AMRITSAR COLLEGE OF ENGINEERING & TECHNOLOGY, AMRITSAR
(AUTONOMOUS COLLEGE)
Roll No. ......................
Total No. of Questions: 09 Total No. of Pages: 02
B. Tech. (CSE) – 6th Sem.
CYBER SECURITY
ACIT-16501
Time: 03 Hours Maximum Marks: 60
Instruction to Candidates:
1) Section - A is Compulsory.
2) Attempt any Four questions from Section - B.
3) Attempt any Two questions from Section - C.
Section - A
Q1) (10 × 2 = 20)
I. SSL or HTTPS: Which is more secure?
II. Explain DDoS and its mitigation.
III. How can identity theft be prevented?
IV. Explain the tool that find the packet path.
V. How does Drive-by attack work?
VI. Write down the steps for creating LAN network and also tell the equipment’s required for
LAN network.
VII. What do you understand by Risk, Vulnerability & Threat in a network?
VIII. Give examples of non-physical threats.
IX. Define CSRF.
X. How do you protect your home wireless access point?
Section - B
(4× 5 = 20)
Q2) How can SQL injection be mitigated?
Q3) Write down the steps for implementation the concept of telnet.
Q4) Will cybercrime in the coming years affect hacker attacks aimed at technology devices of the
Internet of Things?
Q5) Explain five tools used for packet sniffing. Explain with example.
Q6) What would be the consequences for banks to fully inform banks' clients about cybercrime
attacks on electronic online banking systems?
1
Section C
(2× 10 = 20)
Q7) a. How would traceroute help you find out where a breakdown in communication is?
b. The mouse on your computer screen starts to move around on its own and click on things on your
desktop. What do you do?
Q8) a. How Three-way handshake be used to create a DOS attack?
b. What practices do you have in place to monitor and protect against suspicious malware,
Ransomware, and phishing activity?
Q9) a. A friend sends an electronic e-greeting card (e-card) to your work email. You need to click
on the attachment to see the card.
b. How will you detect an incident or data breach, and what steps do you take to prevent it
from happening?