CYBER SECURITY (BCC301/BCC401/ BCC301H/BCC401H)
MOST IMPORTANT QUESTION
UNIT 1
Short Questions
Q1What do you Understand by the term “Cyber Crime”
Q2 Who are Cyber Criminals?
Q3 what is Cyber Security?
Q4Define Information Security?
Q5 what is attack vector?
Q6 Why Cyber Criminals prefer Cyber Café’s?
Long questions
Q1 Examine the term “Social Engineering “How Does
Social Engineering Work?
Q2 what is cyberstalking? Explain the types of
cyberstalking? Give some preventing measures from
cyberstalking.
Q3 Discuss about survival mantra for the Netizens?
Q4 what is cybercrime? Explain the classification
cybercrime?
Q5 How do cybercriminals perform attacks, and what are
some specific methods they use (example social
engineering, cyber stalking)
Q6 what is botnet? How botnet works? Explain the types
of botnet and types of botnet attack
Q7 what is cybercrime? Explain its classifications
Unit 2
Short questions
Q1 Examine the term “trends in mobility”
Q2 what is mobile viruses?
Long questions
Q1 Describe Proliferation of Mobile and Wireless devices.
Q2 Discuss about Credit Card frauds in Mobile and
Wireless computing?
Q3 Why Cyber Criminals attack on Mobile phones?
Q4 What are security challenges posed by mobile devices?
Q5 Explain the complete steps of registry setting of mobile
devices?
Q6 Explain the attacks on mobile
Unit 3
Short question
Q1 what is Proxy Servers and Anonymizers
Q2 what is key logger?
Q3 What is anti-key logger?
Q4 what is spyware?
Q5 what is Trojan horse?
Q6 What is Backdoor?
Q7 what is SQL injection?
Q8 what is identity theft?
Long questions
Q1 Discuss about DOS and DDOS Attacks?
Q2 what is phishing? explain the types of phishing?
Explain the working of phishing attack.
Q3 What is password cracking/sniffing? Name some
password- cracking tools & classification of password
attacks and guidelines?
Q4 What is virus? Write down the characteristics and its
types.
Q5 what is steganography? Explain the tools which helps
to perform the steganography process?
Q6 What do you mean by attacking on wireless networks
Q7 Explain theft of Internet Hours and Wi-Fi-based Frauds
and Misuses.
Unit 4
Short questions
Q1 What do you Understand by the term “Digital Forensics
Science”?
Q2 Identify chain of Custody Concept?
Q3 what is digital evidence?
Q4 what is network forensic?
Long Question
Q1 Explain the need of computer forensic?
Q2 How Digital Forensics Life Cycle Works?
Q3 How analysis of mail is done to find out some clue
which help to find out the criminal?
Or
What do you mean by Forensics Analysis of Email?
Q4 explain the challenges of computer forensic
Unit 5
Short question
Q1 Define Indian Cyber Law?
Q2 What is copyright?
Q3 What is patent?
Q4 What is trademark?
Long questions
Q1 What is information security? What is the need of the
information security?
Q2 What is cyber law? What is need of cyber law? what is
the Objective and scope of the Digital Personal Data
Protection Act 2023
Q3 Give the Overview of Intellectual Property related
legislation in India.
Q4 Explain some issues in intellectual property (IP)