0% found this document useful (0 votes)
34 views4 pages

Question Bank

This document is a question bank for the elective course 'Introduction to Cyber Security' for the academic year 2023-24 at SJCIT. It includes various modules with questions categorized by Bloom's learning levels, covering topics such as cyber-crime, attacks, forensics, and phishing. The questions are designed to assess students' understanding and knowledge in the field of cyber security.

Uploaded by

Deepak B L
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views4 pages

Question Bank

This document is a question bank for the elective course 'Introduction to Cyber Security' for the academic year 2023-24 at SJCIT. It includes various modules with questions categorized by Bloom's learning levels, covering topics such as cyber-crime, attacks, forensics, and phishing. The questions are designed to assess students' understanding and knowledge in the field of cyber security.

Uploaded by

Deepak B L
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

SJCIT Question Bank

Estd: 1986

Department of Information Science & Engineering

SUBJECT TITLE Introduction to Cyber Security


SUBJECT TYPE ELECTIVE
SUBJECT CODE BETCK1051/2051
ACADEMIC YEAR 2023-24 (ODD SEMESTER) BATCH 2023
SCHEME CBCS scheme (Effective from the academic year 2022 -2023)
SEMESTER I-Sem
FACULTY NAME and
DESIGNATION
Deepak B L, Assistant Professor
QUESTION BANK
Module -1
Q. Bloom’s
Questions COs
No. LL
1 What is Cyber-crime? How do you define it? L1 CO1

2 How do you classify Cyber-crimes? Explain each one briefly? L1 CO1

What are the different types of Cyber-criminals? Explain each one CO1
3 briefly? L1

Is there a difference between “Cyber-crime” and “Cyber-Fraud”? CO1


4 L1
Explain.

Explain any two of given Below:


 Spamming
5  Cyber defamation L1
 Hacking CO1
 Industrial Spying/ Industrial Espionage
Define Briefly:
 Pornographic Offenses
6  Software Piracy L1 CO1
 Computer Sabotage
 Credit Card Frauds
 Computer Network Intrusions
7 Write a short note on L6

CO1

Page | 1
SJCIT Question Bank

 Indian Legal Perspective on Cyber-crimes.


 A Global Perspective on Cyber-crimes.

How do you think Cyber Crime has relevance in the extended enterprise CO1
8 contest? Explain L1

Explain in your own words what do you understand about the global co- CO1
9 L1
operation required in fighting against Cyber-crime..

Write a short notes on: CO1


 Forgery
10  Newsgroup Spam L6
 Web Jacking
 Data Diddling
 Salami Attack/ Salami Technique
Module -2
Q. Bloom’s
Questions COs
No. LL
1 Explain the difference between passive and active attacks. Explain with L1 CO2
example?

2 How criminals plan for attacks explain briefly. L1 CO2

3 What is Social engineering? How do you classify them? L1 CO2

4 What is Cyberstalking? As per your understanding is it a crime under the L1 CO2


Indian IT act?.

5 What do you mean by Botnet? Explain how botnets can be used as fuel to L1 CO2
cybercrime with diagram.

6 What are all the different attacks launched with attack vector. Explain? L1 CO2

7 Explain the cloud computing and cybercrime L1 CO2

8 List and explain any 5 tools which are used in L1 CO2


 Active attack
 Passive attacks
9 Write a note on L6 CO2
 Cybercafe
 Cybercrime

Module -3
Q. Bloom’s
Questions COs
No. LL
1 What are the different plans during the attack on the network? L1 CO3

Page | 2
SJCIT Question Bank

2 What is the difference between proxy server and Anonymizers? L1 CO3

3 What are the different ways of password cracking? L1 CO3


4 How can Key loggers be used to commit a cybercrime? L2 CO3

5 What is the difference between viruses and worm? L1 CO3

6 What is virus hoax? L1 CO3

7 Explain the difference between Trojan Horses and backdoors? L1 CO3

8 Explain in detail steganography and cryptography? L1 CO3

9 What is the difference between DoS and DDoS? L1 CO3

10 How can wireless network be comprised? L2 CO3

11 What is the difference between WAPkitting and WAPjacking? L1 CO3

Module -4
Q. Bloom’s
Questions COs
No. LL
1 What is Phishing? Explain With Examples. L1 CO4
2 Differentiate between Spam and Hoax mails. L1 CO4

3 What are the different methods of Phishing attack? L1 CO4


4 What is Spear Phishing? Explain With examples. L1 CO4
5 What is Whaling? Explain the difference between Whaling and Spear L1 CO4
Phishing.
6 What is identity theft? Explain with examples. L1 CO4
7 How information can be classified? L2 CO4
8 What are the different types of id theft? L1 CO4

9 How to prevent being a victim of id theft? L2 CO4

Module -5
Q. Bloom’s
Questions COs
No. LL
1 Is there a difference between Computer Security and Computer L1 CO5
Forensics? Explain.
2 Can a cybercrime investigation be done without involving a forensics L1 CO5

Page | 3
SJCIT Question Bank

expert? Explain with reasons..


3 Explain how the “chain of custody” concept applies in computer/ digital L1 CO5
forensics.
4 Explain the importance of strong documentation in cyber-forensics L1 CO5
profession?

5 Define string. Explain how to declare and initialize a string using L1 CO5
examples. 5. Is there a difference between “digital forensics” and
“computer forensics”? Explain.
6 Explain the role of “chain of custody” concept. Provide illustrations to L1 CO5
support your answer.
7 Define L1 CO5
 Digital forensics life cycle.
 Digital forensics process
8 Discuss Network Forensics. L2 CO5
9 Which are the phases in computer forensics or digital forensics? L1 CO5

Note:
1. Questions shall be framed by consolidating comprehensively from the following sources
 Exercise problems of text books/ references
 Previous year question VTU exam Question paper. (Mark the year/exam beside the question)
 Questions by Experts during Interview/Academic Audit
 Internet sources/ other Universities examination question papers.
2. Questions shall follow all the Bloom’s learning levels with appropriate action verbs
3. Ensure the coverage of all Cos.

Page | 4

You might also like