0% found this document useful (0 votes)
89 views1 page

Cyber Law and Ethics - 8258 - 48820 - I036

This document is an examination paper for the Cyber Law and Ethics course at Maulana Abul Kalam Azad University of Technology, West Bengal. It includes various types of questions, such as very short answer, short answer, and long answer questions, covering topics like cyber attacks, IT legislation, and methods to prevent cyber crimes. The total marks for the exam are 70, and candidates are required to answer in their own words.

Uploaded by

Reshmi Maulik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views1 page

Cyber Law and Ethics - 8258 - 48820 - I036

This document is an examination paper for the Cyber Law and Ethics course at Maulana Abul Kalam Azad University of Technology, West Bengal. It includes various types of questions, such as very short answer, short answer, and long answer questions, covering topics like cyber attacks, IT legislation, and methods to prevent cyber crimes. The total marks for the exam are 70, and candidates are required to answer in their own words.

Uploaded by

Reshmi Maulik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CS/B.

TECH(N)/EVEN/SEM-8/8258/2023-2024/I036
MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, WEST BENGAL
Paper Code : OEC- CS801B/OECIT801B Cyber Law and Ethics
UPID : 008258

Time Allotted : 3 Hours Full Marks :70


The Figures in the margin indicate full marks.
Candidate are required to give their answers in their own words as far as practicable

Group-A (Very Short Answer Type Question)


1. Answer any ten of the following : [ 1 x 10 = 10 ]
(I) Who are White Hat Hackers?
(II) What are the ways to reset a password-protected BIOS configuration?
(III) How do you prevent identity theft?
(IV) ____________ means a person who has been granted a license to issue a electronic signature certificate.
(V) What do you mean by Cognitive Cybersecurity?
(VI) What are common cyber attacks?
(VII) What is data leakage?
(VIII) Data theft includes _______.
(IX) What is a Brute Force Attack? How can you prevent it?
(X) "DoS and DDoS are apply same strategy to attack the victim's system." Justify the truth of the statement.
(XI) Securing or attempting to secure access to a protected system in contravention of section 70 of the Information
Technology Act, as notified by the Government in the Official Gazette, is an offence where punishment may
extend up to 10 years and fine is __________________.
(XII) Digital Signature Certificate is ____________ requirement under various applications.

Group-B (Short Answer Type Question)


Answer any three of the following : [ 5 x 3 = 15 ]
2. What is the difference between Virus and Worms? Explain it. [5]
3. Explain IT Act in brief. [5]
4. Explain cyber space, cyber ethics and cyber crime. [5]
5. Elaborate in details how devices with active Bluetooth modules are vulnerable to attack. [5]
6. Explain in brief the concept of computer network intrusion with proper diagram and example. [5]

Group-C (Long Answer Type Question)


Answer any three of the following : [ 15 x 3 = 45 ]
7. What is objective of IT legislation in India? Explain IT Amendment Act 2008. [ 15 ]
8. (a) What is Traffic Flooding? Explain with details. [9]
(b) Explain the term Forgery with example. [6]
9. (a) Explain in details the concept of how attacks on mobile phones happen with appropriate diagram. [8]
(b) Explain ways to secure your cell/mobile phone date after it has been stolen/lost. Mention any pre- [7]
measure that should be taken to act in such scenarios.
10. What is SQL injection Attack? Explain in details how to prevent SQL Injection attacks? [ 15 ]
11. Explain various methods to prevent Credit Card Fraud in Mobile and Wireless Computing Era, with [ 15 ]
appropriate diagram and example.

*** END OF PAPER ***

1/1

You might also like