SJCIT Question Bank
Estd: 1986
Department of Information Science & Engineering
SUBJECT TITLE Introduction to Cyber Security
SUBJECT TYPE ELECTIVE
SUBJECT CODE BETCK1051/2051
ACADEMIC YEAR 2023-24 (ODD SEMESTER) BATCH 2023
SCHEME CBCS scheme (Effective from the academic year 2022 -2023)
SEMESTER I-Sem
FACULTY NAME and
DESIGNATION
Deepak B L, Assistant Professor
QUESTION BANK
Module -1
Q. Bloom’s
Questions COs
No. LL
1 What is Cyber-crime? How do you define it? L1 CO1
2 How do you classify Cyber-crimes? Explain each one briefly? L1 CO1
What are the different types of Cyber-criminals? Explain each one CO1
3 briefly? L1
Is there a difference between “Cyber-crime” and “Cyber-Fraud”? CO1
4 L1
Explain.
Explain any two of given Below:
Spamming
5 Cyber defamation L1
Hacking CO1
Industrial Spying/ Industrial Espionage
Define Briefly:
Pornographic Offenses
6 Software Piracy L1 CO1
Computer Sabotage
Credit Card Frauds
Computer Network Intrusions
7 Write a short note on L6
CO1
Page | 1
SJCIT Question Bank
Indian Legal Perspective on Cyber-crimes.
A Global Perspective on Cyber-crimes.
How do you think Cyber Crime has relevance in the extended enterprise CO1
8 contest? Explain L1
Explain in your own words what do you understand about the global co- CO1
9 L1
operation required in fighting against Cyber-crime..
Write a short notes on: CO1
Forgery
10 Newsgroup Spam L6
Web Jacking
Data Diddling
Salami Attack/ Salami Technique
Module -2
Q. Bloom’s
Questions COs
No. LL
1 Explain the difference between passive and active attacks. Explain with L1 CO2
example?
2 How criminals plan for attacks explain briefly. L1 CO2
3 What is Social engineering? How do you classify them? L1 CO2
4 What is Cyberstalking? As per your understanding is it a crime under the L1 CO2
Indian IT act?.
5 What do you mean by Botnet? Explain how botnets can be used as fuel to L1 CO2
cybercrime with diagram.
6 What are all the different attacks launched with attack vector. Explain? L1 CO2
7 Explain the cloud computing and cybercrime L1 CO2
8 List and explain any 5 tools which are used in L1 CO2
Active attack
Passive attacks
9 Write a note on L6 CO2
Cybercafe
Cybercrime
Module -3
Q. Bloom’s
Questions COs
No. LL
1 What are the different plans during the attack on the network? L1 CO3
Page | 2
SJCIT Question Bank
2 What is the difference between proxy server and Anonymizers? L1 CO3
3 What are the different ways of password cracking? L1 CO3
4 How can Key loggers be used to commit a cybercrime? L2 CO3
5 What is the difference between viruses and worm? L1 CO3
6 What is virus hoax? L1 CO3
7 Explain the difference between Trojan Horses and backdoors? L1 CO3
8 Explain in detail steganography and cryptography? L1 CO3
9 What is the difference between DoS and DDoS? L1 CO3
10 How can wireless network be comprised? L2 CO3
11 What is the difference between WAPkitting and WAPjacking? L1 CO3
Module -4
Q. Bloom’s
Questions COs
No. LL
1 What is Phishing? Explain With Examples. L1 CO4
2 Differentiate between Spam and Hoax mails. L1 CO4
3 What are the different methods of Phishing attack? L1 CO4
4 What is Spear Phishing? Explain With examples. L1 CO4
5 What is Whaling? Explain the difference between Whaling and Spear L1 CO4
Phishing.
6 What is identity theft? Explain with examples. L1 CO4
7 How information can be classified? L2 CO4
8 What are the different types of id theft? L1 CO4
9 How to prevent being a victim of id theft? L2 CO4
Module -5
Q. Bloom’s
Questions COs
No. LL
1 Is there a difference between Computer Security and Computer L1 CO5
Forensics? Explain.
2 Can a cybercrime investigation be done without involving a forensics L1 CO5
Page | 3
SJCIT Question Bank
expert? Explain with reasons..
3 Explain how the “chain of custody” concept applies in computer/ digital L1 CO5
forensics.
4 Explain the importance of strong documentation in cyber-forensics L1 CO5
profession?
5 Define string. Explain how to declare and initialize a string using L1 CO5
examples. 5. Is there a difference between “digital forensics” and
“computer forensics”? Explain.
6 Explain the role of “chain of custody” concept. Provide illustrations to L1 CO5
support your answer.
7 Define L1 CO5
Digital forensics life cycle.
Digital forensics process
8 Discuss Network Forensics. L2 CO5
9 Which are the phases in computer forensics or digital forensics? L1 CO5
Note:
1. Questions shall be framed by consolidating comprehensively from the following sources
Exercise problems of text books/ references
Previous year question VTU exam Question paper. (Mark the year/exam beside the question)
Questions by Experts during Interview/Academic Audit
Internet sources/ other Universities examination question papers.
2. Questions shall follow all the Bloom’s learning levels with appropriate action verbs
3. Ensure the coverage of all Cos.
Page | 4