CS/B.
TECH(N)/ODD/SEM-7 /2022-2023
MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, WEST BENGAL
t
tech
PaperCode: PEC-CS702E Cyber Security
Full Marks :70
TimeAllotted: 3 Hours
The Figures in the margin indicate full marks.
Candidate are required to give their answers in their own words as lar as practicable
Group-A (Very Short Answer Type Question)
1. Answer any ten of the following: [1x 10= 10]
(0 Cyberspace" was coined by.
( Which is the oldest techniques used by hackers for phone hacking to make free calls?
(I1) An attempt to steal, spy, damage or destroy computer systems, networks, or their associated information is known as
(IV) The Code Red is a sort of a.
( Give an example of physical hacking.
(What is the existence ofweakness in a system or network is known as?
M Which independent type of malicious program does not require any host program?
(VID What are
Trojan-Horse programs?
() When there is an excessive amount of data flow, which the system cannot handle, .
attack takes place.
(X) A can be a hardware device or a software program that fiters all the packets of data that comes through
a network, the internet, etc.
X) The Hacker who did break the SIPRNET system is _
(Xu) A cyber-criminal or penetration tester uses the additional data that stores certain
special instructions in the memory for
activities to break the system. Name the type of attack.
Group-6 (Short Ariswer Type Question)
Answer any three of the following
[5x3 151
2. Discuss Security Architecture.
3.
[5]
Mention the difference between symmetric and asymmetric encryption. [5]
4. Write the steps to analyze the E-Mail Application'ssecurity vulnerabilities. 5]
5. What is a response code? List them.
6.
5]
Discuss matrix mining.
[5]
Group-C (Long Answer Type Question)
Answer any three of the following9
15x3 -45]
7. With diagram, explain handshake protocol action. Explain SSL
a
8.
protocol stack. 10+51
Discuss security policy database.With a neat diagram, explain traffic
9.
ip processing. +10
Explain the diferent Threats to Information
10.
System? What do you mean by Information Assurance ? 10+5]
What do you mean by packet
filtering in Firewall? Explain Firewall and working of Firewal?
take Backup? Explain the need to 4*5+6
11. Elaborate: "Cyber crime play a vital role against person
information and rights". property and govt. to protect all valuable [ 15]
***
END OF PAPER ***
1/1