The document outlines the examination details for the First Semester of B.Tech. in Cyberspace Awareness at P P Savani University, scheduled for November 29, 2023. It includes instructions for answering the questions, which are divided into two sections, covering topics such as cyber security, password attacks, cyber warfare, and digital signatures. Students are required to attempt multiple-choice questions, short questions, and essay-type questions while adhering to the provided guidelines.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0 ratings0% found this document useful (0 votes)
14 views2 pages
Imp 3
The document outlines the examination details for the First Semester of B.Tech. in Cyberspace Awareness at P P Savani University, scheduled for November 29, 2023. It includes instructions for answering the questions, which are divided into two sections, covering topics such as cyber security, password attacks, cyber warfare, and digital signatures. Students are required to attempt multiple-choice questions, short questions, and essay-type questions while adhering to the provided guidelines.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 2
P P SAVANI UNIVERSITY
First Semester of B, Tech. Examination
November 2023
1110 Cyberspace Awareness
Maximum Marks: 60
29.11.2023, Wednesday Time: 12:30 p.m, To 03:00 pam,
Instructions:
1. The question paper comprises of two sections,
2. Section | and I! must be attempted in separate answer sheets,
3. Make sttitable assumptions and draw neat figures wherever required.
4. Use of scientific calculator is allowed.
Q-1 MCQ/Short Question/Fill in the Blanks (Any Five)
(What is the primary danger of using public Wi-Fi networks without
proper security measures?
(a) Increased internet speed
(b) Unauthorized access to personal data
(6) Enhanced encryption of data
(@) Protection against phishing attacks
Gi) A __is an ethical hacker who uses their skills to help
organizations identify and fix security vulnerabilities.
Git) focuses on securing individual devices, suchas computers,
smartphones, and tablets, rom cyber threats.
(iv) In July 2020, hackers gained access to 130 private and corporate Twitter
accounts with at least a million followers each. They used 45 of these
accounts to promote a Bitcoin scam. What does this scenario describe?
() Whats Botnet?
(vi) What is the importance of regularly updating software and operating
systems for cyber security?
Q-2 (a) Whatis Cyber Security? Why itis important?
Q-2(b) Whatis Password attacks? Which are the types of password attacks? How
to prevent from the password attacks?
OR
Q-2 (a) Whatis vulnerability? Explain types of vulnerabilities
Q-2(b) What is malvertising? How it works? And How to prevent form it?
Q-3{a) Explain Cyber Warfare and Cyber Terrorism.
Q-3(b) What is Cyber security threats? Which are the types of cyber security
threats? Explain rogue software.
oR
Q-3(a) Differentiate Hacker and Cracker.
Q-3(b) List Out OWASP top 10 vulnerabilities.
Q-4 Attempt any one.
(What id DDoS attack? How to prevent from DDoS attack?
(i) Explain Internet Governance along with its various Stakeholders.
SECTION — II
Q-1 Short Question/Fill in the Blanks (Any Five)
() List three do's for computer security
{05}
{05}
{05}
{05}
{os}
[05]
{05}
[05]
[05]
{05)
[05]
co BTL PO
1 5 6
302 4
301 =5
164 6
atta
2 5
Dia)
3 6
Meee He:
nn seni}
aeea ee:
eee:
1
aaa
302 6
1 4 6
2 3 10
Page 1of2)
(iv)
)
wi)
(vii)
Q-2 (a)
Q-2 (0)
Q-2{a)
Q-2(b)
Q-3 (a)
Q-3(b)
2-3)
Q-3(b)
Q-4
@
(ii)
What is the main purpose of a digital signature in the context of cyber
law?
What is the importance of time-stamping in a forensic investigation?
Implementing a comprehensive ____inchudes policies and
procedures to guide organizationsin securing thei digital assets,
What are the security considerations in e-commerce transactions?
To protect against
credentials, requiri
and password,
What is the importance of H1PPA compliance?
How can organizations ensure the privacy and security of customer data
in their systems?
__., e-commerce websites implement login
users to log in with a combination of a username
Discuss the importance of data encryption in safeguarding sensitive
information,
OR
Explain the role of firewalls and antivirus software in implementing
security controls,
What is multi-factor authentication, and wiyy is it essential for enhancing
security?
'dentify potential risks associated with sharing personal information on
social media platforms.
Discuss the security measures that e-commerce platforms should
implement to protect customer transactions.
OR
Provide an overview of intrusion detection systems and their significance
in cybersecurity.
‘What challenges are associated with securing digital payment systems,
and how can they be mitigated?
Attempt any one.
Discuss the key steps involved in conducting preliminary analysis in
cyber forensics. How does this phase contribute to the overall
investigative process?
Discuss the evolution of cyber laws in India, citing examples from the IT
Act
[05]
{05}
{05}
{05}
{05}
{05}
[05]
[05]
{05}
Zar
4
6
5 7
2 8
2c Ae
Ed
20S
2S
22
4 6
eg
a
Scat
4 6
2 8
CO: Course Outcome Number BTL: Blooms Taxonomy Level
Level of Bloom's Revised Taxonomy in Assessment
| 1: Remember ___| 2: Understand 3: Apply:
(Analyze 5: Evaluate 6 Create
Page 2 of 2