0% found this document useful (0 votes)
54 views3 pages

Question Bank - Cybersecurity

The document is a question bank for a Cybersecurity course (CCS340) offered by the Department of Artificial Intelligence and Data Science. It outlines course outcomes, including understanding cybercrime, cyber attacks, and information gathering, and provides a series of questions categorized by Bloom's Taxonomy for assessment. The questions cover definitions, classifications, impacts, and tools related to cybersecurity and cybercrime.

Uploaded by

Jeffy Shiny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views3 pages

Question Bank - Cybersecurity

The document is a question bank for a Cybersecurity course (CCS340) offered by the Department of Artificial Intelligence and Data Science. It outlines course outcomes, including understanding cybercrime, cyber attacks, and information gathering, and provides a series of questions categorized by Bloom's Taxonomy for assessment. The questions cover definitions, classifications, impacts, and tools related to cybersecurity and cybercrime.

Uploaded by

Jeffy Shiny
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Department of Artificial Intelligence and Data Science

Question Bank

Semester/Year 03/III
Course Code&
CCS340& Cybersecurity
Course Title
Credits 3
Course Type Theory and Lab
Nature of the
Elective Course
Course

Course Outcomes (COs) BT


level
CO To learn cybercrime and cyberlaw. UN
1
CO To understand the cyber attacks and tools for mitigating them UN
2
CO To understand information gathering. UN
3
CL-Cognitive Level; R-Remember; Un-Understand; Ap-Apply; An-Analyze; Ev-Evaluate;
Cr-Create

2-Marks

Blooms Unit.
Sl.No Question CO
Taxonomy No
1. Define Cybersecurity? UN CO1 1

2. What is Cyberspace? UN CO1 1

3. Mention some of the positive impacts of Internet R CO1 1

4. Define CIA Triad UN CO1 1

5. What are the needs of cyber security? AN CO1 1

6. Define the term cybercriminals? UN CO1 1

7. Define Cyberlaw UN CO1 1

8. Define Hacktivism UN CO1 1

9. What do you mean by Indian IT ACT UN CO1 1

10. What are the reasons for cybercrimes AN CO1 1


11. Define Malicious software UN CO2 2
12. What are the categories of attack R CO2 2

13. Compare Brute force attacks and Dictionary attacks. EV CO2 2

14. What do you mean by Malicious attack. UN CO2 2

15. Compare Vulnerability,Threats and Attacks R CO2 2

16. Define Security breach. UN CO2 2

17. What do you mean by Social engineering attack UN CO2 2

18. Define active and passive attack. EV CO2 2

19. Define Countermeasures UN CO2 2


CO2 2
20. What is the responsible for Incident Response Team UN
21. Define Reconnaissance UN CO3 3
22. Explain the types of Reconnaissance R CO3 3

23. Define the term harvester UN CO3 3

24. Define NETCRAT UN CO3 3

25. Define NSLOOKUP UN CO3 3

13-Marks

Blooms
Unit.
Sl.No Question Taxonom CO
No
y
Define Cybersecurity and Explain the Layers of
1. UN CO1 1
Cybersecurity.
Explain the classification of cybercrimes and reasons of CO1 1
2. UN
cybercrimes in detail.
Briefly explain the positive impact and negative impact on CO1 1
3. UN
internet.
4. Explain CIA Triad in Detail. UN CO1 1

5. Explain the history of Internet. AN CO1 1

Define Wireless network attack and explain the types of


6. UN CO2 2
wireless network attack
Define Malicious attack and explain the types of malicious CO2 2
7. UN
attack.
Define web application attack and explain the types of CO2 2
8. UN
web application attack
Define Security breach and Explain the activities of CO2 2
9. UN
Security breach.
10. Explain Attack Tools and Common Attack Vectors R CO2 2
Explain the Reconnaissance tool : The Harvester and CO3 3
11. UN
WHOIS
12. Explain the Reconnaissance tool : NETCRAFT AND HOST UN CO3 3

13. Explain how to extract information from Email servers UN CO3 3

16-Marks

Blooms
Sl.N Unit.
Question Taxono CO
o No
my
1 Explain the global Perspective on Cybercrimes Un CO1 1
What are the key challenges and need for model approach in
2 UN CO1 1
cybercrime and punishment.
3 Explain OWASP in detail. UN CO2 2
Define Malicious attack and Explain all the types of
4 UN CO2 2
Malicious Attack
Explain briefly how to extract information from the DNS-
5 UN CO3 3
Domain Name System.

You might also like