Professional Documents
Culture Documents
22 ETC151 Set 1
22 ETC151 Set 1
Note: Answer any FIVE full questions, choosing at least ONE question from each MODULE.
*Bloom’s
Module -1 Taxonomy Marks
Level
Q.01 a Define computer crime. Discuss about Cyberpunk and Cyber warfare L2 8
OR
Q.02 a Who are cybercriminals? Discuss the three groups of cybercriminals L3 8
Module-2
Q. 03 a What is Social Engineering? Discuss Human Based Social Engineering with a L3 8
suitable example
b Explain how criminals plan the attacks? List the phases involved in planning L2 6
cyber crimes
c List and briefly explain any six tips for safety and security while using the L2 6
computers in a cybercafé
OR
Q.04 a Define Cyber Stalking along with its working. Explain two types of Stalkers L3 8
c Define Bot and Botnet. With a diagram, explain how Botnets create business? L3 6
Module-3
Q. 05 a What are hardware key loggers and Anti key loggers? List the advantages of L2 8
using anti loggers
Page 01 of 02
22ETC151/251
c What is a Backdoor? Discuss any four examples of Backdoor Trojans L2 6
OR
Q. 06 a Discuss various types of Viruses categorized based on attacks on various L3 8
elements of the system
OR
Q. 08 a Discuss the various techniques used by Phishers to launch Phishing attacks L3 10
Module-5
Q. 09 a Discuss the following phases of Forensics life cycles
i) Preparation and Identification
ii) Collection and Recording
b List various Computer Forensics services available, explain any two of them. L2 6
c Briefly explain RFC2822 L2 4
OR
Q. 10 a Discuss the following phases of Forensics life cycle L2 10
i) Storing and Transporting
ii) Examination/Investigation
*Bloom’s Taxonomy Level: Indicate as L1, L2, L3, L4, etc. It is also desirable to indicate the COs and POs to be
attained by every bit of questions.
Page 02 of 02