0% found this document useful (0 votes)
48 views

ICS Question Bank

Question bank for cyber security subject

Uploaded by

Prakash V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

ICS Question Bank

Question bank for cyber security subject

Uploaded by

Prakash V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

DEPARTMENT OF CYBER SECURITY

QUESTION BANK
Course Title : Introduction to Cyber Security
Course Code :
Regulation : R20

Course Objectives
1. To understand various types of cyber-attacks and cyber-crimes
2. To learn threats and risks within context of the cyber security
3. To have an overview of the cyber laws & concepts of cyber forensics
4. To study the defensive techniques against these attacks
Course Outcomes (CO’s)
1. Analyze and evaluate the cyber security needs of an organization.
2. Understand Cyber Security Regulations and Roles of International Law.
3. Design and develop a security architecture for an organization.
4. Understand fundamental concepts of data privacy attacks

UNIT–I

S.No Questions BT CO P
O
Part – A (Short Answer Questions)
1 What is Cyber Security? L2 1
2 L2 1
What is Cyber Crime?
3 L4 1
Explain various Software Attacks.
4 L1 1
Explain Hardware Attacks.
5 Explain the Passive Attacks. L1 1
6 L2 1
Explain the Active Attacks.
7 List some harmful acts in Cyber Security. L1 1
8 L1 1
List some advanced Cyber Crimes in India.
9 Discuss about the Cyber terrorism. L4 1
10 L1 1
What is Cyber Warfare? Explain.
Part – B (Long Answer Questions)
11 a) What is Cyber Security? Explain in detail. L1 1
b) L1 1
Explain the layers of Security.
12 a) What are Cyber Attack and Cyber Threats. L2
b) Explain different types of attacks in detail. L1 1
13 L2 1
Explain the following: a. Distributed Denial of Service
(DDOS).
b) L4 1
SQL injection.
14 a) Explain in detail about CIA Triad with neat diagram. L1 1
b) Explain the comprehensive Cyber Security policy. L1 1
15 a) L4 1
Discuss in detail about the Cyber Criminals.
b) L1 1
What is attack? Explain Cyber Warfare.
UNIT–II

S.No Questions BT CO P
O
Part – A (Short Answer Questions)
1 What is Indian cyberspace? L1 2
2 Explain the role of international laws. L2 2
3 What is cyber forensics? L1 2
4 What is the need for computer forensics? L2 2
5 List various email forensics tools. L4 2
6 What are the challenges in computer forensics L1 2
7 List the types of forensics investigations. L4 2
8 Explain Analysis in digital forensics lifecycle L1 2
9 Explain the technical challenges in Cyber Security. L1 2
10 L4 2
List various Legal challenges in Cyber security.

Part – B (Long Answer Questions)


11 a) What is regulation? Explain some predominant laws. L1 2
b) Explain Indian penal code (IPC) 1980 and NIST compliance. L2 2
12 a) Explain the Indian cyberspace. L1 2

b) L1 2
Explain the National cyber security policies.

13 a) L4 2
Discuss about the Digital forensics.

b) L1 2
What is forensics? Explain Computer forensics.

14 a) L1 2
Explain the forensics analysis of email in detail.
b) list and explain the email forensics tools. L2 2
15 a) Explain the digital forensics life cycle with neat diagram. L1 2
b) L4 2
Discuss in detail about the challenges in computer forensics.

UNIT–III
S.No Questions BT CO P
O
Part – A (Short Answer Questions)
1 Explain threats of mobile device. L2 3
2 What are the challenges faced by mobile device? L1 3
3 L4 3
How to detect the credit card attack?
4 Explain war driving in Cyber Security. L2 3
5 What are registry settings for mobile device? L1 3
6 What is mobile attack? L1 3
7 L1 3
What is authentication process? Explain.
8 What is bluejacking attack? L4 3
9 What are the organization security policies. L1 3
10 Explain RF jamming. L2 3
Part – B (Long Answer Questions)
11 a) L2 3
Explain the trends in Mobility.
b) L2 3
Explain Credit card frauds in mobile and wireless computing
with neat diagram.
12 a) what are the security challenges posed by Mobile devices? L1 3
b) L2 3
Explain the Proliferation (growth) of mobile and wireless
devices
13 a) What is mobile device? Explain the challenges of mobile or L3 3
wireless device.
b) Explain the registry settings for mobile devices. L1 3
14 a) L2 3
What is mobile attack? Explain different types of mobile
attacks.
b) L2 3
Explain various organization security policies.
15 a) L4 3
Explain authentication services in cyber security.
b) Explain difference between WPA and WPA2. L2 3
UNIT–IV
S.No Questions BT CO P
O
Part – A (Short Answer Questions)
1 What are the Organizational Implications? L2 4
2 Explain about copyright act in India. L1 4
3 What is Social media marketing? L2 4
4 List some web threats for organizations. L4 4
5 What is Trademark? Give some examples. L2 4
6 What Social Computing? L2 4
7 List some Security risks in Cyber Security. L4 4
8 Explain copyright issue with example. L1 4
9 What are the associated challenges for organizations? L2 4
10 What is IPR? Explain. L1 4
Part – B (Long Answer Questions)
11 a) Explain some Organizational Implications 4 L1
b) What is cost of cybercrimes? Explain IPR issues. 4 L2
12 a) Explain web threats for organizations in detail. 4 L1
b) Discuss about the security and privacy implications. 4 L4
13 a) Explain social media marketing with example. 4 L1
b) What is security risks? Explain in details. 4 L2
14 a) Explain about perils for organizations in Cyber Security. 4 L1
b) What is social computing? Explain the associated challenges for 4 L2
organizations.
15 a) What is Trademark? Explain in details. 4 L2
b) What is copyright? Explain with example. 4 L2

UNIT–V

S.No Questions BT CO P
O
Part – A (Short Answer Questions)
1 What is Cybercrime? L1 2
2 Explain different domains in privacy. L2 3
3 Explain three major internet issues. L2 2
4 What is Data privacy? L1 2
5 Explain Data Privacy Attacks. L1 1
6 What are the Mini-Cases in Cybercrime? L4 4
7 What are the 3 principles of data privacy? L1 3
8 What is Email spoofing? L2 2
9 What is the punishment for gambling in India? L1 4
10 What is the issue with data privacy? L2 3
Part – B (Long Answer Questions)
11 a) What is Cybercrime? Explain with examples. L1 2
b) Explain some Basic Data Privacy Concepts: L2 2
12 a) What is Data privacy? Explain Data Privacy Attacks. L1 1
b) Explain privacy policies and their specifications. L2 4
13 a) What is privacy? Explain different domains in privacy. L1 4
b) What are the Mini-Cases in Cybercrime? Explain. L1 4
14 a) What are the privacy policy languages? Explain. L1 4
b) What is an example of intellectual property violation? L2 3
15 a) What is Email spoofing? How to protect your self? L1 2
b) Explain some Financial Frauds in Cyber Domain. L4 4
* Blooms Taxonomy Level (BT) (L1 – Remembering; L2 – Understanding; L3 – Applying;
L4 – Analyzing; L5 – Evaluating; L6 – Creating)
Course Outcomes (CO)
Program Outcomes (PO)

Prepared By: Dr.D.Bhadru HOD, CS

You might also like