0% found this document useful (0 votes)
49 views

Betck105i Mqp@Azdocuments - in

Uploaded by

Chaitrashree R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views

Betck105i Mqp@Azdocuments - in

Uploaded by

Chaitrashree R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

BETCK105I/BETCKI105

(CBCS Scheme)
USN

First Semester B.E./B.Tech. Degree Examination. Jan./Feb.23


Introduction to Cyber Security

TIME: 03 Hours Max. Marks: 100

Note: 1. Answer any FIVE full questions, choosing at least ONE question from each module.
2. M. Marks, L: Bloom's level, C: Course Outcomes

• Module - 1 M L C

Q.1 •a Define Cybercrime and cyber security. List and explain categories of Cyber 10 L1 CO1
criminals.

b 10 L2 CO1
List and explain the classification of cybercrimes.
OR

Q2 a List and explain the hacking and the Indian law under Indian ITA 2000 10 L2 CO1
cybercrimes.
b Write note on: 10 L1 CO1
i) Cyber defamation
ii). Salami attack
iii) Hacking
iv)Software piracy
v) Mail Bomb
Module - 2

Q3 a Explain the difference between passive and active attacks provide tools as 10 L2 CO2
example
b What is social engineering? Explain Human based and Computer based 10 L2 CO2
social engineering
OR

Q4 a What is Cyber stalking? Name the two types of stalkers and explain how 10 L2 CO2
stalking works.
b What is Zombie network? What are the different attacks launched with 10 L2 CO2
attack vector ? Explain
Module - 3

Q5 a What are the different stages during the attack on the network? 10 L1 CO3

b What is the difference between proxy server and an anonymizer? 4 L1 CO3

c What are the different ways of password cracking? 6 L1 CO3

Dr. Asha K, Associate Professor, Dept. of ECE, SVIT Page 01 of 02


BETCK105I/BETCKI105
OR

Q6 a What is the difference between a virus and a worm? List the types of Virus 10 L1 CO3
and explain
b What is Trojan Horses and Backdoors? How to Protect from Trojan Horses 10 L1 CO3
and Backdoors.
Module – 4

Q7 a What is phishing? What are the different methods of phishing attack? 10 L1 CO4

b What is spear phishing? Explain with example. 4 L2 CO4

c List and explain any 6 types of Phishing scams. 6 L2 CO4

OR

Q8 a What is identity theft? Give example. 2 L2 CO4

b What are the different types of identity theft? Explain 8 L2 CO4

c What are the different techniques of ID theft? 10 L1 CO4

Module - 5

Q9 a Explain the following terms: 3 L2 CO5


i) Confidentiality
ii) Integrity
iii) Availability

b Define Computer forensic and digital forensic. List the role of digital forensics. 7 L1 CO5

c Explain the guidelines to be followed during the digital evidence collection 10 L2 CO5
phase.
OR

Q10 a Draw a block diagram for the process to capture and handle forensic evidence. 4 L3 CO5

b Explain the activities involved in the process of forensics 8 L2 CO5

c Elaborate on the chain of Custody 8 L3 CO5

Dr. Asha K, Associate Professor, Dept. of ECE, SVIT Page 02 of 02

You might also like