0% found this document useful (0 votes)
271 views1 page

Bcc301 Cyber Security

Uploaded by

Amit Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
271 views1 page

Bcc301 Cyber Security

Uploaded by

Amit Yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Printed Page: 1 of 1

Subject Code: BCC301


0Roll No: 0 0 0 0 0 0 0 0 0 0 0 0 0

BTECH
(SEM III) THEORY EXAMINATION 2023-24
CYBER SECURITY
TIME: 3HRS M.MARKS: 70

Note: 1. Attempt all Sections. If require any missing data; then choose suitably.

SECTION A
1. Attempt all questions in brief.
Q no. Question Marks
a. Define Cyber Crime. 2
b. What is Bot net. 2
c. Why mobile needs security? 2
d. Define Authentication and Authorization. 2
e. What is virus and worms. 2
f. Explain digital evidence? 2
g. Why cyber is needed? 2
SECTION B
2. Attempt any three of the following:
90

2
a. Explain how the term ‘cybercrime’ originated. State few Cyber Crimes. 7

13
_2

b. Explain wireless devices with example. What are the security challenges faced by 7

2.
wireless devices?
P2

24
c. Explain 7 Tools used in Cyber Crime. 7
4D

5.
d. Explain Digital forensics life cycle. 7
e. What is the need of Information Security policy?
.5 7
P2

17
Q

|1

SECTION C
3. Attempt any one part of the following:
2 5

a. Who are Cyber Criminals? Classify Cybercrimes. 7


7:

b. What is the fuel for cybercrime. How may a criminal plan cybercrime? 7
:3

4. Attempt any one part of the following:


13

a. Explain the security measures and policies taken for mobile devices. 7
4

b. State some attacks on Mobile devices. What are the security implications for 7
02

organizations.
-2

5. Attempt any one part of the following:


03

a. What is Identity Theft. How it is done and how ID Theft can be handled? 7
2-

b. What is steganography. Explain in detail. 7


|1

6. Attempt any one part of the following:


a. What is Email. Explain how Email forensics can be done. 7
b. What are privacy threats? What are the challenges faced? 7
7. Attempt any one part of the following:
a. What is Cyber Law. State a few Cyber law in India. 7
b. Give a Overview of Intellectual Property related Legislation in India. 7

1|Page
QP24DP2_290 | 12-03-2024 13:37:25 | 117.55.242.132

You might also like