CS/B.
TECH(N)/EVEN/SEM-8/8258/2023-2024/I036
MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, WEST BENGAL
Paper Code : OEC- CS801B/OECIT801B Cyber Law and Ethics
UPID : 008258
Time Allotted : 3 Hours Full Marks :70
The Figures in the margin indicate full marks.
Candidate are required to give their answers in their own words as far as practicable
Group-A (Very Short Answer Type Question)
1. Answer any ten of the following : [ 1 x 10 = 10 ]
(I) Who are White Hat Hackers?
(II) What are the ways to reset a password-protected BIOS configuration?
(III) How do you prevent identity theft?
(IV) ____________ means a person who has been granted a license to issue a electronic signature certificate.
(V) What do you mean by Cognitive Cybersecurity?
(VI) What are common cyber attacks?
(VII) What is data leakage?
(VIII) Data theft includes _______.
(IX) What is a Brute Force Attack? How can you prevent it?
(X) "DoS and DDoS are apply same strategy to attack the victim's system." Justify the truth of the statement.
(XI) Securing or attempting to secure access to a protected system in contravention of section 70 of the Information
Technology Act, as notified by the Government in the Official Gazette, is an offence where punishment may
extend up to 10 years and fine is __________________.
(XII) Digital Signature Certificate is ____________ requirement under various applications.
Group-B (Short Answer Type Question)
Answer any three of the following : [ 5 x 3 = 15 ]
2. What is the difference between Virus and Worms? Explain it. [5]
3. Explain IT Act in brief. [5]
4. Explain cyber space, cyber ethics and cyber crime. [5]
5. Elaborate in details how devices with active Bluetooth modules are vulnerable to attack. [5]
6. Explain in brief the concept of computer network intrusion with proper diagram and example. [5]
Group-C (Long Answer Type Question)
Answer any three of the following : [ 15 x 3 = 45 ]
7. What is objective of IT legislation in India? Explain IT Amendment Act 2008. [ 15 ]
8. (a) What is Traffic Flooding? Explain with details. [9]
(b) Explain the term Forgery with example. [6]
9. (a) Explain in details the concept of how attacks on mobile phones happen with appropriate diagram. [8]
(b) Explain ways to secure your cell/mobile phone date after it has been stolen/lost. Mention any pre- [7]
measure that should be taken to act in such scenarios.
10. What is SQL injection Attack? Explain in details how to prevent SQL Injection attacks? [ 15 ]
11. Explain various methods to prevent Credit Card Fraud in Mobile and Wireless Computing Era, with [ 15 ]
appropriate diagram and example.
*** END OF PAPER ***
1/1