I
st2022t7183 Total Pages : 4
Sixth Semester
Information Technology
Scheme OCBC 2019
INFORMATION SECURITY AND CYBER LAW
Time : Three Hours Maximum Marks : 70
Note : i) All T Questions are Compulsory. Intemal choices has been
given in each LO (Leaming Outcome)
srfr 7 qaq 3rmtr 3{idkf,fr-@ rct-o ro (affir ens-cme)
tffuwtt
0 In case of any doubt or dispute, the English version question
shouldbe treated as final.
frrfr S non b {tr eTern fr-qrq fr fuft { eiNt qisr &
qeq o\ 3iftq qpal qr$rnr
a. LO Questions Marks
1. LOz Differentiate threat, vulnerability and risk. 5
qle, qdtRfrr8 ss fts ii oiffi ftfuir
5
b) Explain types of Cyber Security attacks.
sr{q{ g{e{r qI{ b q-qrn d HqflEtt
OR/3Telqr
5
a) Explain man in the Middle Attack.
C-qfiqfr.Bdeitoeq-flglr
5
b) CompareVirus andWorm
sEr{s qq sd fr gan fi&qr
7 LO4 a) Explainfollowing: 5
! Caesar Cipher
D PlayfairCipher
m) HillCipher
iv) Mono alphabetic Cipher
st2022t7r83 PTO,
T
lzl
a. IrO Questions Marks
fr..r fi qr$n$ :
D Ssr ftw
0 dhi frsq
trDFd fr'rq
iO qt+ ci-ffirnBn frw
b) Explain types of Transposition Technique. 5
R{fr oiil{ur iffi-.fto fi n6rs qrsr$t
oR/e{erqr
Discuss Encryption and Decryption. 5
qfuqq gq ffiqrq w qqf fiftql
b) Describe type of Steganography 5
ffi h q-qfl-{ o.r qsh ftfu}i
,,'
L04 a) IdentiS do's and don't oflnternet Security. 5
{d<id g-re{r il GidTfd rqr o-c<r srl< rqr q-S
b) SummarizelPsecurity. 5
IP gqe{T ffT rrR rqo frErtr
OR/3{EtTI
a) DefineVPN. 5
vPN s) qforTE-d frErtr
b) UseofFirewali. 5
Erqrcnei fi q*I frfuqr
4. LO7 a) DescribeE-rnailSpoofing. 5
{-fd qBrr or qufq fiffir
st2022t71,83 Contd.....
i3l
a. LO Questions Marks
* ''i'5
b) Describe: 5
, Trapdoor's
D botrets
EIff€il fifrqr
, wd{s
D efti{n
OR/3TETfl
5
a) ExplainIDS
IDS 6\ sq-flr{tr
5
b) Explain working principle of PGP.
PGP *' EFrd frdt< qqsrEsr
5
5. LO10 Dfferentiate between Penetation Testing and
Vulnerability Assessment.
tii$q affir q.i erffiftr& XqteE A
*q q<R wq ftFrlr
b) Discuss Ethical Hacking 5
qRrs-d tFtirr qs znf frRrSr
OR/3Te.rfl
5
OverviewofAltivirus.
qr&qtq-{s or 3rq-trqt{
5
b) Classify tlpes of Ethical I lackers.
fatu;{ q-fl-{ bqPro-d tffi{ eT sfif-d fifrr-ir
6. LO11 a) Discuss CyberCnme. 5
qr{eq ffigq w qqf frf;rcr
5
b) ExplainDefamation. i
qtc-diq1 n*rflr$r
st2fi2217183 P.T.O.
t4l
a. L/O Questions Marks
OR/3TE]ZTT
a) ExplainVshing. 5
frerrr a\ eq-flr$r
b) Relate identit, theft and Defamation. 5
3rT+fie e).rc G qtq-dlft { qtitr eqr tr
7. LO13 a) Describe ITAct2000. 5
IT Act 2000 ffi quh ftffir
b) Discuss Cyber forensic. 5
Hr-fl{ sttfro. q{ 4qf frffir
OR/CTel-{t
LOt4 a) Discuss Patent Law 5
t--e af qr rqf fiftqr
b) Describe Social Engineering attack in Cyber 5
Security.
ftf\=q q-{.n il e}arm ifuFrvftrr erdo
eqgjEll
-F€€_
s12022t7183