0% found this document useful (0 votes)
14 views2 pages

Imp 3

The document outlines the examination details for the First Semester of B.Tech. in Cyberspace Awareness at P P Savani University, scheduled for November 29, 2023. It includes instructions for answering the questions, which are divided into two sections, covering topics such as cyber security, password attacks, cyber warfare, and digital signatures. Students are required to attempt multiple-choice questions, short questions, and essay-type questions while adhering to the provided guidelines.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
14 views2 pages

Imp 3

The document outlines the examination details for the First Semester of B.Tech. in Cyberspace Awareness at P P Savani University, scheduled for November 29, 2023. It includes instructions for answering the questions, which are divided into two sections, covering topics such as cyber security, password attacks, cyber warfare, and digital signatures. Students are required to attempt multiple-choice questions, short questions, and essay-type questions while adhering to the provided guidelines.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 2
P P SAVANI UNIVERSITY First Semester of B, Tech. Examination November 2023 1110 Cyberspace Awareness Maximum Marks: 60 29.11.2023, Wednesday Time: 12:30 p.m, To 03:00 pam, Instructions: 1. The question paper comprises of two sections, 2. Section | and I! must be attempted in separate answer sheets, 3. Make sttitable assumptions and draw neat figures wherever required. 4. Use of scientific calculator is allowed. Q-1 MCQ/Short Question/Fill in the Blanks (Any Five) (What is the primary danger of using public Wi-Fi networks without proper security measures? (a) Increased internet speed (b) Unauthorized access to personal data (6) Enhanced encryption of data (@) Protection against phishing attacks Gi) A __is an ethical hacker who uses their skills to help organizations identify and fix security vulnerabilities. Git) focuses on securing individual devices, suchas computers, smartphones, and tablets, rom cyber threats. (iv) In July 2020, hackers gained access to 130 private and corporate Twitter accounts with at least a million followers each. They used 45 of these accounts to promote a Bitcoin scam. What does this scenario describe? () Whats Botnet? (vi) What is the importance of regularly updating software and operating systems for cyber security? Q-2 (a) Whatis Cyber Security? Why itis important? Q-2(b) Whatis Password attacks? Which are the types of password attacks? How to prevent from the password attacks? OR Q-2 (a) Whatis vulnerability? Explain types of vulnerabilities Q-2(b) What is malvertising? How it works? And How to prevent form it? Q-3{a) Explain Cyber Warfare and Cyber Terrorism. Q-3(b) What is Cyber security threats? Which are the types of cyber security threats? Explain rogue software. oR Q-3(a) Differentiate Hacker and Cracker. Q-3(b) List Out OWASP top 10 vulnerabilities. Q-4 Attempt any one. (What id DDoS attack? How to prevent from DDoS attack? (i) Explain Internet Governance along with its various Stakeholders. SECTION — II Q-1 Short Question/Fill in the Blanks (Any Five) () List three do's for computer security {05} {05} {05} {05} {os} [05] {05} [05] [05] {05) [05] co BTL PO 1 5 6 302 4 301 =5 164 6 atta 2 5 Dia) 3 6 Meee He: nn seni} aeea ee: eee: 1 aaa 302 6 1 4 6 2 3 10 Page 1of2 ) (iv) ) wi) (vii) Q-2 (a) Q-2 (0) Q-2{a) Q-2(b) Q-3 (a) Q-3(b) 2-3) Q-3(b) Q-4 @ (ii) What is the main purpose of a digital signature in the context of cyber law? What is the importance of time-stamping in a forensic investigation? Implementing a comprehensive ____inchudes policies and procedures to guide organizationsin securing thei digital assets, What are the security considerations in e-commerce transactions? To protect against credentials, requiri and password, What is the importance of H1PPA compliance? How can organizations ensure the privacy and security of customer data in their systems? __., e-commerce websites implement login users to log in with a combination of a username Discuss the importance of data encryption in safeguarding sensitive information, OR Explain the role of firewalls and antivirus software in implementing security controls, What is multi-factor authentication, and wiyy is it essential for enhancing security? 'dentify potential risks associated with sharing personal information on social media platforms. Discuss the security measures that e-commerce platforms should implement to protect customer transactions. OR Provide an overview of intrusion detection systems and their significance in cybersecurity. ‘What challenges are associated with securing digital payment systems, and how can they be mitigated? Attempt any one. Discuss the key steps involved in conducting preliminary analysis in cyber forensics. How does this phase contribute to the overall investigative process? Discuss the evolution of cyber laws in India, citing examples from the IT Act [05] {05} {05} {05} {05} {05} [05] [05] {05} Zar 4 6 5 7 2 8 2c Ae Ed 20S 2S 22 4 6 eg a Scat 4 6 2 8 CO: Course Outcome Number BTL: Blooms Taxonomy Level Level of Bloom's Revised Taxonomy in Assessment | 1: Remember ___| 2: Understand 3: Apply: (Analyze 5: Evaluate 6 Create Page 2 of 2

You might also like