29. a7658 Cs Model Qp
29. a7658 Cs Model Qp
BLOOM’
Q. COURSE
S MARKS
No. OUTCOMES
LEVEL
1 a) What is Cyber Security and Cybercrime? L2 CO1 3M
.
b How do you classify the cyber attacks? L3 CO1 3M
)
c) What do you understand by botnet? L3 CO2 3M
d What are the different types of cyber stalkers. L2 CO2 3M
)
e) What is proliferation (Excessive increase / L3 CO3 3M
spread in something) of mobile and wireless
device?
f) What is a credit card fraud in mobile and L2 CO3 3M
wireless environment.
g What is spyware? L3 CO4 3M
)
h What is keyloggers? What are the types of L2 CO4 3M
) keyloggers?
i) What are the IPR issues in cyber security? L3 CO5 3M
j) What are security implication for an L2 CO5 3M
organization.
3 a) Explain the active attacks and passive attacks. Give some example L CO2 7M
. of cyber crime? 3
b Write a note on cyber stalkers. L CO2 7M
) 2
(OR)
c) Explain about classification of social engineering. L CO2 7M
2
d Explain the advantages of cloud computing in cyber security. L CO2 7M
2
6 a) Summarize the logic of Memory forensic and List out the tools used to L CO 7
. find unused memory space from the RAM. 3 5 M
b Differentiate how intrusion detection system is differed from L CO 7
) prevention system. 2 5 M
(OR)
c) Compare the functionalities of Blekasoft and Helix ISO. L CO 7
3 5 M
d How Honeypot helps to identify three different types risk which need L CO 7
) to classified under High, Medium and Low category. 2 5 M