0% found this document useful (0 votes)
189 views2 pages

Cyber Security MCQ Questions & Answers

This document contains instructions for a cyber security exam consisting of 3 sections with a total of 9 questions. Section A contains 10 short answer questions covering topics like SSL vs HTTPS, DDoS attacks, identity theft prevention, and wireless network security. Section B contains 4 longer questions about mitigating SQL injection, implementing telnet, cybercrime trends, and packet sniffing tools. Section C contains 2 essay questions regarding using traceroute to find network issues, responding to unauthorized mouse movement, using the three-way handshake in a DOS attack, and monitoring for malware and data breaches.

Uploaded by

orignole content
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
189 views2 pages

Cyber Security MCQ Questions & Answers

This document contains instructions for a cyber security exam consisting of 3 sections with a total of 9 questions. Section A contains 10 short answer questions covering topics like SSL vs HTTPS, DDoS attacks, identity theft prevention, and wireless network security. Section B contains 4 longer questions about mitigating SQL injection, implementing telnet, cybercrime trends, and packet sniffing tools. Section C contains 2 essay questions regarding using traceroute to find network issues, responding to unauthorized mouse movement, using the three-way handshake in a DOS attack, and monitoring for malware and data breaches.

Uploaded by

orignole content
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

AMRITSAR COLLEGE OF ENGINEERING & TECHNOLOGY, AMRITSAR

(AUTONOMOUS COLLEGE)

Roll No. ......................


Total No. of Questions: 09 Total No. of Pages: 02

B. Tech. (CSE) – 6th Sem.


CYBER SECURITY
ACIT-16501
Time: 03 Hours Maximum Marks: 60

Instruction to Candidates:
1) Section - A is Compulsory.
2) Attempt any Four questions from Section - B.
3) Attempt any Two questions from Section - C.
Section - A
Q1) (10 × 2 = 20)

I. SSL or HTTPS: Which is more secure?


II. Explain DDoS and its mitigation.
III. How can identity theft be prevented?
IV. Explain the tool that find the packet path.
V. How does Drive-by attack work?
VI. Write down the steps for creating LAN network and also tell the equipment’s required for
LAN network.
VII. What do you understand by Risk, Vulnerability & Threat in a network?
VIII. Give examples of non-physical threats.
IX. Define CSRF.
X. How do you protect your home wireless access point?

Section - B
(4× 5 = 20)
Q2) How can SQL injection be mitigated?
Q3) Write down the steps for implementation the concept of telnet.
Q4) Will cybercrime in the coming years affect hacker attacks aimed at technology devices of the
Internet of Things?
Q5) Explain five tools used for packet sniffing. Explain with example.
Q6) What would be the consequences for banks to fully inform banks' clients about cybercrime
attacks on electronic online banking systems?
1
Section C
(2× 10 = 20)
Q7) a. How would traceroute help you find out where a breakdown in communication is?
b. The mouse on your computer screen starts to move around on its own and click on things on your
desktop. What do you do?
Q8) a. How Three-way handshake be used to create a DOS attack?
b. What practices do you have in place to monitor and protect against suspicious malware,
Ransomware, and phishing activity?
Q9) a. A friend sends an electronic e-greeting card (e-card) to your work email. You need to click
on the attachment to see the card.
b. How will you detect an incident or data breach, and what steps do you take to prevent it
from happening?

You might also like