Betck105i Mqp@Azdocuments - in
Betck105i Mqp@Azdocuments - in
(CBCS Scheme)
USN
Note: 1. Answer any FIVE full questions, choosing at least ONE question from each module.
2. M. Marks, L: Bloom's level, C: Course Outcomes
• Module - 1 M L C
Q.1 •a Define Cybercrime and cyber security. List and explain categories of Cyber 10 L1 CO1
criminals.
b 10 L2 CO1
List and explain the classification of cybercrimes.
OR
Q2 a List and explain the hacking and the Indian law under Indian ITA 2000 10 L2 CO1
cybercrimes.
b Write note on: 10 L1 CO1
i) Cyber defamation
ii). Salami attack
iii) Hacking
iv)Software piracy
v) Mail Bomb
Module - 2
Q3 a Explain the difference between passive and active attacks provide tools as 10 L2 CO2
example
b What is social engineering? Explain Human based and Computer based 10 L2 CO2
social engineering
OR
Q4 a What is Cyber stalking? Name the two types of stalkers and explain how 10 L2 CO2
stalking works.
b What is Zombie network? What are the different attacks launched with 10 L2 CO2
attack vector ? Explain
Module - 3
Q5 a What are the different stages during the attack on the network? 10 L1 CO3
Q6 a What is the difference between a virus and a worm? List the types of Virus 10 L1 CO3
and explain
b What is Trojan Horses and Backdoors? How to Protect from Trojan Horses 10 L1 CO3
and Backdoors.
Module – 4
Q7 a What is phishing? What are the different methods of phishing attack? 10 L1 CO4
OR
Module - 5
b Define Computer forensic and digital forensic. List the role of digital forensics. 7 L1 CO5
c Explain the guidelines to be followed during the digital evidence collection 10 L2 CO5
phase.
OR
Q10 a Draw a block diagram for the process to capture and handle forensic evidence. 4 L3 CO5