0% found this document useful (0 votes)
11 views4 pages

Cyber Security Cse 2a - 2B - Me Put Paper Sanjeev Singh

pree university test

Uploaded by

jaipratapdixit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views4 pages

Cyber Security Cse 2a - 2B - Me Put Paper Sanjeev Singh

pree university test

Uploaded by

jaipratapdixit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Roll No.

-
Rr
R.R. INSTITUTE OF MODERN TECHNOLOGY
NH-24, Bakshi Ka Talab, Sitapur Road, Lucknow, Uttar Pradesh, 226201

Pre-UniversityExamination
(Odd Semester, Session: 2024 - 2025)
Subject Name: Cyber Security Subject Code: BCC301
Branch: CSE2A/CSE2B/ME Semester: III
Set: A
[Time:03:00Hrs.] [Total Marks: 70]
Level of
Course
Statement of Course Outcome Bloom's
Outcome
Taxonomy
CO1
Understand the basic concepts of cyber security and cybercrimes. K1,K2
CO 2
Understand the security policies and cyber laws. K1,K2
CO 3
Understand the tools and methods used in cyber crime K2
CO 4
Understand the concepts of cyber forensics K1,K2

CO 5 Understand the cyber security policies and cyber laws K2


K1-Remembaring, K2-Understanding, K3-Applying, K4-Analyzing, K5-Evaluating, K6-Creating
SECTION: A
Q.1.Attempt all questions in brief. All parts carry equal marks. (2x7 = 14)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a Define Cyber Security and explain its significance in the digital era. CO-1 K1
b List the various types of cybercrimes with examples. CO-1 K1
c What is the purpose of cyber security policies in an organization? CO-2 K1
d What is proxy server; explain types of proxy server? CO-3 K2
e What are the key components of cyber forensics? CO-4 K1

f Explain the importance of international cyber laws. CO-5 K1

g What are the rights of individuals and organization under Indian cyber law? CO-5 K1
SECTION:B
Q.2.Attempt any three questions from this section.(7x3 =21)
Course Level of
Part Question Outcom Bloom's
e Taxonomy
Describe the term "Botnets" and explain their role in cybercrimes. Additionally,
a CO-1 K2
discuss how attackers use social engineering techniques to exploit victims.
b Write security implications for organization for mobile devices. CO-2 K2
c Discuss the use of firewalls and intrusion detection systems in cyber security. CO-3 K2

d What are the steps involved in a cyber forensics’ investigation? CO-4 K2

e What is patent; explain key elements of patent. CO-5 K2


Roll No.-
Rr
R.R. INSTITUTE OF MODERN TECHNOLOGY
NH-24, Bakshi Ka Talab, Sitapur Road, Lucknow, Uttar Pradesh, 226201

SECTION:C
Note: Attempt all questions.

Q.3.Attempt any one part of the following: (7x1 = 7)


Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a Define phishing and explain how to protect against it. CO-1 K2

b What is ransomware? Discuss a recent example of a ransomware attack. CO-1 K2

Q.4.Attempt any one part of the following: (7x1 = 7)


Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a Highlight the role of security audits in organizational policies CO-2 K2
What is mobile phone theft; how to protect a mobile phone from being
b CO-2 K2
stolen?

Q.5.Attempt any one part of the following: (7x1 = 7)


Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a What is proxy server; explain all types of proxy server? CO-3 K2
Describe the differences between black-hat and white-hat hackers with
b CO-3 K2
examples.

Q.6 Attempt any one part of the following: (7x1 = 7)


Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a Discuss the process of retrieving deleted data as part of cyber forensics. CO-4 K2
b Explain how digital evidence is preserved in a forensic investigation. CO-4 K2

Q.7 Attempt any one part of the following: (7x1 = 7)


Level of
Course
Part Question Bloom's
Outcome
Taxonomy
Analyze the importance of cyber security awareness training for
a CO-5 K2
employees.
b What are the key differences between data protection and data privacy? CO-5 K2
Roll No.-
Rr
R.R. INSTITUTE OF MODERN TECHNOLOGY
NH-24, Bakshi Ka Talab, Sitapur Road, Lucknow, Uttar Pradesh, 226201

Pre-University Examination
(Odd Semester, Session: 2024 - 2025)
Subject Name: Cyber Security Subject Code: BCC301
Branch: CSE2A/CSE2B/ME Semester: III
Set: B
[Time: 03:00Hrs.] [Total Marks: 70]
Level of
Course
Statement of Course Outcome Bloom's
Outcome
Taxonomy
CO1
Understand the basic concepts of cyber security and cybercrimes. K1, K2
CO 2
Understand the security policies and cyber laws. K1, K2
CO 3
Understand the tools and methods used in cyber crime K2
CO 4
Understand the concepts of cyber forensics K1, K2

CO 5 Understand the cyber security policies and cyber laws K2

K1-Remembaring, K2-Understanding, K3-Applying, K4-Analyzing, K5-Evaluating, K6-Creating

SECTION: A
Q.1.Attempt all questions in brief. All parts carry equal marks. (2x7 = 14)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a What is Cyber Security? How does it protect digital assets? CO-1 K1
b Explain the importance of regular software updates in cyber security CO-1 K1
c Write a steps to protect data in lost devices. CO-2 K1
d Discuss any two tools used to analyze malware in cybercrime cases. CO-3 K2
e What is the role of chain of custody in cyber forensics? CO-4 K1
f Summarize the significance of cyber laws in ensuring digital rights. CO-5 K2
g Explain the importance of the IT Act, 2000, in India's cyber laws. CO-5 K2
SECTION:-B
Q.2.Attempt any three questions from this section. (7x3 =21)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a Explain the concept of risk management in cyber security. CO-1 K2
b What are the key objectives of a cyber security policy? CO-2 K2
What is phishing, write characteristics of phishing and types of phishing
c CO-3 K2
attacks?
d What is digital forensics, and write working of digital forensics science? CO-4 K2
e What is digital data protection act (2023), and explain its objective? CO-5 K2
Roll No.-
Rr
R.R. INSTITUTE OF MODERN TECHNOLOGY
NH-24, Bakshi Ka Talab, Sitapur Road, Lucknow, Uttar Pradesh, 226201

SECTION:C
Note: Attempt all questions.

Q.3.Attempt any one part of the following: (7x1 = 7)


Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a What is cybercrime, explain the classification of cybercrimes? CO-1 K2

b Explain the key aspects in cybercrimes from a global perspective? CO-1 K2

Q.4.Attempt any one part of the following: (7x1 = 7)


Level of
Course
Part Question Bloom's
Outcome
Taxonomy
Explain the organizational security policies and measures in mobile
a CO-2 K2
computing era.
b What are security challenges posed by mobile devices? CO-2 K2

Q.5.Attempt any one part of the following: (7x1 = 7)


Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a What is password cracking; explain all types of password cracking? CO-3 K2

b What is key loggers, explain all types of key loggers? CO-3 K2

Q.6 Attempt any one part of the following: (7x1 = 7)


Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a What is the need for computer forensics? CO-4 K2
Explain digital forensics life cycle.
b CO-4 K2

Q.7 Attempt any one part of the following: (7x1 = 7)


Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a What is copyright infringement, explain key elements of copyright? CO-5 K2

b Explain Intellectual property related legislation in India. CO-5 K2

You might also like