COPYRIGHT RESERVED
Code : 105713
B.Tech 7th Semester Exam., 2021
(New Course )
CYBER SECURITY
Time : 3 hours Full Marks : 70
Instructions :
() The marks are indicated in the right-hand margin.
(i) There are NINE questions in this paper.
(üi) Attempt FIVE questions in all.
(iu) Question No. 1 is compulsory.
1, Ch00se the correct answer from any seven of
the following: 2x7=14
(a) An attempt to harm, damage or cause
threat to a system or network is
broadly termed as
() cyber crime
(i) cyber attack
(iti) system hijacking
(iv) digital crime
22AK/428 (Turn Over )
(2 ) (3 )
(b) Which one of the following algorithms is
not used (d) What are the elements of cyber security?
in asymmetric key
cryptography? () Network security
() RSA algorithm (i) Operational security
(iü) Diffie-Hellman algorithm (tti) Application security
Siti) Electronic code book algorithm (iv) Al of the above
(iv) DSA algorithm
What is unauthorized movement of
le)
data?
(c) A Trojan horse is
() Data cracking
program that performs ü) Data exfiltration
legitimate function that is known to
an operating system or its user and (iii) Data infiltration
also has a hidden component that
can be used forr (iv) Database hacking
nefarious puposes
like attacks on message security or
impersonation
Related to information security,
(i) a program that spreads to other confidentiality is the opposite of which
computer systems by exploiting of the following?
security holes like weaknesses in
facilities for creation of remote (i) Closure
processes
(i Disclosure
(iü) All of the above
(iii) Disaster
(iv) None of the above
(iv) Disposal
22AK/428 (Turm Over )
(Continued ) 22AK/428
(5 )
Which of the following is a proper Which of the following is not a type of
(a) acquisition technique? peer-to-peer cyber cTime?
() Disk to image (i) MITM
(i) Disk to disk (ti) Injecting Trojans to a target victim
(i) Sparse acquisition (i), Credit card details leak in the.deep
web
(iv) All of the above
(iv) Phishing
easier
() Traditional crimes that became of 2- (a) Differentiate between vulnerability,
Or more widespread because threat and attack with the use of
telecommunication networks and 7
PCs inchude all of the suitable examples for each.
powerful
following, except Explain with the help of example the
information gathering (social engi
) money laundering neering, footprinting and scanning). 7
(i) ilegal drug distribution
3. Describe some working of the following tools
(iii) DoS attacks with the help of exarmples : 14
(iv) child pornography (a) Nmap
(b) Zenmap
When a forensic copy is made, in what (c) Port scanner
format are the contents of the hard
drive stored? how a man-in-the-middle
4. (a) Describe
() As bootable files attack may be performed on a Wi-Fi
network and the consequences of such
As executable files an attack. 7
(iii) As operating system files (b) Describe how a one-way hash function
7
(iv) As may be used for message authentication.
compressed images
(Turn Over )
22AK/428 (Continued ) 22AK/428
6) (7)
5. "Having proper employee hiring practices, 3. You get a call from a high school student
security clearance and employee termination named Mohan who claims he has just
received an e-mail from another student
practices can enhance the security of the IT
infrastructure of a company and its threatening to commit suicide. Mohan isn't
information." Sure where the student sent the e-mail from.
Do you agree with this statement? Justify Write a brief report on how you should
your answer by explaining why the statement proceed, including what you should do first
in this situation. |4
is correct or incorrect 14
6. (a) Explain the security threats raised by 14
remote user authentication and propose 9. Write short notes on the following :
a method to counter such threats. 7 Aa) Mobile and loT security
(b) Differentiate between
Access Control (DAC) andDiscretionary
(b) Types of malwares
Mandatory Open Web Application Security Project
Access Control (MAC). (c)
(OWASP)
7 Shivi loves old Hindi movie songs and has a
(d) DDoS attacks
large collection of such songs which she wants
to share with anyone who is interested. She
comes up with the idea of converting the
songs into MP3 formnat and putting up a
website where she will list the titles of the
songs. Each user can then request her for
specific songls) which he wants. Shivi can
then specifically permit copying of that song to
the user's hard disk. Shivi approaches
Shivesh who agrees to develop the software
and host the website to execute the idea. Do
Shivi and Shivesh have any legal liability if
they implement this idea? Discuss. If this not
legal liability, then define the name of
computer crime happen. This crime is come
under in which cyber law section? 14
22AK--770/428 Code : 105713
22AK/428 (Continued )