0% found this document useful (0 votes)
25 views3 pages

P22CS505 Cyber Model

Paper

Uploaded by

bharathraj01ja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views3 pages

P22CS505 Cyber Model

Paper

Uploaded by

bharathraj01ja
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

P.E.S.

College of Engineering, Mandya


(An Autonomous Institution affiliated to VTU, Belagavi)
Department of Computer Science and Engineering
Fifth Semester B.E (CS&E)
Model Question Paper
Cyber Security (P22CS505)

---------------------------------------------------------------------------------------------------------------------------------------------------------------
Note: i) Part – A is compulsory, One question from each unit
ii) Part – B: Answer any Two sub questions from each unit.
Q. No. Questions Marks Bloom’s Taxonomy

PART – A 10 BL CO PO
Unit – I to V

a List the purposes of hacking. 2 L2 1 1


b Define Cyber stalking. 2 L2 2 1

1 c List the classification of password cracking attacks. 2 L2 2 1


d List the typical elements addressed in a forensics investigation 2 L4 3 2
engagement contract
e What is Mobile Device Forensics? 2 L2 3 2
PART – B 90
Unit – I 18
a Define cyber crime. Explain different types of cyber criminals 9 L1,L2 1 1
2 b Classify cyber crime and give example for each. 9 L3 1 1
c Explain the legal perspectives and Indian perspective on cyber crime 9 L2 1 1
Unit - II 18
a Explain passive attack and active attack with examples. 9 L2 1 1

3 b What is social engineering? List and explain classification of social 9 L1,L2 2 1


engineering
c Explain few tips for safety and security while using the computer in cybercafé 9 L4 2 1
Unit - III 18
a Explain i) proxy servers and anonymizers ii) How phishing works? 9 L2 2 2
4 b Describe different ways of password cracking. 9 L3 2 2
c List and Explain different categories of virus 9 L1,L2 2 2
Unit – IV 18
a Explain the phases involved in forensics life cycle 9 L3 3 2
b List and Explain the key steps to be performed in solving computer L1,L4 3 2
5 9
forensics case
c Explain the steps involved in relevance of OSI 7 layer model to computer 9 L3 3 2
forensics
Unit – V 18
a Explain the different toolkits for handheld device forensics 9 L2 4 2
6 b Describe mobile phone evidence guide lines 9 L3 4 5
c Explain the key organizational guidelines on cell phone forensics 9 L4 4 5

*****
Note: Instructions to Paper Setter :

1. Part – A is compulsory and set ONE question from each unit. A student shall
answer for all questions for a max. of 10 marks.

2. From Part – B, set 3 sub questions for 9 mark each in all 5 units and a student
must answer any 2 sub questions for a max, of 18 marks from each unit.

3. From Part – B, in case of problematic question carry > 9 mark in any unit, set 2
sub questions for same marks & third one is compulsory (say in unit – II, 2a & 2b
are 14 mark each and 2c is for 4 mark), so that a student must answer 2a or 2b and
2c is compulsory.

4. From Part – B, in case of problematic question carry > 9 mark in any unit,
Choice will be given for question carries highest mark and lesser mark question is
compulsory.

You might also like