www.android.universityupdates.in | www.universityupdates.in | https://telegram.
me/vtuupdates
22ETC151/251
Model Question Paper-I/II with effect from 2022-23 (CBCS Scheme)
USN
First/Second Semester B.E. Degree Examination
Introduction to Cyber Security (22ETC151/251)
TIME: 03 Hours Max. Marks: 100
Note: Answer any FIVE full questions, choosing at least ONE question from each MODULE.
*Bloom’s
Module -1 Taxonomy Marks
Level
Q.01 a Define computer crime. Discuss about Cyberpunk and Cyber warfare L2 8
b List the various cybercrimes against property and against organization L1 6
c Discuss cybercrime and the Indian ITA 2000 L2 6
OR
Q.02 a Who are cybercriminals? Discuss the three groups of cybercriminals L3 8
b Discuss about Cyber defamation in detail. L3 6
c Explain password Sniffing and mail bombs techniques. L2 6
Module-2
Q. 03 a What is Social Engineering? Discuss Human Based Social Engineering with a L3 8
suitable example
b Explain how criminals plan the attacks? List the phases involved in planning L2 6
cyber crimes
c List and briefly explain any six tips for safety and security while using the L2 6
computers in a cybercafé
OR
Q.04 a Define Cyber Stalking along with its working. Explain two types of Stalkers L3 8
b Differentiate between passive attacks and active attacks L2 6
c Define Bot and Botnet. With a diagram, explain how Botnets create business? L3 6
Module-3
Q. 05 a What are hardware key loggers and Anti key loggers? List the advantages of L2 8
using anti loggers
b What is a Proxy server? What is its purpose? L2 6
Page 01 of 02
www.android.previousquestionpapers.com | www.previousquestionpapers.com | https://telegram.me/vtuupdates
www.android.universityupdates.in | www.universityupdates.in | https://telegram.me/vtuupdates
22ETC151/251
c What is a Backdoor? Discuss any four examples of Backdoor Trojans L2 6
OR
Q. 06 a Discuss various types of Viruses categorized based on attacks on various L3 8
elements of the system
b What is fishing? How fishing works? L3 6
c Discuss four types of DoS attacks L2 6
Module-4
Q. 07 a Explain four types of methods used by the phishers to reveal personal L2 10
information on Internet
b Discuss various types of Phishing Scams L3 10
OR
Q. 08 a Discuss the various techniques used by Phishers to launch Phishing attacks L3 10
b Discuss various types of Identity Theft techniques. L3 10
Module-5
Q. 09 a Discuss the following phases of Forensics life cycles
i) Preparation and Identification
ii) Collection and Recording
b List various Computer Forensics services available, explain any two of them. L2 6
c Briefly explain RFC2822 L2 4
OR
Q. 10 a Discuss the following phases of Forensics life cycle L2 10
i) Storing and Transporting
ii) Examination/Investigation
b Discuss the need for concept of Computer Forensics L3 6
c Briefly explain Network Forensics L2 4
*Bloom’s Taxonomy Level: Indicate as L1, L2, L3, L4, etc. It is also desirable to indicate the COs and POs to be
attained by every bit of questions.
Page 02 of 02
www.android.previousquestionpapers.com | www.previousquestionpapers.com | https://telegram.me/vtuupdates