0% found this document useful (0 votes)
88 views4 pages

Cs 503 C Cyber Security Jun 2020

The document contains a practice exam for the subject of Cyber Security. It has 8 questions covering topics like cyber crimes, frauds, hacking, IT Act provisions, and types of malware. The exam is from RGPV and is meant to test knowledge of key concepts and classifications within cyber security.

Uploaded by

aditya2605singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views4 pages

Cs 503 C Cyber Security Jun 2020

The document contains a practice exam for the subject of Cyber Security. It has 8 questions covering topics like cyber crimes, frauds, hacking, IT Act provisions, and types of malware. The exam is from RGPV and is meant to test knowledge of key concepts and classifications within cyber security.

Uploaded by

aditya2605singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

https://www.rgpvonline.

com

Total No. of Questions : 8] [1] [Total No. of Printed Pages : 4

Roll No ..................................
CS-503(C)-CBGS
B.Tech., V Semester
Examination, June 2020
Choice Based Grading System (CBGS)
Cyber Security
Time : Three Hours
Maximum Marks : 70
Note: i) Attempt any five questions.
{H$Ýht nm±M àíZm| H$mo hb H$s{OE&
ii) All questions carry equal marks.
g^r àíZm| Ho$ g_mZ A§H$ h¢&
iii) In case of any doubt or dispute the English version
question should be treated as final.
{H$gr ^r àH$ma Ho$ g§Xoh AWdm {ddmX H$s pñW{V ‘| A§J«oOr ^mfm
Ho$ àíZ H$mo A§{V‘ ‘mZm Om¶oJm&

1. a) Explain the term Cyber Crime. List down some important


cyber crimes and explain each of them in two to three
sentences.
Cyber Crime H$mo n[a^m{fV H$a|& Hw$N> ‘hÎdnwU© Cyber Crimes
Ho$ ~mao ‘| ~VmB¶o Ed§ Xmo go VrZ dm³¶m| ‘| BÝh| g‘PmBE&
b) What are the various classifications of Cyber Crime?
Explain each in brief.
Cyber Crime H$mo {H$VZo ^mJm| ‘| dJuH¥$V {H$¶m J¶m h¡? g§jon
‘| g^r H$s ì¶m»¶m H$a|&

CS-503(C)-CBGS PTO

https://www.rgpvonline.com
https://www.rgpvonline.com

[2]

2. a) Explain the term ‘Frauds’ with reference to cyber crime


and define the various types of online frauds.
‘Frauds’ go cyber crime Ho$ g§X^© ‘| ³¶m A{^àm¶ h¡? {d{^Þ
àH$ma Ho$ online frauds H$s ì¶m»¶m H$a|&
b) Define ‘Spoofing’ and ‘Spamming’ in detail. Describe
types of spamming in cyber space and give some
prevention mechanism regarding email spoofing.
‘Spoofing’ Ed§ ‘Spamming’ H$mo {dñVma ‘| g‘PmBE& Spamming
Ho$ àH$mam| H$mo ~VmB¶o VWm email spoofing go ~Mmd hoVw Amdí¶H$
H$X‘ ³¶m ³¶m AnZm¶o Om gH$Vo h¡?

3. a) Define DoS and DDoS Attacks in brief. What are the


techniques behind such attacks?
DoS Ed§ DDoS AmH«$‘U H$s g§jon ‘| ì¶m»¶m H$a|& BZ AmH«$‘Um|
Ho$ nrN>o CÎmaXm¶r VH$ZrH$mo H$mo g‘PmB¶o&
b) Explain the term “Hacking”. What are the various
classifications of hackers? Mention them.
“Hacking” eãX H$s ì¶m»¶m H$a|& Hacker Ho$ {d{^Þ dJuH$aU H$mo
g§jon ‘| g‘PmBE VWm CZH$mo ~VmB¶o&
4. a) What do you understand by “Attack on web server”?
Explain the steps taken to avoid web server hacking.
Web server na AmH«$‘U go Amn ³¶m g‘PVo h¡? Web server
hacking go ~MZo Ho$ {bE Cnm¶m| H$s ì¶m»¶m H$a|&
b) Explain “Session Hijacking” in detail along with the
methods for initiating session hijacking.
“Session Hijacking” H$mo {dñVmanyd©H$ ~VmB¶o Ed§ BgHo$ CËnÞ
hmoZo dmbr {d{Y¶m| H$s ì¶m»¶m H$a|&

CS-503(C)-CBGS Contd...
PTO

https://www.rgpvonline.com
https://www.rgpvonline.com

[3]

5. a) What do you know about IT Act 2000? Explain in brief.


IT H$mZyZ, 2000 go Amn ³¶m g‘PVo h¡? g§jon ‘| ì¶m»¶m H$a|&
b) Write down the objectives and some of the important
provisions of Cyber Crimes in the IT Act, 2000.
IT H$mZyZ, 2000 Ho$ CÔoí¶m| VWm Cg‘| gmB~a H«$mB‘ go OwS>r
‘hÎdnyU© YmamAm| H$mo {bI|&

6. a) Explain defamation in the context of cyber crime. List


down some important provision about cyber defamation
mentioned in Indian penal code 1860.
Cyber crime Ho$ gÝX^© ‘| defamation H$mo n[a^m{fV H$a|& Indian
penal code 1860 Ho$ AZwgma cyber defamation Ho$ {bE d{U©V
‘hÎdnwU© YmamAm| H$mo {bI|&
b) List down some of the strategies to tackle Cyber crime.
Cyber crime go bS>Zo Ho$ {bE à‘wI ¶moOZm¶| H$mo g‘Pm¶o&

7. a) Explain the term Phishing. Write down various methods


or activities which constitute phishing.
Phishing eãX H$s ì¶m»¶m H$a|? BgHo$ {d{^Þ àH$ma Ho$ VarH$m| H$s
ì¶m»¶m H$a| {OgZo BgH$s CËn{Îm hmoVr h¡?
b) What do you mean by ‘Salami attack’? What are its adverse
effect on economic structure of society explain with
example?
Salami attack go Amn ³¶m g‘PVo h¡? {H$gr g‘wXm¶ H$s Am{W©H$
ì¶dñWm na BgHo$ Xþñà^md hmo gH$Vo h¡? gmoXmhaU ì¶m»¶m H$a|&

CS-503(C)-CBGS PTO

https://www.rgpvonline.com
https://www.rgpvonline.com

[4]

8. a) What do you understand by term VIRUS and WORMS?


Give definitions along with their types in detail.
VIRUS Ed§ WORMS BZ eãXm| go Amn ³¶m g‘PVo h¡? BZHo$
àH$mam| H$mo n[a^m{fV H$aVo hþE ì¶m»¶m H$a|&
b) Explain “Software piracy”. Write down various activities
that constitute software piracy.
“Software piracy” ³¶m h¡? CZ H¥$˶m| H$mo {bIo {OZHo$ H$maU
software piracy hmoVr h¡&

******

CS-503(C)-CBGS PTO

https://www.rgpvonline.com

You might also like