0% found this document useful (0 votes)
3 views2 pages

Important Questions BCA124 CyberSecurity

The document outlines important questions for the BCA124 course on Cyber Security and Cryptography, covering foundational concepts, cyber laws, public key cryptography, advanced encryption standards, and malware. Each unit includes key topics such as the CIA triad, social engineering, cyber forensics, RSA algorithm, AES, and malware types. The questions aim to assess understanding and application of cyber security principles and practices.

Uploaded by

abhay9955yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views2 pages

Important Questions BCA124 CyberSecurity

The document outlines important questions for the BCA124 course on Cyber Security and Cryptography, covering foundational concepts, cyber laws, public key cryptography, advanced encryption standards, and malware. Each unit includes key topics such as the CIA triad, social engineering, cyber forensics, RSA algorithm, AES, and malware types. The questions aim to assess understanding and application of cyber security principles and practices.

Uploaded by

abhay9955yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Important Questions for BCA124: Principles of Cyber Security and Cryptography

Unit 1: Foundations of Cyber Security Concepts

- Explain the CIA triad with suitable examples.

- What is social engineering? Explain its types.

- Describe any 3 open source tools used for port scanning and footprinting.

- Explain cyber security vulnerabilities and safeguards in software systems.

- Explain Information Gathering techniques.

- Describe vulnerabilities in complex network architectures.

- What is IT Audit and why is it important?

Unit 2: Cyber Laws and Forensics

- Explain the role of Cyber Law in India.

- What are the steps in investigating internet crime?

- Define cyber forensics. What is the need of cyber forensics?

- Write short notes on: National Cyber Security Policy 2013, Email Crime Investigations.

- What is cyber evidence? Explain with examples.

- Describe Denial of Service (DoS) Investigation process.

Unit 3: Public Key Cryptography and RSA

- Explain RSA algorithm with example.

- Compare Symmetric and Asymmetric Cryptography.

- What is Diffie-Hellman key exchange? Explain.

- Explain any two block cipher principles.

- Describe the strength of DES.

- What are transposition techniques in cryptography?

Unit 4: Advanced Encryption Standards & Hash Functions

- Explain AES algorithm with structure.


- What is Triple DES? How is it different from DES?

- Explain stream cipher and block cipher modes of operation.

- What is message authentication? Explain the function and requirement.

- What is a Hash Function? Give its importance in cybersecurity.

- Define MACs and their role in secure communication.

Unit 5: Malware, Firewall, Digital Signature

- Define Malware. Explain different types of malware.

- What is OS hardening? Why is it required?

- Describe Firewall and its design principles.

- Explain Digital Signature and how it ensures authenticity.

- Describe tools for Anti-Malware and Anti-Phishing.

- What is the function of the Windows Registry in malware protection?

You might also like