0% found this document useful (0 votes)
20 views1 page

CCS340 Iat2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views1 page

CCS340 Iat2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

P.S.R.R.

COLLEGE OF ENGINEERING, SIVAKASI - 626 140

INTERNAL ASSESSMENT TEST – II

Programme: B.E Branch CSE


Academic Year: 2023 - 2024 Year/Sem III/VI
Subject Code: CCS340 Subject Name Cyber Security
Maximum Marks: 50 Marks Date of Test/Session 26.04.2024 / FN Duration 1.30 hrs
Staff Name Mrs.N.Subhashini

ANSWER ALL THE QUESTIONS (5*2=10)


Part - B (Any 2) (2*13=26 )
Bloom’s Course
6. Part - Aattacks and their countermeasures. Marks
Explain the concept of Web application 13 Category
US Level Outcome
CO2
Define Banner grabbing
1.7. What are the steps involved in Reconnaissance? Explain in detail about 132 RM CO3
CO3
RM
port scanning.
2. Give examples of social engineering attacks. 2 RM CO2
8.
Discuss the different ways of extracting information from email servers. 13 US CO2
3. What is common attack vector? 2 RM CO3
Part - C (1*14=14)
4.9. Discuss in detail about the working of OS Fingerprinting and its different
What is the need for port scanning?
142 RM CO3
CO3
techniques. US
5.
CO2:Classify various
State some types
tools of attacks
employed forand learn
cyber the tools to launch. the attacks.
attack. 2 RM CO2
CO3:Apply various tools to perform information gathering.

Prepared By Approved By
N..Subhashinni, AP/CSE HOD/CSE

P.S.R.R. COLLEGE OF ENGINEERING, SIVAKASI - 626 140

INTERNAL ASSESSMENT TEST – II


Programme: B.E Branch CSE
Academic Year: 2023 - 2024 Year/Sem III/VI
Subject Code: CCS340 Subject Name Cyber Security
Maximum Marks: 50 Marks Date of Test/Session 26.04.2024 / FN Duration 1.30 hrs
Staff Name Mrs.N.Subhashini

ANSWER ALL THE QUESTIONS (5*2=10)


Part - B (Any 2) (2*13=26 )
6. Bloom’s Course
Explain the concept of Web application
Part - Aattacks and their countermeasures. Marks
13 US Level CO2
Category Outcome
1.
7. Defineare
What Banner grabbing
the steps involved in Reconnaissance? Explain in detail about 132 RM CO3
CO3
RM
port scanning.
2.
8. Give examples of social engineering attacks. 2 RM CO2
Discuss the different ways of extracting information from email servers. 13 US CO2
3. What is common attack vector? 2 RM CO3
Part - C (1*14=14)
9. Discuss in detail about the working of OS Fingerprinting and its different 14 US
4. What is the need for port scanning? 2 RM CO3
CO3
techniques.
CO2:Classify
5. various
State some types
tools of attacks
employed forand learn
cyber the tools to launch. the attacks.
attack. 2 RM CO2
CO3:Apply various tools to perform information gathering.

Prepared By Approved By
N..Subhashinni, AP/CSE HOD/CSE

You might also like