0% found this document useful (0 votes)
10 views2 pages

29. a7658 Cs Model Qp

This document is a hall ticket for the IV I-Semester Regular Examinations in Cyber Security at Vardhaman College of Engineering, scheduled for December 2024. It outlines various questions related to cyber security topics, including definitions, classifications of cyber attacks, and security implications for organizations. The exam consists of multiple questions categorized by learning outcomes and marks distribution.

Uploaded by

Jega
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views2 pages

29. a7658 Cs Model Qp

This document is a hall ticket for the IV I-Semester Regular Examinations in Cyber Security at Vardhaman College of Engineering, scheduled for December 2024. It outlines various questions related to cyber security topics, including definitions, classifications of cyber attacks, and security implications for organizations. The exam consists of multiple questions categorized by learning outcomes and marks distribution.

Uploaded by

Jega
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Hall Ticket

Paper Code: A7658


No:

VARDHAMAN COLLEGE OF ENGINEERING


(AUTONOMOUS)
IV I-Semester Regular Examinations, - 2024
(Regulations: R21)
CYBER SECURITY
ECE
Date: XX Dec, 2024 Time: 3 hours Max Marks: 100
Answer All Questions

BLOOM’
Q. COURSE
S MARKS
No. OUTCOMES
LEVEL
1 a) What is Cyber Security and Cybercrime? L2 CO1 3M
.
b How do you classify the cyber attacks? L3 CO1 3M
)
c) What do you understand by botnet? L3 CO2 3M
d What are the different types of cyber stalkers. L2 CO2 3M
)
e) What is proliferation (Excessive increase / L3 CO3 3M
spread in something) of mobile and wireless
device?
f) What is a credit card fraud in mobile and L2 CO3 3M
wireless environment.
g What is spyware? L3 CO4 3M
)
h What is keyloggers? What are the types of L2 CO4 3M
) keyloggers?
i) What are the IPR issues in cyber security? L3 CO5 3M
j) What are security implication for an L2 CO5 3M
organization.

2 a) Why Cyber Security is important? Differentiate between L CO1 7M


. terrestrial crime and cyber crime. 2
b Define Phishing and Explain cyber terrorism with example. L CO1 7M
) 2
(OR)
c) Give a note on legal perspective on cybercrime. L CO1 7M
2
d What is Email Spoofing? Explain in detail. L CO1 7M
) 2

3 a) Explain the active attacks and passive attacks. Give some example L CO2 7M
. of cyber crime? 3
b Write a note on cyber stalkers. L CO2 7M
) 2
(OR)
c) Explain about classification of social engineering. L CO2 7M
2
d Explain the advantages of cloud computing in cyber security. L CO2 7M
2

4 a) What are the security implications for organization? L CO3 7M


. 2
b What is registry setting in mobile devices? Explain the security L CO3 7M
) challenges posted by mobile devices. 3
(OR)
c) What are the organizational measures for handling mobile? L CO3 7M
3
d Explain the security challenges posted by mobile devices L CO3 7M
) 3

5. a) Explain difference between proxy server and anonymizers. L3 CO4 7M


b) What is SQL injection? Explain with example. L2 CO4 7M
(OR)
c) Explain backdoor attack with example? How to detect and prevent? L3 CO4 7M
d) Explain the difference between DoS and DDoS? L3 CO4 7M

6 a) Summarize the logic of Memory forensic and List out the tools used to L CO 7
. find unused memory space from the RAM. 3 5 M
b Differentiate how intrusion detection system is differed from L CO 7
) prevention system. 2 5 M
(OR)
c) Compare the functionalities of Blekasoft and Helix ISO. L CO 7
3 5 M
d How Honeypot helps to identify three different types risk which need L CO 7
) to classified under High, Medium and Low category. 2 5 M

You might also like