Cybersecurity IQ-1 Paper Updated
Cybersecurity IQ-1 Paper Updated
Course Name : Elements of Cyber Security and IoT Duration/Time :90Min / 9.00AM-10.30AM
Course Code : BIC401 Date :13.03.2025
Semester / Sec :4th / A Max Marks :50
2. OR
Apply your understanding of active and passive attacks to analyze how
B) attackers choose their methods based on motives and target systems. 10 CO1 L3
Describe various types of software and hardware attacks and explain their
A) 10 CO1 L2
significance in cybersecurity.
3. OR
Explain cyber threats and cyber warfare and discuss their impact on
B) 10 CO1 L2
individuals and organizations.
Discuss the importance of a cybersecurity policy and describe the key
A) 10 CO1 L2
components that should be included in its development.
4. OR
Explain the role of encryption in protecting data and discuss how it secures
B) 10 CO1 L2
data during transmission and at rest
Discuss the security measures for mobile apps as outlined in Cyber Security
5. A) 10 CO2 L2
Essentials.
OR
Explain the security challenges and types of attacks on mobile devices as
B) 10 CO2 L2
outlined in Cyber Security Essential
Bloom’s Taxonomy(BT)
1 2 3 4 5 6
Remember Understand Apply Analysis Evaluate Create
Course Name : Elements of Cyber Security and IoT Duration/Time :90Min / 9.00AM-10.30AM
Course Code : BIC401 Date :13.03.2025
Semester / Sec :4th / A Max Marks :50
2. OR
Explain the motive of attackers and differentiate between active and passive
B) attacks in cybersecurity. 10 CO1 L2
A)
Describe various types of software and hardware attacks and explain their 10 CO1 L2
significance in cybersecurity.
3. OR
Discuss Cyber Terrorism and Cyber Espionage, their implications, and the
B) measures to counter them
10 CO1 L2
A)
Explain the concept of risk management and describe different risk mitigation 10 CO1 L2
strategies in cybersecurity.
4. OR
Explain the concept of incident response and describe the key steps involved
B) 10 CO1 L2
in responding to a cybersecurity breach.
Discuss how these challenges impact users and organizations, and what 10
5. A) CO2 L2
measures can be taken to mitigate these risks.
OR
B)
Explain the security challenges and types of attacks on mobile devices as 10 CO2 L2
outlined in Cyber Security Essential
Bloom’s Taxonomy(BT)
1 2 3 4 5 6
Remember Understand Apply Analysis Evaluate Create