0% found this document useful (0 votes)
24 views2 pages

Cybersecurity IQ-1 Paper Updated

This document outlines the internal assessment for the course 'Elements of Cyber Security and IoT' at Rajarajeswari College of Engineering for the academic year 2024-25. It includes details on the assessment structure, duration, and a set of questions covering various cybersecurity topics, with options for students to choose from. The assessment aims to evaluate students' understanding of key cybersecurity concepts and their application in real-world scenarios.

Uploaded by

Manohar TV
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views2 pages

Cybersecurity IQ-1 Paper Updated

This document outlines the internal assessment for the course 'Elements of Cyber Security and IoT' at Rajarajeswari College of Engineering for the academic year 2024-25. It includes details on the assessment structure, duration, and a set of questions covering various cybersecurity topics, with options for students to choose from. The assessment aims to evaluate students' understanding of key cybersecurity concepts and their application in real-world scenarios.

Uploaded by

Manohar TV
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

SET A USN

Rajarajeswari College of Engineering


(An Autonomous Institution under VTU, Belagavi)

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


[IoT, Cybersecurity including Block chain Technology]
INTERNAL ASSESSMENT - I
Academic Year2024-25(EVEN Sem)

Course Name : Elements of Cyber Security and IoT Duration/Time :90Min / 9.00AM-10.30AM
Course Code : BIC401 Date :13.03.2025
Semester / Sec :4th / A Max Marks :50

Note: Answer any one of the following questions from each.


Q.
QUESTIONS MARKS CO’s BT
No
Explain the basic concepts of cybersecurity and discuss why cybersecurity is
A) 10 CO1 L2
essential in today’s digital world.
1. OR
Explain the various layers of security in cybersecurity and describe their
B) importance in safeguarding information systems. 10 CO1 L2
Explain the concepts of Vulnerability, Assets, and Threats in cybersecurity
A) and discuss their relevance in risk management. 10 CO1 L2

2. OR
Apply your understanding of active and passive attacks to analyze how
B) attackers choose their methods based on motives and target systems. 10 CO1 L3

Describe various types of software and hardware attacks and explain their
A) 10 CO1 L2
significance in cybersecurity.
3. OR
Explain cyber threats and cyber warfare and discuss their impact on
B) 10 CO1 L2
individuals and organizations.
Discuss the importance of a cybersecurity policy and describe the key
A) 10 CO1 L2
components that should be included in its development.
4. OR
Explain the role of encryption in protecting data and discuss how it secures
B) 10 CO1 L2
data during transmission and at rest
Discuss the security measures for mobile apps as outlined in Cyber Security
5. A) 10 CO2 L2
Essentials.
OR
Explain the security challenges and types of attacks on mobile devices as
B) 10 CO2 L2
outlined in Cyber Security Essential
Bloom’s Taxonomy(BT)
1 2 3 4 5 6
Remember Understand Apply Analysis Evaluate Create

Course Coordinator HoD Principal


SET B USN

Rajarajeswari College of Engineering


(An Autonomous Institution under VTU, Belagavi)

DEPARTMENTOF COMPUTER SCIENCE & ENGINEERING


[IoT, Cybersecurity including Blockchain Technology]
INTERNAL ASSESSMENT - I
Academic Year2024-25(EVEN Sem)

Course Name : Elements of Cyber Security and IoT Duration/Time :90Min / 9.00AM-10.30AM
Course Code : BIC401 Date :13.03.2025
Semester / Sec :4th / A Max Marks :50

Note: Answer any one of the following questions from each.


Q.
QUESTIONS MARKS CO’s BT
No
Apply basic cybersecurity concepts to a real-world scenario and explain how
A) 10 CO1 L3
they are important for organizations in protecting digital assets.
1. OR
Explain the various layers of security in cybersecurity and describe their
B) importance in safeguarding information systems. 10 CO1 L2
Apply the concepts of vulnerability, assets, and threats to a specific scenario
A) and discuss their relevance in risk assessment and mitigation.
10 CO1 L3

2. OR
Explain the motive of attackers and differentiate between active and passive
B) attacks in cybersecurity. 10 CO1 L2

A)
Describe various types of software and hardware attacks and explain their 10 CO1 L2
significance in cybersecurity.
3. OR
Discuss Cyber Terrorism and Cyber Espionage, their implications, and the
B) measures to counter them
10 CO1 L2

A)
Explain the concept of risk management and describe different risk mitigation 10 CO1 L2
strategies in cybersecurity.
4. OR
Explain the concept of incident response and describe the key steps involved
B) 10 CO1 L2
in responding to a cybersecurity breach.
Discuss how these challenges impact users and organizations, and what 10
5. A) CO2 L2
measures can be taken to mitigate these risks.
OR
B)
Explain the security challenges and types of attacks on mobile devices as 10 CO2 L2
outlined in Cyber Security Essential
Bloom’s Taxonomy(BT)
1 2 3 4 5 6
Remember Understand Apply Analysis Evaluate Create

Course Coordinator HoD Principal

You might also like