You are on page 1of 3

Total No. of Questions : 8] [1] [Total No.

of Printed Pages : 3

Roll No ..................................
CS-503(C)-CBGS
B.Tech., V Semester
Examination, December 2020
Choice Based Grading System (CBGS)
Cyber Security
Time : Three Hours
Maximum Marks : 70
Note: i) Attempt any five questions.
{H$Ýht nm±M àíZm| H$mo hb H$s{OE&
ii) All questions carry equal marks.
g^r àíZm| Ho$ g_mZ A§H$ h¢&
iii) In case of any doubt or dispute the English version
question should be treated as final.
{H$gr ^r àH$ma Ho$ g§Xoh AWdm {ddmX H$s pñW{V ‘| A§J«oOr ^mfm
Ho$ àíZ H$mo A§{V‘ ‘mZm Om¶oJm&

1. a) Define the term cyber crime. Give the classification of


cyber crime.
gmB~a AnamY H$mo n[a^m{fV H$s{OE& gmB~a AnamY Ho$ dJuH$aU
H$mo {b{I¶o&
b) Explain the different types of phishing techniques.
{d{^Þ àH$ma Ho$ OmbgmOr VH$ZrH$s H$s ì¶m»¶m H$s{OE&

2. a) Describe the intellectual property issues.


~m¡{ÕH$ gånXm {ddmXmo H$s ì¶m»¶m H$s{OE&

CS-503(C)-CBGS PTO
[2]

b) How attack on Wireless network perform?


~oVma Ho$ g§Omb na AmH«$‘U H¡$go hmoVm h¡ g‘PmB¶o&
3. a) Explain the term Logic Bomb, Worms, spyware in brief.
Vm{H©$H$ ~‘, H$sQ> Ed§ ñnmBdo¶a eãXmo H$s ì¶m»¶m H$s{OE&
b) What is IT ACT 2000? Write the features of IT ACT 2000.
gyMZm àm¡Úmo{JH$s A{Y{Z¶‘ 2000 ³¶m h¡? gyMZm àm¡Úmo{JH$s
A{Y{Z¶‘ 2000 H$s {deofVmAmo H$mo {b{I¶o&
4. a) Define the term cyber terrorism in detail.
gmB~a AmV§H$ eãX H$s {dñVma go {ddoMZm H$s{OE&
b) Write down the life-cycle phases of virus.
{dfmUw Ho$ OrdZMH«$ Ho$ {d{^Þ MaUm| H$mo {b{IE&
5. a) What is the role of digital signature in digital evidence?
{S>{OQ>b gmú¶ ‘| {S>{OQ>b hñVmja H$s ^y{‘H$m H$m C„oI H$s{OE&
b) How Trojan Horses affect the computer System/Network?
Q´>moOZ Aíd g§JUH$ àUmbr ¶m g§Omb H$mo H¡$go à^m{dV H$aVo h¢
{b{I¶o&
6. a) What is Salami attack? How information can be gathered
through Salami technique?
gbm‘r AmH«$‘U ³¶m h¡? gbm‘r VH$ZrH$s go gyMZm H¡$go EH$Ì H$s
OmVr h¢?
b) Explain the various types of security policies and their
review process.
{d{^Þ àH$ma H$s gwajm Zr{V¶m Ed§ CZH$s g‘rjm à{H«$¶m H$s
ì¶m»¶m H$s{OE&

CS-503(C)-CBGS Contd...
PTO
[3]

7. a) What do you mean by information security?


gyMZm H$s gwajm go Amn ³¶m g‘PVo h¢?
b) How DOS and DDOS attack can be performed?
godm go d§{MV Ed§ {dV[aV godm go d§{MV AmH«$‘U H¡$go {H$¶m OmVm
h¢&
8. Write the short notes on:
i) E-mail spoofing
ii) Software Piracy
iii) Trapdoors
iv) Key loggers
v) Spamming
{ZåZ{b{IV na {Q>ßnUr {b{IE&
i) B©-‘ob ñnyq’$J
ii) gmâQ>d¶ o a nmBaogr
iii) Q´>n¡ S>mao
iv) Hw$§ Or bm°Ja
v) ñn¡q‘J

******

CS-503(C)-CBGS PTO

You might also like