measures for it? (c) Identify wireless network defense.
    • Syllabus Topic: 2. Hackers and Cyber Crimes Cyber-Attacks and Vulnerabilities
  • 10. (a) Name & explain the two protocols to use for E-mail Security. (b) Explain Cryptanalysis process.
    • Syllabus Topic: Foundational cryptographic and protocol knowledge (e.g., PGP, S/MIME).
  • 11. (a) Elaborate “Cyber-crime plays a vital role against person, property, and govt. to protect all valuable information and rights”. (b) Encrypt a plain text using transposition cipher key. (c) What is transposition cipher?
    • Syllabus Topic: 5. Cyber Ethics and Laws Introduction to Cyber Laws / Offences under IT Act. Part (b) and (c) are foundational cryptography.

Session 3 Analysis

  • Question Distribution by Module:
    • Unit 1 (Introduction): 6 questions (1A-iii, 1A-vi, 1A-vii, 1A-viii, 1A-x, 3, 4)
    • Unit 2 (Hackers and Cyber Crimes): 8 questions (1A-i, 1A-ii, 1A-ix, 1A-xi, 1A-xii, 5, part of 7, 8, 9)
    • Unit 3 (Ethical Hacking): 2 questions (2, part of 7)
    • Unit 4 (Cyber Forensics): 0 questions
    • Unit 5 (Cyber Ethics and Laws): 2 questions (1A-iv, part of 11)
    • Note: Multiple questions focused on cryptography (Feistel, Transposition, Cryptanalysis).
  • Key Observations:
    • Return to Heavy Focus on Unit 2: Similar to the 2022-23 paper, this one is heavily weighted towards Unit 2: Hackers and Cyber Crimes. The long answer questions almost exclusively focus on specific, technical attacks like SQL Injection, Buffer Overflow, and VoIP hacking.
    • Strong Emphasis on Unit 1: The introductory concepts, especially the CIA Triad and organizational policies, were very prominent in the short answer sections.
    • Forensics is Missing Again: Like the 2022-23 paper, Unit 4: Cyber Forensics and Auditing is completely absent.
    • Deep Dive into Cryptography: This paper required knowledge of specific ciphers (Feistel, Transposition), indicating a need for a deeper understanding of cryptographic principles than just the difference between symmetric and asymmetric.

**Overall Analysis **

Tier 1: Must-Know Topics (Highest Priority)

These topics form the absolute core of every question paper and carry the most marks. You cannot afford to skip them.

  • Unit 2: Hackers and Cyber Crimes: This is, without a doubt, the most important module.
    • Malware Definitions: Be crystal clear on the difference between Worms, Trojans, Viruses, and Backdoors. This is the most repeated question in the entire analysis.
    • Specific Attack Methodologies: Prepare long-answer questions on SQL Injection and Buffer Overflow. Understand what they are, how they are executed, and how to prevent them.
    • General Attack Concepts: Know the definitions of Vulnerability, Threat, Attack, and Exploit. Understand attack types like DDoS, Phishing, and Session Hijacking.
  • Foundational Cryptography & Protocols (Cross-Unit Topic): Though not a separate unit, cryptography questions are guaranteed to appear.
    • Core Differences: Master the difference between Symmetric vs. Asymmetric Encryption and Hashing vs. Encryption.
    • Security Protocols: Be prepared to explain SSL Handshake and IPSec architecture with diagrams. PGP functions are also important.
    • Basic Ciphers: Understand simple ciphers like the Transposition Cipher.

Tier 2: High Priority Topics

These topics appear consistently, especially in short and long answer questions, and are essential for a high score.

  • Unit 1: Introduction: This unit is a source of easy marks in the short answer section.
    • CIA Triad: Know Confidentiality, Integrity, and Availability by heart. Be able to explain it and its importance.
    • Key Terms: The term “Cyberspace” and its originator is a favorite one-mark question.
  • Unit 3: Ethical Hacking and Social Engineering: Focus on defensive and assessment measures.
    • Firewalls: Be prepared to explain what a firewall is, how it works, and concepts like packet filtering.
    • VA vs. PT: Understand the key differences between Vulnerability Assessment and Penetration Testing.
    • Security Architecture: Have a general understanding of what constitutes an enterprise security architecture.

Tier 3: Important for Scoring Well

These topics are slightly less frequent but are crucial for attempting all required questions in Groups B and C.

  • Unit 5: Cyber Ethics and Laws: This unit is your key to one or two long-answer questions.
    • Indian IT Act 2000: Understand its purpose and the penalties for cyber offenses.
    • Intellectual Property Rights (IPR): Know the basics of Patent Law and Copyright Law in the context of cyberspace.
  • Unit 4: Cyber Forensics and Auditing (The Wildcard): This unit’s importance fluctuates wildly. It was completely absent in two papers but was a major 15-mark question in another.
    • Strategy: Do not skip this unit. At a minimum, prepare the Forensics Investigation Process thoroughly, as this is the most likely question to be asked from this module.

Final Actionable Advice:

  1. Prioritize Unit 2: Spend most of your time mastering the different types of malware and specific attacks.
  2. Practice Diagrams: For topics like SSL, IPSec, and PGP, diagrams are essential and often explicitly requested.
  3. Don’t Ignore Definitions: Group A is worth 10 marks. Quickly memorizing the key terms from all units can give you a strong start.
  4. Cover All Bases: While you should prioritize, notice that the 2024-2025 paper was very balanced. The safest strategy is to have a working knowledge of every unit, with a deeper focus on the Tier 1 and Tier 2 topics listed above.

Augmented Syllabus

Unit 1: Introduction to Cyber Security

  • Introduction to Cyber Security:
    • Importance and challenges
  • Cyberspace:
    • Definition and historical context (e.g., who coined the term)
  • Core Concepts:
    • CIA Triad (Confidentiality, Integrity, Availability) and how to achieve it
    • Fundamentals like Authenticity
    • Security Architecture
  • Cyber Threats & Warfare:
    • Cyber threats, Cyberwarfare, Cyber Terrorism
    • Weaknesses, vulnerabilities, threats, and exploits
  • Organizational & Critical Infrastructure Security:
    • Cyber Security of Critical Infrastructure
    • Cybersecurity - Organizational Implications
    • Security Policy: Use and importance

Unit 2: Hackers and Cyber Crimes

  • Actors in Cybersecurity:
    • Types of Hackers, Hackers vs. Crackers
  • Malware & System Threats:
    • Malware Threats: Worms, Trojans, Viruses, Backdoors (including differentiation)
    • Keystroke Logging
  • Common Cyber-Attacks and Vulnerabilities:
    • Denial-of-Service (DDoS): Specifically in mobile systems
    • SQL Injection
    • Buffer Overflow: and how to minimize it
    • Session Hijacking: and its challenges
    • VoIP Hacking
    • Sniffing
  • The Anatomy of a Hack:
    • Gaining Access and Escalating Privileges
    • Executing Applications, Hiding Files, and Covering Tracks

Unit 3: Ethical Hacking and Network Defense

  • Ethical Hacking & Information Assurance:
    • Ethical Hacking Concepts and Scopes
    • Threats and Attack Vectors, Threat Modelling
    • Information Assurance
    • Enterprise Information Security Architecture
  • Security Assessment:
    • Vulnerability Assessment (VA) vs. Penetration Testing (PT)
  • Network Security & Defense:
    • Firewalls: Packet filtering, working principles, and the need for backups
    • Passwords: Utility and importance
    • Wireless Network Defense
    • Symmetric vs. Asymmetric Encryption
    • Hashing vs. Encryption
  • Social Engineering:
    • Types of Social Engineering (e.g., Phishing)
    • Insider Attack and Prevention Strategies
    • Targets and Defence Strategies

Unit 4: Cyber Forensics and Auditing

  • Introduction to Cyber Forensics:
    • Role of a forensics Investigator
    • Computer Equipment and associated storage media
  • The Forensics Process:
    • Forensics Investigation Process
    • Collecting Network-based Evidence
    • Writing Computer Forensics Reports
    • Challenges in computer forensics
  • Data Management & Security:
    • Data Leakage
    • Data backup security, Data archival security, and Data disposal
  • Auditing & Compliance:
    • Auditing against a set of criteria
    • Information Security Management System (ISMS)
    • Introduction to ISO 27001:2013

Unit 5: Cyber Ethics, Laws, and Protocols

  • Cyber Laws and Governance:
    • Introduction to Cyber Laws
    • Indian IT Act 2000: Cybercrime, offenses, and penalties
    • E-Commerce and E-Governance
    • Certifying Authority and Controller
  • Intellectual Property Rights (IPR):
    • IPR in Cyberspace
    • Patent Law and Copyright Law
  • Network Layer Security & Protocols:
    • IPSec: Architecture and detailed protocols
    • SSL Protocol Stack and handshake protocol
    • PGP (Pretty Good Privacy): Cryptographic functions for authentication, confidentiality, and authentication
    • E-Mail Security Protocols

Topics Asked in PYQs But Not Explicitly in Your Syllabus

Here is a list of topics that appeared in the question papers but were not directly mentioned in the syllabus you provided. You should consider adding these to your study plan.

  • Specific Protocols and Architectures:
    • SSL Protocol Stack: A detailed understanding was expected.
    • PGP (Pretty Good Privacy): Questions required knowledge of its specific cryptographic functions.
    • Feistel Cipher: This classical cryptographic structure was a specific question.
    • E-mail Security Protocols: The exam asked to name and explain two protocols.
  • Data and Information Systems:
    • Data Leakage: Definition and explanation.
    • Information System: Questions on its definition, need, and types were asked.
    • Matrix Mining: This appeared as a short-note question.
  • Legal and Historical Context:
    • Indian IT Act 2000: This specific law was a focus area.
    • Patent Law & Copyright Law: These forms of IPR were explicitly mentioned.
    • Historical Facts: Questions like “who coined the term ‘cyberspace’,” “the world’s first antivirus program,” and who broke the “SIPRNET system” were asked.
  • Attack and Defense Specifics:
    • SQL Injection & Buffer Overflow: These were major topics in the long answer section.
    • Session Hijacking: Required a detailed explanation.
    • Response Codes: A question asked to list them, which likely refers to HTTP status codes or similar network responses.
    • Scanning Types: Specific types like Null Scan, Xmas Tree Scan, and SYN Stealth were mentioned.