You are on page 1of 8

SET - 1 SET - 1

G.PULLAIAH COLLEGE OF ENGINEERING & TECHNOLOGY (AT) G.PULLAIAH COLLEGE OF ENGINEERING & TECHNOLOGY (AT)
IV B.Tech II Semester 1st Mid Examination - Objective IV B.Tech II Semester 1st Mid Examination - Objective
Branch: Computer Science and Engineering Branch: Computer Science and Engineering
Sub: CYBER SECURITY Date: 22-02-19 Sub: CYBER SECURITY Date: 22-02-19
Time: 20 mins Max.Marks:10 Time: 20 mins Max.Marks:10
============================================================= =============================================================
Answer all the following: Answer all the following:
Multiple choice questions: Multiple choice questions:
1) Bluetooth hacking tools [ ] 1) Bluetooth hacking tools [ ]
a) car whisperer b) Trojan horse c) trapdoor d) all of the above a) car whisperer b) Trojan horse c) trapdoor d) all of the above
2) The security of RAS system involves [ ] 2) The security of RAS system involves [ ]
a) server b) client c) data transmission d) all of the above a) server b) client c) data transmission d) all of the above
3) NIST stands for [ ] 3) NIST stands for [ ]
a)National industry of standards and technology a)National industry of standards and technology
b)National international of standards and technology b)National international of standards and technology
c)National internet of standards and technology c)National internet of standards and technology
d)National institute of standards and technology d)National institute of standards and technology
4) IMEI stands for [ ] 4) IMEI stands for [ ]
a)International mobile equipmental identity a)International mobile equipmental identity
b)International mobile equipments identity b)International mobile equipments identity
c)International mobile equipment identity c)International mobile equipment identity
d)International mobile equipmention identity d)International mobile equipmention identity
5) The most profitable uses of the information gained through a vishing attack 5) The most profitable uses of the information gained through a vishing attack
include [ ] include [ ]
a)Identity theft b)purchasing luxury goods and services a)Identity theft b)purchasing luxury goods and services
c)transferring money/funds d)all of the above c)transferring money/funds d)all of the above
6) To hide information side a picture, what technology is used? [ ] 6) To hide information side a picture, what technology is used? [ ]
a)Root kits b)Bitmapping c)Steganography d)Image Rendering a)Root kits b)Bitmapping c)Steganography d)Image Rendering
7) The first phase of hacking an IT system is compromise of which foundation 7) The first phase of hacking an IT system is compromise of which foundation
of security? [ ] of security? [ ]
a) Availability b) Confidentiality c) Integrity d) Authentication a) Availability b) Confidentiality c) Integrity d) Authentication
8) What type of password attack would be most successful against the 8) What type of password attack would be most successful against the
password T63k#s23A? [ ] password T63k#s23A? [ ]
a) Dictionary b) Hybrid c) Password guessing d)Brute force a) Dictionary b) Hybrid c) Password guessing d)Brute force
9) Keyloggers are a form of ______________. [ ] 9) Keyloggers are a form of ______________. [ ]
a)spyware b) Shoulder surfing c) Trojan d) Social engineering a)spyware b) Shoulder surfing c) Trojan d) Social engineering
10) What is the most significant legal issue in computer forensics? [ ] 10) What is the most significant legal issue in computer forensics? [ ]
a) Preserving Evidence b) Seizing Evidence a) Preserving Evidence b) Seizing Evidence
c) Admissibility of Evidence d) Discovery of Evidence c) Admissibility of Evidence d) Discovery of Evidence
Fill in the blanks: Fill in the blanks:
11) _______________ is the crime that involves a computer and a network. 11) _______________ is the crime that involves a computer and a network.
12) _____________ is where the information held on either the magnetic 12) _____________ is where the information held on either the magnetic
strip on the back of the credit card or the data stored on the smart chip are strip on the back of the credit card or the data stored on the smart chip are
copied from one card to another. copied from one card to another.
13) The two components of security in mobile computing are ______________ 13) The two components of security in mobile computing are ______________
and ______________ and ______________
14) Computer Forensics is known as _______________________ approach to 14) Computer Forensics is known as _______________________ approach to
network and computer security. network and computer security.
15) The best defense against any type of sniffing is ________________ 15) The best defense against any type of sniffing is ________________

State True or False (T or F):


State True or False (T or F):
16) Mishing attacks are attempted using mobile phone technology [ ]
16) Mishing attacks are attempted using mobile phone technology [ ]
17) Blue jacking is sending unsolicited messages over Bluetooth-enabled
17) Blue jacking is sending unsolicited messages over Bluetooth-enabled
devices such as mobile phones, PDA ‘s or computer with in 15m radius [ ]
devices such as mobile phones, PDA ‘s or computer with in 15m radius [ ]
18) The IMEI number is used by the GSM network to identify valid devices and
18) The IMEI number is used by the GSM network to identify valid devices and
therefore can be used to stop a stolen phone from accessing the network in
therefore can be used to stop a stolen phone from accessing the network in
that country [ ]
that country [ ]
19) Polymorphic virus modifies itself to avoid detection [ ]
19) Polymorphic virus modifies itself to avoid detection [ ]
20) To locate live systems ping sweep is used [ ]
20) To locate live systems ping sweep is used [ ]
SET - 2 SET - 2
G.PULLAIAH COLLEGE OF ENGINEERING & TECHNOLOGY (AT) G.PULLAIAH COLLEGE OF ENGINEERING & TECHNOLOGY (AT)
IVB.Tech II Semester 1st Mid Examination - Objective IVB.Tech II Semester 1st Mid Examination - Objective
Branch: Computer Science and Engineering Branch: Computer Science and Engineering
Sub: CYBER SECURITY Date: 22-02-19 Sub: CYBER SECURITY Date: 22-02-19
Time: 20 mins Max.Marks:10 Time: 20 mins Max.Marks:10
============================================================= =============================================================
Answer all the following: Answer all the following:
Multiple choice questions: Multiple choice questions:
1) The most profitable uses of the information gained through a vishing attack 1The most profitable uses of the information gained through a vishing attack
include [ ] include [ ]
a)Identity theft b)purchasing luxury goods and services a)Identity theft b)purchasing luxury goods and services
c)transferring money/funds d)all of the above c)transferring money/funds d)all of the above
2) To hide information side a picture, what technology is used? [ ] 2) To hide information side a picture, what technology is used? [ ]
a)Root kits b)Bitmapping c)Steganography d)Image Rendering a)Root kits b)Bitmapping c)Steganography d)Image Rendering
3) The first phase of hacking an IT system is compromise of which foundation 3) The first phase of hacking an IT system is compromise of which foundation
of security? [ ] of security? [ ]
a) Availability b) Confidentiality c) Integrity d) Authentication a) Availability b) Confidentiality c) Integrity d) Authentication
4) What type of password attack would be most successful against the 4) What type of password attack would be most successful against the
password T63k#s23A? [ ] password T63k#s23A? [ ]
a) Dictionary b) Hybrid c) Password guessing d)Brute force a) Dictionary b) Hybrid c) Password guessing d)Brute force
5) Keyloggers are a form of ______________. [ ] 5) Keyloggers are a form of ______________. [ ]
a)spyware b) Shoulder surfing c) Trojan d) Social engineering a)spyware b) Shoulder surfing c) Trojan d) Social engineering
6) What is the most significant legal issue in computer forensics? [ ] 6) What is the most significant legal issue in computer forensics? [ ]
a) Preserving Evidence b) Seizing Evidence a) Preserving Evidence b) Seizing Evidence
c) Admissibility of Evidence d) Discovery of Evidence c) Admissibility of Evidence d) Discovery of Evidence
7) Bluetooth hacking tools [ ] 7) Bluetooth hacking tools [ ]
a) car whisperer b) Trojan horse c) trapdoor d) all of the above a) car whisperer b) Trojan horse c) trapdoor d) all of the above
8) The security of RAS system involves [ ] 8) The security of RAS system involves [ ]
a) server b) client c) data transmission d) all of the above a) server b) client c) data transmission d) all of the above
9) NIST stands for [ ] 9) NIST stands for [ ]
a)National industry of standards and technology a)National industry of standards and technology
b)National international of standards and technology b)National international of standards and technology
c)National internet of standards and technology c)National internet of standards and technology
d)National institute of standards and technology d)National institute of standards and technology
10) IMEI stands for [ ] 10) IMEI stands for [ ]
a)International mobile equipmental identity a)International mobile equipmental identity
b)International mobile equipments identity b)International mobile equipments identity
c)International mobile equipment identity c)International mobile equipment identity
d)International mobile equipmention identity d)International mobile equipmention identity
Fill in the blanks: Fill in the blanks:
11) The two components of security in mobile computing are ______________ 11) The two components of security in mobile computing are ______________
and ______________ and ______________
12) Computer Forensics is known as _______________________ approach to 12) Computer Forensics is known as _______________________ approach to
network and computer security. network and computer security.
13) The best defense against any type of sniffing is ________________ 13) The best defense against any type of sniffing is ________________
14) _______________ is the crime that involves a computer and a network. 14) _______________ is the crime that involves a computer and a network.
15) _____________ is where the information held on either the magnetic 15) _____________ is where the information held on either the magnetic
strip on the back of the credit card or the data stored on the smart chip are strip on the back of the credit card or the data stored on the smart chip are
copied from one card to another. copied from one card to another.

State True or False (T or F): State True or False (T or F):


16) The IMEI number is used by the GSM network to identify valid devices and 16) The IMEI number is used by the GSM network to identify valid devices and
therefore can be used to stop a stolen phone from accessing the network in therefore can be used to stop a stolen phone from accessing the network in
that country [ ] that country [ ]
17) Polymorphic virus modifies itself to avoid detection [ ] 17) Polymorphic virus modifies itself to avoid detection [ ]
18) To locate live systems ping sweep is used [ ] 18) To locate live systems ping sweep is used [ ]
19) Mishing attacks are attempted using mobile phone technology [ ] 19) Mishing attacks are attempted using mobile phone technology [ ]
20) Blue jacking is sending unsolicited messages over Bluetooth-enabled 20) Blue jacking is sending unsolicited messages over Bluetooth-enabled
devices such as mobile phones, PDA ‘s or computer with in 15m radius [ ] devices such as mobile phones, PDA ‘s or computer with in 15m radius [ ]
SET - 3 SET - 3
G.PULLAIAH COLLEGE OF ENGINEERING & TECHNOLOGY (AT) G.PULLAIAH COLLEGE OF ENGINEERING & TECHNOLOGY (AT)
IV B.Tech II Semester 1st Mid Examination - Objective IV B.Tech II Semester 1st Mid Examination - Objective
Branch: Computer Science and Engineering Branch: Computer Science and Engineering
Sub: CYBER SECURITY Date:22-02-19 Sub: CYBER SECURITY Date:22-02-19
Time: 20 mins Max.Marks:10 Time: 20 mins Max.Marks:10
============================================================= =============================================================
Answer all the following: Answer all the following:
Multiple choice questions: Multiple choice questions:
1) What is the most significant legal issue in computer forensics? [ ] 1) What is the most significant legal issue in computer forensics? [ ]
a) Preserving Evidence b) Seizing Evidence c) Admissibility of Evidence a) Preserving Evidence b) Seizing Evidence c) Admissibility of Evidence
d) Discovery of Evidence d) Discovery of Evidence
2) Keyloggers are a form of ______________. [ ] 2) Keyloggers are a form of ______________. [ ]
a)spyware b) Shoulder surfing c) Trojan d) Social engineering a)spyware b) Shoulder surfing c) Trojan d) Social engineering
3) What type of password attack would be most successful against the 3) What type of password attack would be most successful against the
password T63k#s23A? [ ] password T63k#s23A? [ ]
a) Dictionary b) Hybrid c) Password guessing d)Brute force a) Dictionary b) Hybrid c) Password guessing d)Brute force
4) The first phase of hacking an IT system is compromise of which foundation 4) The first phase of hacking an IT system is compromise of which foundation
of security? [ ] of security? [ ]
a) Availability b) Confidentiality c) Integrity d) Authentication a) Availability b) Confidentiality c) Integrity d) Authentication
5) To hide information side a picture, what technology is used? [ ] 5) To hide information side a picture, what technology is used? [ ]
a)Root kits b)Bitmapping c)Steganography d)Image Rendering a)Root kits b)Bitmapping c)Steganography d)Image Rendering
6) The most profitable uses of the information gained through a vishing attack 6) The most profitable uses of the information gained through a vishing attack
include [ ] include [ ]
a)Identity theft b)purchasing luxury goods and services a)Identity theft b)purchasing luxury goods and services
c)transferring money/funds d)all of the above c)transferring money/funds d)all of the above
7) IMEI stands for [ ] 7) IMEI stands for [ ]
a)International mobile equipmental identity a)International mobile equipmental identity
b)International mobile equipments identity b)International mobile equipments identity
c)International mobile equipment identity c)International mobile equipment identity
d)International mobile equipmention identity d)International mobile equipmention identity
8) NIST stands for [ ] 8) NIST stands for [ ]
a)National industry of standards and technology a)National industry of standards and technology
b)National international of standards and technology b)National international of standards and technology
c)National internet of standards and technology c)National internet of standards and technology
d)National institute of standards and technology d)National institute of standards and technology
9) The security of RAS system involves [ ] 9) The security of RAS system involves [ ]
a) server b) client c) data transmission d) all of the above a) server b) client c) data transmission d) all of the above
10) Bluetooth hacking tools [ ] 10) Bluetooth hacking tools [ ]
a) car whisperer b) Trojan horse c) trapdoor d) all of the above a) car whisperer b) Trojan horse c) trapdoor d) all of the above
Fill in the blanks: Fill in the blanks:
11) The best defense against any type of sniffing is ________________ 11) The best defense against any type of sniffing is ________________
12) Computer Forensics is known as _______________________ approach to 12) Computer Forensics is known as _______________________ approach to
network and computer security. network and computer security.
13) The two components of security in mobile computing are ______________ 13) The two components of security in mobile computing are ______________
and ______________ and ______________
14) _____________ is where the information held on either the magnetic 14) _____________ is where the information held on either the magnetic
strip on the back of the credit card or the data stored on the smart chip are strip on the back of the credit card or the data stored on the smart chip are
copied from one card to another. copied from one card to another.
15) _______________ is the crime that involves a computer and a network. 15) _______________ is the crime that involves a computer and a network.

State True or False (T or F): State True or False (T or F):


16) To locate live systems ping sweep is used [ ] 16) To locate live systems ping sweep is used [ ]
17) Polymorphic virus modifies itself to avoid detection [ ] 17) Polymorphic virus modifies itself to avoid detection [ ]
18) The IMEI number is used by the GSM network to identify valid devices and 18) The IMEI number is used by the GSM network to identify valid devices and
therefore can be used to stop a stolen phone from accessing the network in therefore can be used to stop a stolen phone from accessing the network in
that country [ ] that country [ ]
19) Blue jacking is sending unsolicited messages over Bluetooth-enabled 19) Blue jacking is sending unsolicited messages over Bluetooth-enabled
devices such as mobile phones, PDA ‘s or computer with in 15m radius [ ] devices such as mobile phones, PDA ‘s or computer with in 15m radius [ ]
20) Mishing attacks are attempted using mobile phone technology [ ] 20) Mishing attacks are attempted using mobile phone technology [ ]
SET - 4 SET - 4
G.PULLAIAH COLLEGE OF ENGINEERING & TECHNOLOGY (AT) G.PULLAIAH COLLEGE OF ENGINEERING & TECHNOLOGY (AT)
IV B.Tech II Semester 1st Mid Examination - Objective IV B.Tech II Semester 1st Mid Examination - Objective
Branch: Computer Science and Engineering Branch: Computer Science and Engineering
Sub: CYBER SECURITY Date: 22-02-19 Sub: CYBER SECURITY Date: 22-02-19
Time: 20 mins Max.Marks:10 Time: 20 mins Max.Marks:10
============================================================= =============================================================
Answer all the following: Answer all the following:
Multiple choice questions: Multiple choice questions:
1) What is the most significant legal issue in computer forensics? [ ] 1) What is the most significant legal issue in computer forensics? [ ]
a) Preserving Evidence b) Seizing Evidence c) Admissibility of Evidence a) Preserving Evidence b) Seizing Evidence c) Admissibility of Evidence
d) Discovery of Evidence d) Discovery of Evidence
2) Bluetooth hacking tools [ ] 2) Bluetooth hacking tools [ ]
a) car whisperer b) Trojan horse c) trapdoor d) all of the above a) car whisperer b) Trojan horse c) trapdoor d) all of the above
3) Keyloggers are a form of ______________. [ ] 3) Keyloggers are a form of ______________. [ ]
a)spyware b) Shoulder surfing c) Trojan d) Social engineering a)spyware b) Shoulder surfing c) Trojan d) Social engineering
4) The security of RAS system involves [ ] 4) The security of RAS system involves [ ]
a) server b) client c) data transmission d) all of the above a) server b) client c) data transmission d) all of the above
5) What type of password attack would be most successful against the 5) What type of password attack would be most successful against the
password T63k#s23A? [ ] password T63k#s23A? [ ]
a) Dictionary b) Hybrid c) Password guessing d)Brute force a) Dictionary b) Hybrid c) Password guessing d)Brute force
6) NIST stands for [ ] 6) NIST stands for [ ]
a)National industry of standards and technology a)National industry of standards and technology
b)National international of standards and technology b)National international of standards and technology
c)National internet of standards and technology c)National internet of standards and technology
d)National institute of standards and technology d)National institute of standards and technology
7) The first phase of hacking an IT system is compromise of which foundation 7) The first phase of hacking an IT system is compromise of which foundation
of security? [ ] of security? [ ]
a) Availability b) Confidentiality c) Integrity d) Authentication a) Availability b) Confidentiality c) Integrity d) Authentication
8) IMEI stands for [ ] 8) IMEI stands for [ ]
a)International mobile equipmental identity a)International mobile equipmental identity
b)International mobile equipments identity b)International mobile equipments identity
c)International mobile equipment identity c)International mobile equipment identity
d)International mobile equipmention identity d)International mobile equipmention identity
9) To hide information side a picture, what technology is used? [ ] 9) To hide information side a picture, what technology is used? [ ]
a)Root kits b)Bitmapping c)Steganography d)Image Rendering a)Root kits b)Bitmapping c)Steganography d)Image Rendering
10) The most profitable uses of the information gained through a vishing attack 10) The most profitable uses of the information gained through a vishing attack
include [ ] include [ ]
a)Identity theft b)purchasing laxury goods and services a)Identity theft b)purchasing laxury goods and services
c)transferring money/funds d)all of the above c)transferring money/funds d)all of the above
Fill in the blanks: Fill in the blanks:

11) The best defense against any type of sniffing is ________________ 11) The best defense against any type of sniffing is ________________
12) _______________ is the crime that involves a computer and a network. 12) _______________ is the crime that involves a computer and a network.
13) Computer Forensics is known as _______________________ approach to 13) Computer Forensics is known as _______________________ approach to
network and computer security. network and computer security.
14) _____________ is where the information held on either the magnetic 14) _____________ is where the information held on either the magnetic
strip on the back of the credit card or the data stored on the smart chip are strip on the back of the credit card or the data stored on the smart chip are
copied from one card to another. copied from one card to another.
15) The two components of security in mobile computing are ______________ 15) The two components of security in mobile computing are ______________
and ______________ and ______________

State True or False (T or F): State True or False (T or F):


16) To locate live systems ping sweep is used [ ] 16) To locate live systems ping sweep is used [ ]
17) Mishing attacks are attempted using mobile phone technology [ ] 17) Mishing attacks are attempted using mobile phone technology [ ]
18) Polymorphic virus modifies itself to avoid detection [ ] 18) Polymorphic virus modifies itself to avoid detection [ ]
19) Blue jacking is sending unsolicited messages over Bluetooth-enabled 19) Blue jacking is sending unsolicited messages over Bluetooth-enabled
devices such as mobile phones, PDA ‘s or computer with in 15m radius [ ] devices such as mobile phones, PDA ‘s or computer with in 15m radius [ ]
20) The IMEI number is used by the GSM network to identify valid devices and 20) The IMEI number is used by the GSM network to identify valid devices and
therefore can be used to stop a stolen phone from accessing the network in therefore can be used to stop a stolen phone from accessing the network in
that country [ ] that country [ ]

You might also like