Cyber Previous Paper
Cyber Previous Paper
BTECH
(SEM IV) THEORY EXAMINATION 2023-24
CYBER SECURITY
TIME: 3 HRS M.MARKS: 70
Note: 1. Attempt all Sections. If require any missing data; then choose suitably.
SECTION A
1. Attempt all questions in brief. 2 x 7 = 14
a. How does cybercrime differ from traditional crime?
b. What are the common profiles of cybercriminals in terms of demographics and skills?
c. How do registry settings differ between mobile operating systems such as Android
and iOS?
d. How are financial institutions adapting to the increase in mobile credit card fraud?
e. What is a keylogger, and how does it capture keystrokes?
f. What is digital forensics, and how does it differ from traditional forensic science?
g. What is a patent, and what are the criteria for obtaining one in India?
SECTION B
2. Attempt any three of the following: 7 x 3 = 21
a. What tools and technologies are essential for protecting against cybercrime?
2
13
b. How do multi-factor authentication (MFA) systems work on mobile devices?
90
c. What is steganography, and how is it used to conceal information?
2.
_2
24
P2
e. How can trademark infringement be prevented and remedied under Indian law?
5.
4E
.5
SECTION C
3. Attempt any one part of the following:
17 7x1=7
P2
(b) How can botnet activities be detected and disrupted by cybersecurity professionals?
PM
(b) What are the key components of a comprehensive mobile security policy for
organizations?
:
39
(b) What is an SQL injection attack, and how does it exploit vulnerabilities in web
applications?
20
(a) What are the stages of the digital forensics life cycle?
Au
(b) How do investigators capture and analyze network traffic during a network forensics
investigation?
7-
(a) What are the common intellectual property issues faced in the digital age?
(b) What are the penalties and legal consequences for cybercrimes under Indian law?
1|Page
QP24EP2_290 | 07-Aug-2024 1:39:45 PM | 117.55.242.132
Printed Page: 1 of 1
Subject Code: BCC301
0Roll No: 0 0 0 0 0 0 0 0 0 0 0 0 0
BTECH
(SEM III) THEORY EXAMINATION 2023-24
CYBER SECURITY
TIME: 3HRS M.MARKS: 70
Note: 1. Attempt all Sections. If require any missing data; then choose suitably.
SECTION A
1. Attempt all questions in brief.
Q no. Question Marks
a. Define Cyber Crime. 2
b. What is Bot net. 2
c. Why mobile needs security? 2
d. Define Authentication and Authorization. 2
e. What is virus and worms. 2
f. Explain digital evidence? 2
g. Why cyber is needed? 2
SECTION B
2. Attempt any three of the following:
90
2
a. Explain how the term ‘cybercrime’ originated. State few Cyber Crimes. 7
13
_2
b. Explain wireless devices with example. What are the security challenges faced by 7
2.
wireless devices?
P2
24
c. Explain 7 Tools used in Cyber Crime. 7
4D
5.
d. Explain Digital forensics life cycle. 7
e. What is the need of Information Security policy?
.5 7
P2
17
Q
|1
SECTION C
3. Attempt any one part of the following:
2 5
b. What is the fuel for cybercrime. How may a criminal plan cybercrime? 7
:3
a. Explain the security measures and policies taken for mobile devices. 7
4
b. State some attacks on Mobile devices. What are the security implications for 7
02
organizations.
-2
a. What is Identity Theft. How it is done and how ID Theft can be handled? 7
2-
1|Page
QP24DP2_290 | 12-03-2024 13:37:25 | 117.55.242.132