0% found this document useful (0 votes)
45 views2 pages

Cyber Previous Paper

The document outlines the examination structure for a BTech Cyber Security course, detailing the sections and types of questions to be answered. It includes topics such as cybercrime definitions, digital forensics, mobile security, and various cyber threats. The exam is divided into three sections, with a total of 70 marks and a duration of 3 hours.

Uploaded by

akashmaurya5078
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views2 pages

Cyber Previous Paper

The document outlines the examination structure for a BTech Cyber Security course, detailing the sections and types of questions to be answered. It includes topics such as cybercrime definitions, digital forensics, mobile security, and various cyber threats. The exam is divided into three sections, with a total of 70 marks and a duration of 3 hours.

Uploaded by

akashmaurya5078
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Printed Page: 1 of 1

Subject Code: BCC401


0Roll No: 0 0 0 0 0 0 0 0 0 0 0 0 0

BTECH
(SEM IV) THEORY EXAMINATION 2023-24
CYBER SECURITY
TIME: 3 HRS M.MARKS: 70
Note: 1. Attempt all Sections. If require any missing data; then choose suitably.

SECTION A
1. Attempt all questions in brief. 2 x 7 = 14
a. How does cybercrime differ from traditional crime?
b. What are the common profiles of cybercriminals in terms of demographics and skills?
c. How do registry settings differ between mobile operating systems such as Android
and iOS?
d. How are financial institutions adapting to the increase in mobile credit card fraud?
e. What is a keylogger, and how does it capture keystrokes?
f. What is digital forensics, and how does it differ from traditional forensic science?
g. What is a patent, and what are the criteria for obtaining one in India?

SECTION B
2. Attempt any three of the following: 7 x 3 = 21
a. What tools and technologies are essential for protecting against cybercrime?

2
13
b. How do multi-factor authentication (MFA) systems work on mobile devices?
90
c. What is steganography, and how is it used to conceal information?

2.
_2

d. What are the technical challenges faced by computer forensics professionals?

24
P2

e. How can trademark infringement be prevented and remedied under Indian law?

5.
4E

.5
SECTION C
3. Attempt any one part of the following:
17 7x1=7
P2

(a) What are the typical stages of a cyber-attack?


|1
Q

(b) How can botnet activities be detected and disrupted by cybersecurity professionals?
PM

4. Attempt any one part of the following: 7x1=7


(a) How can users detect and respond to phishing attacks on their mobile devices?
45

(b) What are the key components of a comprehensive mobile security policy for
organizations?
:
39

5. Attempt any one part of the following: 7x1=7


(a) What is the difference between a DoS (Denial of Service) attack and a DDoS
1:

(Distributed Denial of Service) attack?


24

(b) What is an SQL injection attack, and how does it exploit vulnerabilities in web
applications?
20

6. Attempt any one part of the following: 7x1=7


g-

(a) What are the stages of the digital forensics life cycle?
Au

(b) How do investigators capture and analyze network traffic during a network forensics
investigation?
7-

7. Attempt any one part of the following: 7x1=7


|0

(a) What are the common intellectual property issues faced in the digital age?
(b) What are the penalties and legal consequences for cybercrimes under Indian law?

1|Page
QP24EP2_290 | 07-Aug-2024 1:39:45 PM | 117.55.242.132
Printed Page: 1 of 1
Subject Code: BCC301
0Roll No: 0 0 0 0 0 0 0 0 0 0 0 0 0

BTECH
(SEM III) THEORY EXAMINATION 2023-24
CYBER SECURITY
TIME: 3HRS M.MARKS: 70

Note: 1. Attempt all Sections. If require any missing data; then choose suitably.

SECTION A
1. Attempt all questions in brief.
Q no. Question Marks
a. Define Cyber Crime. 2
b. What is Bot net. 2
c. Why mobile needs security? 2
d. Define Authentication and Authorization. 2
e. What is virus and worms. 2
f. Explain digital evidence? 2
g. Why cyber is needed? 2
SECTION B
2. Attempt any three of the following:
90

2
a. Explain how the term ‘cybercrime’ originated. State few Cyber Crimes. 7

13
_2

b. Explain wireless devices with example. What are the security challenges faced by 7

2.
wireless devices?
P2

24
c. Explain 7 Tools used in Cyber Crime. 7
4D

5.
d. Explain Digital forensics life cycle. 7
e. What is the need of Information Security policy?
.5 7
P2

17
Q

|1

SECTION C
3. Attempt any one part of the following:
2 5

a. Who are Cyber Criminals? Classify Cybercrimes. 7


7:

b. What is the fuel for cybercrime. How may a criminal plan cybercrime? 7
:3

4. Attempt any one part of the following:


13

a. Explain the security measures and policies taken for mobile devices. 7
4

b. State some attacks on Mobile devices. What are the security implications for 7
02

organizations.
-2

5. Attempt any one part of the following:


03

a. What is Identity Theft. How it is done and how ID Theft can be handled? 7
2-

b. What is steganography. Explain in detail. 7


|1

6. Attempt any one part of the following:


a. What is Email. Explain how Email forensics can be done. 7
b. What are privacy threats? What are the challenges faced? 7
7. Attempt any one part of the following:
a. What is Cyber Law. State a few Cyber law in India. 7
b. Give a Overview of Intellectual Property related Legislation in India. 7

1|Page
QP24DP2_290 | 12-03-2024 13:37:25 | 117.55.242.132

You might also like