0% found this document useful (0 votes)
16 views

SEE

The document outlines the examination structure for the course 'Introduction to Cyber Security' for B.E. students, detailing the subjects covered in five units. Each unit contains specific questions related to various aspects of cybercrime, including classifications, legal perspectives, attack types, and preventive measures. The exam is scheduled for July/August 2024, with a total duration of 3 hours and a maximum score of 100 marks.

Uploaded by

zyxdec10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

SEE

The document outlines the examination structure for the course 'Introduction to Cyber Security' for B.E. students, detailing the subjects covered in five units. Each unit contains specific questions related to various aspects of cybercrime, including classifications, legal perspectives, attack types, and preventive measures. The exam is scheduled for July/August 2024, with a total duration of 3 hours and a maximum score of 100 marks.

Uploaded by

zyxdec10
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

ETC146/ETC246

USN 1 M S
(Autonomous Institute, Affiliated to VTU)

Created by trial version of DocuFreezer


(Approved by AICTE, New Delhi & Govt. of Karnataka)
Accredited by NBA & NAAC with ‘A+’ Grade

SEMESTER END / BACKLOG SUBJECT EXAMINATIONS – JULY / AUGUST 2024


Program : B.E – Common to all Programs Semester : I / II
Course Name : Introduction to Cyber Security Max. Marks : 100
Course Code : ETC146 / ETC246 Duration : 3 Hrs

Instructions to the Candidates:


 Answer one full question from each unit.

UNIT - I
1. a) How do we classify cybercrimes? Explain each one briefly. CO1 (08)
b) Explain in your own words what you understand about the global CO2 (06)
cooperation required in fighting against cybercrime.
c) How do viruses get disseminated? Also differentiate cyber fraud and CO1 (06)
cyber crime.

2. a) Differentiate between Techno crime and techno Vandalism with example CO2 (06)
for each.
b) Write a short note on Indian legal perspective on cybercrime. CO1 (06)
c) Illustrate the following cybercrimes with example for each: CO1 (08)
i. Cyber defamation
ii. Internet time theft
iii. Data diddling
iv. Industrial Espionage.

UNIT - II
3. a) Discuss patriot hacking? CO2 (06)
b) With the help of example explain Cyberstalking, Social Engineering and (06)
CO2
Cybercafe.
c) Define a Passive and Active attacks? Discuss how Criminals Plan the (08)
CO2
Attacks.

4. a) Describe the social engineering crime along with an example. CO2 (06)
b) Define Botnet and attack vector. CO2 (06)
c) Discuss how criminals plan the attacks explain briefly. CO2 (08)

UNIT - III
5. a) With an example explain based on attacks of Trojan Horses. CO3 (10)
b) Discuss DoS attack and DDos attack with example. CO3 (10)

6. a) Explain Virus and Worms. CO3 (04)


b) Discuss briefly the different ways of password cracking. CO3 (06)
c) How can key-loggers be used to commit a cybercrime discuss briefly. CO3 (10)

UNIT- IV
7. a) Illustrate the following phishing scams with example for each: CO4 (08)
i. Man-in-the-middle Phishing
ii. Search engine Phishing
iii. Pharming
iv. Malware-based Phishing
b) Describe Personally Identifiable Information (PII). Also list the elements CO5 (06)
fraudster would attempt to steal.
c) What can an organisation do to protect against phishing emails? Explain. CO4 (06)

Page 2 of 2
ETC146/ETC246
8. a) Discuss different types of Identity thefts with example for each. CO5 (08)

Created by trial version of DocuFreezer


b) How should an organisation respond to a phishing attack? CO4 (06)
c) Discuss the measures to prevent phishing. CO4 (06)

UNIT-V
9. a) Discuss computer forensics of email. CO5 (06)
b) Explain the different phases in computer forensics. CO5 (10)
c) Discuss the importance of chain of custody. CO5 (04)

10. a) Explain the background of cyber forensics. CO5 (08)


b) What is digital forensic science? Describe the digital forensic process. CO5 (06)
c) What is electronic evidence? Discuss the rules of evidence. CO5 (06)

********************************

Page 2 of 2

You might also like