Information Sec 2022 2
Information Sec 2022 2
Sixth Semester
Information Technology
Scheme OCBC 2019
INFORMATION SECURITY AND CYBER LAW
Time : Three Hours Maximum Marks : 70
Note : i) All T Questions are Compulsory. Intemal choices has been
given in each LO (Leaming Outcome)
srfr 7 qaq 3rmtr 3{idkf,fr-@ rct-o ro (affir ens-cme)
tffuwtt
0 In case of any doubt or dispute, the English version question
shouldbe treated as final.
frrfr S non b {tr eTern fr-qrq fr fuft { eiNt qisr &
qeq o\ 3iftq qpal qr$rnr
a. LO Questions Marks
1. LOz Differentiate threat, vulnerability and risk. 5
! Caesar Cipher
D PlayfairCipher
m) HillCipher
iv) Mono alphabetic Cipher
st2022t7r83 PTO,
T
lzl
D Ssr ftw
0 dhi frsq
trDFd fr'rq
iO qt+ ci-ffirnBn frw
b) Explain types of Transposition Technique. 5
b) SummarizelPsecurity. 5
a) DefineVPN. 5
4. LO7 a) DescribeE-rnailSpoofing. 5
a. LO Questions Marks
* ''i'5
b) Describe: 5
, Trapdoor's
D botrets
EIff€il fifrqr
, wd{s
D efti{n
OR/3TETfl
5
a) ExplainIDS
IDS 6\ sq-flr{tr
5
b) Explain working principle of PGP.
PGP *' EFrd frdt< qqsrEsr
5
5. LO10 Dfferentiate between Penetation Testing and
Vulnerability Assessment.
tii$q affir q.i erffiftr& XqteE A
*q q<R wq ftFrlr
b) Discuss Ethical Hacking 5
qRrs-d tFtirr qs znf frRrSr
OR/3Te.rfl
5
OverviewofAltivirus.
qr&qtq-{s or 3rq-trqt{
5
b) Classify tlpes of Ethical I lackers.
fatu;{ q-fl-{ bqPro-d tffi{ eT sfif-d fifrr-ir
qtc-diq1 n*rflr$r
st2fi2217183 P.T.O.
t4l
a) ExplainVshing. 5
frerrr a\ eq-flr$r
b) Relate identit, theft and Defamation. 5
-F€€_
s12022t7183