The document contains a series of questions related to cybercrime, cybersecurity concepts, and intellectual property rights (IPR). It includes multiple-choice questions, short answer prompts, and explanatory questions on topics such as cookies, hacking, VPNs, and digital signatures. The questions are structured to assess knowledge on various aspects of cybersecurity and cyber law.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
13 views1 page
WAT
The document contains a series of questions related to cybercrime, cybersecurity concepts, and intellectual property rights (IPR). It includes multiple-choice questions, short answer prompts, and explanatory questions on topics such as cookies, hacking, VPNs, and digital signatures. The questions are structured to assess knowledge on various aspects of cybersecurity and cyber law.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1
1.
Answer the following question [1*5=5]
a) Which of the following is a cybercrime, where
computer is not being used as a target (i) Spamming (ii) Squatting (iii) Spoofing (iv) Snooping b) A malicious code that replicates itself is called as: (i) Virus (ii) Worm (iii) Cookie (iv) BOT c) Web hijacking is a process of: (i) Virus (ii) Hacking (iii) Cookie (iv) BOT d) Unauthorized access to a third party conversation is called as: (i) Denial of Service (ii) Cyber stalking (iii) Cyber squatting (iv) Eavesdropping e) Patent law comes under (i) Denial of Service (ii) IPR (iii) Cyber squatting (iv) Eavesdropping
2. Answer the following question [1*6=6]
a) IPR b) VPN c) DSC d) DOS e) VIRUS f) SPAM
3.Answer the following question (any 5) [2*5=10]
a) Explain about cookies?
b) Explain about hacking? c) Explain about SPAM? d) Explain about VPN? e) Explain about FIREWALL? f) Explain about IPR? g) Explain about cyber terrorism?
4. Answer the following question? (any 3) [ 3*3=9]
a) Explain Digital signature?
b) Explain Phishing and Vishing? c) Explain SNOOPING and SPOOFING? d) Explain virus and types of virus?
5. Answer the following question? (any 1) [ 5*1=5]
a) Briefly explain cyber-crime and explain cyber
crime as a tool? b) Briefly explain cyber-crime and explain cyber crime as a target?