You are on page 1of 2

GC Women University, Sialkot

Name: Roll No:


Department: Computer Science Class: BS / M.A / M. Sc. / MS / P.hD
Course Title: Cyber Security Course Code: IT-431
Exam: Mid Term Fall / Spring: Fall
Semester: 8th Session 2017 to 2021 Date: 28-05-2021
Invigilator Name: ______________________ Instructor Name: Arfa Skandar
Total Marks: 35 Obtained Marks: Time: 1 Hour 45 Mins
……………………………………………………………………………………………………………………
Instructions for Students:

1. Turn on your Mic and cameras throughout the Exam.

2. Use 1st 15 minutes to read all the questions.

3. No query regarding question paper will be entertained after 15 minutes.

4. Paper can be attempted in soft form as well as on any notebook.

5. In case of notebook clear pictures must be captured and attached into a file.

6. paper must be submitted into PDF format

7. Extra time will not be granted.

8. Submit the paper on teams, in case of any attachment issue email the paper to me on
arfa.skander@gcwus.edu.pk as well as on incharge id too, incharge.cs@gcwus.edu.pk.

Question 1: An assistant director of GIG organization was traveling in the car and was preparing an business proposal
on his laptop. After reaching near to the building where the office was located on 3 rd floor, he went to his office
but didn’t carry his laptop along. He sent his office boy to pick the laptop for him and also asked to make the lid
down as laptop is not in sleeping mode or shut down. When office boy reached to car, he found that car window
was broken and when brought laptop to assistant director it was found that presentation was gone. Which type
of cybercrime is this? What can be the motive to of attacker? Is there any way to out in this situation? Which
measurements can be taken for future? (1+2+2+2=7 Marks)
Question 2: A person Mr. Unknown lives next door to Ms. sidra. He came to know that Ms. sidra has bank balance of
20 million. He wanted to steal the money and for this purpose he asked help from his friend whom is an expert
hacker. His friend provided him with software for stealing sidra’s web cookie and uses it for performing bank
transactions. Which type of hacker is Mr unknown? Which type of attack will be form by mr unknown? Is
there any possibility that the attack get failed? Do justify your answer. (1+2+2=5 Marks)
Question 3: If Ms. Iqra is managing a network of Service provider and something wrong had happen while
transferring IP packets that need to be forwarded to the customer Ms. Alice in the network, the destination IP
address was chosen wrong and deliver to the Mr Bob. Now, from where Ms. Iqra will start finding the fault? Is
there any possibility of involvement of network rootkit attack? How can she resolve the issue? (2+1+2=5
Marks)
Question 4: One fine morning, Mr. Haris who is Examination controller in the University of Ada Login his LMS
account that found that found that last modification of data was at 2.30 am. But he didn’t make that
modification. He ignored and login to the official email id and found that an email was done by him for the
cancellation of exams. He contacted to IT Support Centre of the university and informed about the the whole
situation. IT Support Centre chooses you to find the type of attack, the cause of the attack, solution of the
current situation and possible prevention measures for the future. (1+2+2+2=7 Marks)
Question 5: If you have to design a Web attack with the use of kernel rootkit attack then which Web attack will be
your choose and why? (4 Marks)
Question 6: Design a small browser attack to redirect the user to another web page after clicking on an image.
Also define the type of attack. (4 Marks)
Question 7: You are working as cyber security expert in RJP multinational company. After completing your shift
Mohsin left at 7 pm. you received a call from his company’s number that there is an emergency need of a main
system(from where all the business data can be accessed) and cyber security office of next shift is not here yet.
The caller demanded for the password of the system on behalf of CEO. What will be your reaction? Which
attack it can be? (2+1=3 Marks)

Good Luck
……………………………………………………………………………………………………………………

You might also like