Roll No.
-
Rr
R.R. INSTITUTE OF MODERN TECHNOLOGY
NH-24, Bakshi Ka Talab, Sitapur Road, Lucknow, Uttar Pradesh, 226201
Pre-UniversityExamination
(Odd Semester, Session: 2024 - 2025)
Subject Name: Cyber Security Subject Code: BCC301
Branch: CSE2A/CSE2B/ME Semester: III
Set: A
[Time:03:00Hrs.] [Total Marks: 70]
Level of
Course
Statement of Course Outcome Bloom's
Outcome
Taxonomy
CO1
Understand the basic concepts of cyber security and cybercrimes. K1,K2
CO 2
Understand the security policies and cyber laws. K1,K2
CO 3
Understand the tools and methods used in cyber crime K2
CO 4
Understand the concepts of cyber forensics K1,K2
CO 5 Understand the cyber security policies and cyber laws K2
K1-Remembaring, K2-Understanding, K3-Applying, K4-Analyzing, K5-Evaluating, K6-Creating
SECTION: A
Q.1.Attempt all questions in brief. All parts carry equal marks. (2x7 = 14)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a Define Cyber Security and explain its significance in the digital era. CO-1 K1
b List the various types of cybercrimes with examples. CO-1 K1
c What is the purpose of cyber security policies in an organization? CO-2 K1
d What is proxy server; explain types of proxy server? CO-3 K2
e What are the key components of cyber forensics? CO-4 K1
f Explain the importance of international cyber laws. CO-5 K1
g What are the rights of individuals and organization under Indian cyber law? CO-5 K1
SECTION:B
Q.2.Attempt any three questions from this section.(7x3 =21)
Course Level of
Part Question Outcom Bloom's
e Taxonomy
Describe the term "Botnets" and explain their role in cybercrimes. Additionally,
a CO-1 K2
discuss how attackers use social engineering techniques to exploit victims.
b Write security implications for organization for mobile devices. CO-2 K2
c Discuss the use of firewalls and intrusion detection systems in cyber security. CO-3 K2
d What are the steps involved in a cyber forensics’ investigation? CO-4 K2
e What is patent; explain key elements of patent. CO-5 K2
Roll No.-
Rr
R.R. INSTITUTE OF MODERN TECHNOLOGY
NH-24, Bakshi Ka Talab, Sitapur Road, Lucknow, Uttar Pradesh, 226201
SECTION:C
Note: Attempt all questions.
Q.3.Attempt any one part of the following: (7x1 = 7)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a Define phishing and explain how to protect against it. CO-1 K2
b What is ransomware? Discuss a recent example of a ransomware attack. CO-1 K2
Q.4.Attempt any one part of the following: (7x1 = 7)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a Highlight the role of security audits in organizational policies CO-2 K2
What is mobile phone theft; how to protect a mobile phone from being
b CO-2 K2
stolen?
Q.5.Attempt any one part of the following: (7x1 = 7)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a What is proxy server; explain all types of proxy server? CO-3 K2
Describe the differences between black-hat and white-hat hackers with
b CO-3 K2
examples.
Q.6 Attempt any one part of the following: (7x1 = 7)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a Discuss the process of retrieving deleted data as part of cyber forensics. CO-4 K2
b Explain how digital evidence is preserved in a forensic investigation. CO-4 K2
Q.7 Attempt any one part of the following: (7x1 = 7)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
Analyze the importance of cyber security awareness training for
a CO-5 K2
employees.
b What are the key differences between data protection and data privacy? CO-5 K2
Roll No.-
Rr
R.R. INSTITUTE OF MODERN TECHNOLOGY
NH-24, Bakshi Ka Talab, Sitapur Road, Lucknow, Uttar Pradesh, 226201
Pre-University Examination
(Odd Semester, Session: 2024 - 2025)
Subject Name: Cyber Security Subject Code: BCC301
Branch: CSE2A/CSE2B/ME Semester: III
Set: B
[Time: 03:00Hrs.] [Total Marks: 70]
Level of
Course
Statement of Course Outcome Bloom's
Outcome
Taxonomy
CO1
Understand the basic concepts of cyber security and cybercrimes. K1, K2
CO 2
Understand the security policies and cyber laws. K1, K2
CO 3
Understand the tools and methods used in cyber crime K2
CO 4
Understand the concepts of cyber forensics K1, K2
CO 5 Understand the cyber security policies and cyber laws K2
K1-Remembaring, K2-Understanding, K3-Applying, K4-Analyzing, K5-Evaluating, K6-Creating
SECTION: A
Q.1.Attempt all questions in brief. All parts carry equal marks. (2x7 = 14)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a What is Cyber Security? How does it protect digital assets? CO-1 K1
b Explain the importance of regular software updates in cyber security CO-1 K1
c Write a steps to protect data in lost devices. CO-2 K1
d Discuss any two tools used to analyze malware in cybercrime cases. CO-3 K2
e What is the role of chain of custody in cyber forensics? CO-4 K1
f Summarize the significance of cyber laws in ensuring digital rights. CO-5 K2
g Explain the importance of the IT Act, 2000, in India's cyber laws. CO-5 K2
SECTION:-B
Q.2.Attempt any three questions from this section. (7x3 =21)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a Explain the concept of risk management in cyber security. CO-1 K2
b What are the key objectives of a cyber security policy? CO-2 K2
What is phishing, write characteristics of phishing and types of phishing
c CO-3 K2
attacks?
d What is digital forensics, and write working of digital forensics science? CO-4 K2
e What is digital data protection act (2023), and explain its objective? CO-5 K2
Roll No.-
Rr
R.R. INSTITUTE OF MODERN TECHNOLOGY
NH-24, Bakshi Ka Talab, Sitapur Road, Lucknow, Uttar Pradesh, 226201
SECTION:C
Note: Attempt all questions.
Q.3.Attempt any one part of the following: (7x1 = 7)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a What is cybercrime, explain the classification of cybercrimes? CO-1 K2
b Explain the key aspects in cybercrimes from a global perspective? CO-1 K2
Q.4.Attempt any one part of the following: (7x1 = 7)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
Explain the organizational security policies and measures in mobile
a CO-2 K2
computing era.
b What are security challenges posed by mobile devices? CO-2 K2
Q.5.Attempt any one part of the following: (7x1 = 7)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a What is password cracking; explain all types of password cracking? CO-3 K2
b What is key loggers, explain all types of key loggers? CO-3 K2
Q.6 Attempt any one part of the following: (7x1 = 7)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a What is the need for computer forensics? CO-4 K2
Explain digital forensics life cycle.
b CO-4 K2
Q.7 Attempt any one part of the following: (7x1 = 7)
Level of
Course
Part Question Bloom's
Outcome
Taxonomy
a What is copyright infringement, explain key elements of copyright? CO-5 K2
b Explain Intellectual property related legislation in India. CO-5 K2