0% found this document useful (0 votes)
19 views4 pages

Information Sec 2022 2

Rgpv dioma paper

Uploaded by

Gulshan pwr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

Information Sec 2022 2

Rgpv dioma paper

Uploaded by

Gulshan pwr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

I

st2022t7183 Total Pages : 4

Sixth Semester
Information Technology
Scheme OCBC 2019
INFORMATION SECURITY AND CYBER LAW
Time : Three Hours Maximum Marks : 70
Note : i) All T Questions are Compulsory. Intemal choices has been
given in each LO (Leaming Outcome)
srfr 7 qaq 3rmtr 3{idkf,fr-@ rct-o ro (affir ens-cme)
tffuwtt
0 In case of any doubt or dispute, the English version question
shouldbe treated as final.
frrfr S non b {tr eTern fr-qrq fr fuft { eiNt qisr &
qeq o\ 3iftq qpal qr$rnr

a. LO Questions Marks
1. LOz Differentiate threat, vulnerability and risk. 5

qle, qdtRfrr8 ss fts ii oiffi ftfuir


5
b) Explain types of Cyber Security attacks.
sr{q{ g{e{r qI{ b q-qrn d HqflEtt
OR/3Telqr
5
a) Explain man in the Middle Attack.
C-qfiqfr.Bdeitoeq-flglr
5
b) CompareVirus andWorm
sEr{s qq sd fr gan fi&qr
7 LO4 a) Explainfollowing: 5

! Caesar Cipher

D PlayfairCipher
m) HillCipher
iv) Mono alphabetic Cipher
st2022t7r83 PTO,
T

lzl

a. IrO Questions Marks


fr..r fi qr$n$ :

D Ssr ftw
0 dhi frsq
trDFd fr'rq
iO qt+ ci-ffirnBn frw
b) Explain types of Transposition Technique. 5

R{fr oiil{ur iffi-.fto fi n6rs qrsr$t


oR/e{erqr
Discuss Encryption and Decryption. 5

qfuqq gq ffiqrq w qqf fiftql


b) Describe type of Steganography 5

ffi h q-qfl-{ o.r qsh ftfu}i


,,'
L04 a) IdentiS do's and don't oflnternet Security. 5

{d<id g-re{r il GidTfd rqr o-c<r srl< rqr q-S

b) SummarizelPsecurity. 5

IP gqe{T ffT rrR rqo frErtr


OR/3{EtTI

a) DefineVPN. 5

vPN s) qforTE-d frErtr


b) UseofFirewali. 5

Erqrcnei fi q*I frfuqr

4. LO7 a) DescribeE-rnailSpoofing. 5

{-fd qBrr or qufq fiffir


st2022t71,83 Contd.....
i3l

a. LO Questions Marks
* ''i'5
b) Describe: 5

, Trapdoor's
D botrets
EIff€il fifrqr
, wd{s
D efti{n
OR/3TETfl
5
a) ExplainIDS
IDS 6\ sq-flr{tr
5
b) Explain working principle of PGP.
PGP *' EFrd frdt< qqsrEsr

5
5. LO10 Dfferentiate between Penetation Testing and
Vulnerability Assessment.
tii$q affir q.i erffiftr& XqteE A
*q q<R wq ftFrlr
b) Discuss Ethical Hacking 5
qRrs-d tFtirr qs znf frRrSr
OR/3Te.rfl
5
OverviewofAltivirus.
qr&qtq-{s or 3rq-trqt{
5
b) Classify tlpes of Ethical I lackers.
fatu;{ q-fl-{ bqPro-d tffi{ eT sfif-d fifrr-ir

6. LO11 a) Discuss CyberCnme. 5

qr{eq ffigq w qqf frf;rcr


5
b) ExplainDefamation. i

qtc-diq1 n*rflr$r

st2fi2217183 P.T.O.
t4l

a. L/O Questions Marks


OR/3TE]ZTT

a) ExplainVshing. 5

frerrr a\ eq-flr$r
b) Relate identit, theft and Defamation. 5

3rT+fie e).rc G qtq-dlft { qtitr eqr tr


7. LO13 a) Describe ITAct2000. 5

IT Act 2000 ffi quh ftffir


b) Discuss Cyber forensic. 5
Hr-fl{ sttfro. q{ 4qf frffir
OR/CTel-{t

LOt4 a) Discuss Patent Law 5

t--e af qr rqf fiftqr


b) Describe Social Engineering attack in Cyber 5
Security.
ftf\=q q-{.n il e}arm ifuFrvftrr erdo
eqgjEll

-F€€_

s12022t7183

You might also like