Guru Nanak Institutions Technical Campus
(Autonomous)
Question Bank with Blooms Taxonomy Level (BTL)
Academic Year : 2021-22
Subject Name with code : FUNDAMENTALS OF CYBER SECURITY (18MC0CS02)
Class : III-CSE & III-ECE
Blooms Taxonomy Levels (BTL)
1. Remembering
2. Understanding
3. Applying
4. Analyzing
5. Evaluating
6. Creating
Sl. Questions BTL Course
No. (Select Questions from University question Bank and mention level Outcome
year in bracket or you may give own standard question with (new) (Please (Please
in bracket) mention mention
L1 or L2 CO1 or
or etc...) CO2
etc…)
Unit - I
Part – A (2 Marks )
1. Define Cyber Security. L-1 CO 1
2. Discuss about E-Mail Spoofing. L-2 CO 1
3. Describe Salami attack. L-2 CO 1
4. Define Cyber crime L-1 CO 1
5. Write short notes on online frauds. L-2 CO 1
6. What is Hacking? L-2 CO 1
7. List types of motives of attackers. L-1 CO 1
8. Define Spamming. L-1 CO 1
9. Explain about password sniffing. L-2 CO 1
10. What is forgery? L-2 CO 1
Part – B (5/7/10 Marks )
1 Discuss about the classification of cybercrimes. L-2 CO 1
2 Describe various types of attacks. L-2 CO 1
3 Describe the various types of activities of cyber criminals. L-2 CO 1
4 Illustrate CIA triad. L-3 CO 1
5 Explain cyber defamation. L-2 CO 1
6 Explain briefly about Computer sabotage and Software piracy. L-2 CO 1
7 Explain Computer network intrusions. L-2 CO 1
8 List the types of cyber threats and explain. L-1 CO 1
9 Explain who are called as computer criminals. L-2 CO 1
10 Discuss about hacking and types of hackers. L-2 CO 1
Unit – II
Part – A (2 Marks )
1. Explain the types of trends in mobility. L-2 CO 2
2. Define Phishing. L-1 CO 2
3. Describe the phases of attack on mobiles. L-2 CO 2
4. Write short notes on Vishing? L-2 CO 2
5. Explain the various tools and methods used in cyber crime. L-2 CO 2
6. Define Smishing. L-1 CO 2
7. Explain proliferation of mobile devices. L-2 CO 2
8. List the vulnerabilities of mobile. L-1 CO 2
9. Write about Mobile Viruses. L-2 CO 2
10. Explain proliferation of wireless devices. L-2 CO 2
Part – B (5/7/10/ Marks )
1 Explain about credit card frauds in mobile & wireless computing. L-2 CO 2
2 Describe the proliferation of mobile and wireless devices. L-2 CO 2
3 Demonstrate the security challenges posed by mobile devices. L-3 CO 2
4 Illustrate the Authentication service security in mobile computing? L-3 CO 2
5 Explain the different ways of password cracking? L-2 CO 2
6 Explain how to protect a mobile phone from being stolen. L-2 CO 2
7 Describe Do’s and Dont’s to prevent from credit card frauds. L-2 CO 2
8 Explain the common blue-tooth hacking techniques in detail. L-3 CO 2
9 Explain about Malicious code and Insider threats. L-2 CO 2
10 List common blue-tooth attack tools. Explain in detail. L-2 CO 2
Unit – III
Part – A (2 Marks )
1. Define cyber law. L-1 CO 3
2. Describe computer forensics L-2 CO 3
3. List the phases in computer forensics/digital forensics? L-1 CO 3
4. Explain about network forensics? L-2 CO 3
5. Define cyber forensics. L-2 CO 3
6. List the offences included in IT Act 2000. L-1 CO 3
7. Write a short note on section 70 ITA 2000. L-1 CO 3
8. Describe about computer trespassing. L-2 CO 3
9. Illustrate the methods of dealing with Spam. L-3 CO 3
10. Write a short note on section-73 ITA 2000. L-1 CO 3
Part – B (5/7/10 Marks )
1 Explain the digital forensics science? L-2 CO 3
2 Describe computer security laws of different countries. L-2 CO 3
3 Explain the need for computer forensics? L-2 CO 3
4 Explain the phases in computer forensics/digital forensics. L-2 CO 3
Illustrate the challenges to Indian law and cyber crime scenario in
5 L-3 CO 3
India.
6 Describe anti-spam laws in Canada. L-2 CO 3
7 Illustrate the weak areas of ITA 2000. L-3 CO 3
8 Briefly explain section 65 and 66 of ITA 2000 in detail. L-4 CO 3
9 Explain about Australian cyber crime act 2001. L-2 CO 3
10 Discuss about rules of digital evidence? L-2 CO 3
Unit – IV
Part – A (2 Marks )
1. Describe cyber terrorism. L-2 CO 4
2. Explain the different perils for organizations. L-2 CO 4
3. Explain about the web threats for organizations. L-2 CO 4
4. Describe Social media Marketing? L-2 CO 4
5. Discuss about the IPR. L-2 CO 4
Explain the security and privacy implications from cloud L-2 CO 4
6.
computing.
7. Discuss the ethical dimension of cybercrimes. L-2 CO 4
8. Describe IP based-blocking and IP based - Cloaking. L-2 CO 4
9. Define copyright and patent. L-1 CO 4
10. Describe Trademark and Trade Name. L-2 CO 4
Part – B (5/7/10/14 Marks )
What are different tools organization is using for social media
1 L-4 CO 4
marketing. Explain its risks.
Describe the different spheres of privacy scenarios in terms of user
2 L-2 CO 4
spheres.
Illustrate the precautive measures to be taken during social media
3 L-3 CO 4
marketing?
4 Explain in detail about the IPR issues? L-2 CO 4
5 Demonstrate the ethical dimension of cyber crime. L-3 CO 4
What is an insider threat? Explain Heartland payment system
6 L-2 CO 4
fraud and blue shield blue cross attack.
Explain cost of cyber crimes and consequences associated cyber
7 L-2 CO 4
security incidents?
What is “Web 2.0”? Explain social computing and the associated
8 L-2 CO 4
challenges for organizations.
Who are Hackers? What are the different levels of hackers?
9 L-2 CO 4
Explain generations of hackers.
10 Explain about the Intellectual property in cyberspace. L-2 CO 4
Unit – V
Part – A (2 Marks )
1 Describe online gambling. L-2 CO 5
2 List the basic types of financial fraud in businesses. L-1 CO 5
3 Explain about the Indian bank lose millions of rupees. L-2 CO 5
Explain the mini case of an Indian Case of Intellectual Property L-2 CO 5
4
Crime.
5 Define IPR Violation. L-2 CO 5
6 Give an example of an E-mail spoofing instance. L-1 CO 5
7 Define Confidentiality and privacy. L-1 CO 5
8 Explain briefly about phishing incidence. L-2 CO 5
9 Explain briefly shadow crew- the internet mafia gang. L-2 CO 5
10 Describe briefly pune city police bust nigerian racket. L-2 CO 5
Part – B (5/7/10/14 Marks )
Illustrate the case study of “official website of Maharashtra
1 L-3 CO 5
Government Hacked”.
2 Illustrate the case study of “Parliament Attack”. L-3 CO 5
3 Explain in brief about credit card related frauds. L-2 CO 5
Demonstrate E-mail spoofing instances with any one appropriate
4 L-2 CO 5
example.
5 Illustrate the mini-case of “Pune City Police bust Nigerian Racket. L-3 CO 5
Illustrate the incident of cybercrime happened on Indian bank lose
6 L-2 CO 5
millions of rupees.
What do you found on the cyber crime of Indian Case of online
7 L-2 CO 5
Gambling.
8 Explain the mini case of Financial Frauds in Cyber Domain. L-4 CO 5
9 Illustrate Phishing incidence of financial frauds. L-3 CO 5
L-2
10 Describe about Online credit card theft ring. CO 5