0% found this document useful (0 votes)
25 views2 pages

Test

The document outlines an examination for the Cyber Security course at the National Institute of Cyber Security, consisting of three sections: Section A with 10 written questions worth 2 marks each, Section B with 6 questions worth 5 marks each, and Section C with 5 questions worth 10 marks each. Topics covered include spamming, antivirus software, WiFi security, digital signatures, encryption, and incident response plans. The total marks for the exam are 100, with a duration of 3 hours.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views2 pages

Test

The document outlines an examination for the Cyber Security course at the National Institute of Cyber Security, consisting of three sections: Section A with 10 written questions worth 2 marks each, Section B with 6 questions worth 5 marks each, and Section C with 5 questions worth 10 marks each. Topics covered include spamming, antivirus software, WiFi security, digital signatures, encryption, and incident response plans. The total marks for the exam are 100, with a duration of 3 hours.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Roll Number:

DURATION: 3 HOURS
TOTAL MARKS: 100
UNIVERSITY NAME: NATIONAL INSTITUTE OF CYBER SECURITY
Subject: CS8391 - Cyber Security
Exam Code: CS101
[CSE]

Section A: Written Questions


(Attempt 10 questions. Each question carries 2 marks.)
Total Marks for Section: 20

1. What is spamming and list two characteristics of spam emails.

2. Describe the process of quarantine in antivirus software.

3. Which menu option do you select to clear cache in Internet Explorer 9?

4. Explain why Android is considered more secure for data and communications.

5. What is the primary legal concern when intercepting WiFi transmissions?

6. Describe the role of a prosecutor in bridging the information gap between technology and the legal
system.

7. Why is it important to protect the time of highly trained personnel in digital forensics?

8. How does an IP address differ from a MAC address?

9. What is the role of the VMware Diskmount utility in virtual disk imaging?

10. Explain how a timeline report can be useful in a forensic examination of a system.

Section B: Written Questions


(Attempt 6 questions. Each question carries 5 marks.)
Total Marks for Section: 30

1. a) Compare and contrast the use of password managers with traditional methods of password
storage.
(or)
b) Explain the process of validating a digital signature with an example.

2. a) Explain the potential challenges of returning a product purchased from an international online
retailer.
(or)
b) What are the key factors to consider when determining if an online business is reputable?

3. a) Discuss the role of encryption in protecting data transmitted over WIFI networks.
(or)
b) Illustrate the process of eavesdropping on an unencrypted WiFi network with a simple diagram.

4. a) Discuss the technological advancements that have contributed to the widespread adoption of
WiFi.
(or)
b) What are the basic skills required for a law enforcement officer to effectively seize digital
evidence?

5. a) Discuss the importance of understanding the basics of IP addressing for law enforcement
investigators.
(or)
b) Discuss the basic structure of an IP address and its role in cyber investigations.

6. a) Explain the process of 'creating and distributing viruses over the internet' and its consequences.
(or)
b) Describe the process of installing an encryption application on a smartphone for secure
communication.

Section C: Written Questions


(Attempt 5 questions. Each question carries 10 marks.)
Total Marks for Section: 50

1. Describe the difference between structured and unstructured attacks.

2. Name two applications commonly found on smartphones that require passwords.

3. What are the potential consequences of not having a well-defined incident response plan?

4. What is the role of MD5 hash algorithm in verifying data integrity during imaging?

5. What are the implications of the Heisenberg uncertainty principle in memory acquisition?

You might also like