Rol No.
HSC Uy23044
Amrita Vishwa Vidyapcetham
Amrita School of Computing, Chennai
Blech IDegree Mid Tern Examinations March 2024
Second Semester
Computer Science Engincering (Cyber Security)
20CYSI14 Cyber Security Essentials
Time: Two hours
Maximum: 50 Marks
Course Outcomes (COs):
CO Course Outcomes
COI Apply a solid foundation in digital security and measures taken to
threats. protect device from
CO2
Learning access control mechanism and understand how to protect servers
CO3 Understand the importance of a network basics and brief introduction on security of
network protocols
CO4 To understand cyber-attacks and learn data privacy issues and
preventive measures
Answer all questions
1. Choose the correct option.
a) If router does not know MACaddress of a host, it
[1][BTLI||CO03]
Sends ARP request to that host
Sends ARP request to IP address of that host
ii. Broadcasts ARP request
iv. Unicasts ARP request to all hosts individually
b) Iwant to access a webpage: www.admissions.amrita.edu. My local DNS server knows IP
of required TLD server. To get IP of requested webpage, how many
DNS server will send if it is using recursive method.
requests my local
i.
[O[BTL2|[CO03|
2
iii. 3
iv. 4
Page 1 of 3
aieker gets root access of asysten of an organization and then get access to other
Systens also. IHe uses these all systems to perform an attack on other system which is out
of that organization. What kind of ||[BTL2][CO04)
Botnet
malware is it?
Rootkit
iii. Virus
iv. Worm
d) What is Blackhat search
engine optimization? J[BTLIJ|CO04]
Creating a malicious search engine
Forcing victim to visit maliciouslycreated page
ii. Increase the rank of Malicious webpage in the search engine
iv. Allof the above
2. Give the full form of:
a. MAC
(2][BTLIJ[CO01|
b. VPN
C. TLD DNS
d. ARP
3. Brief the following: (2*5=10][BTLI|
a. Different types of Network Topologies [CO03]
b. Difference between HASH and MAC[CO01]
C. Authentication vs Authorization [CO02]
d. Phishing vs ldentity Theft [CO01]
e. White Hat Hacker vs Grey Hat Hacker [C001]
4. ldentify the attack:
a) Imagine you work for a small accounting fim. One morning, youarrive at the
office to
find that all the computers are displaying a message demanding payment in Bitcoin to
unlock encrypted files.
b) You discover a hidden program installed on your computer that
records your keystrokes
and captures screenshots of your desktop without your consent. Additionally, you
notice
that your personal information, such as passwords and financial data, has been
compromised. What type of malware is most likely responsible for these surveillance
activities?
c) Your organization's network suddenly experiences a significant slowdown, and users
report difficulty accessing shared files and resources. Upon investigation, you discover
1hat numerous computers are attempting to communicate with each other at an unusually
hiph rate. What type of malware is most likely responsible for this network congestion?
Page 2 of3
d) You receive an email from a trusted colleague with an attachment titled
"Important Document.exe." Upon opening the attachment, your computer starts
behaving erratically, and you notice unusual files appearing on your desktop. What type
of malware is most likely responsible for this behavior?
e) You receive an email from your bank informing you that there has been suspicious
activity on your account and that you need to click on a link to verify your information.
The email looks legitimate, with the bank's logo and branding. What type of social
engineering attack is this most Iikely an example of?
You download a mobile application from a third-party app store to your smartphone.
After installing the app, you notice that your device's battery drains much faster than
usual, and you're bombarded with ads whenever you use the device. What type of
potentially unwanted program (PUP) is most likely responsible for these symptoms?
[12][BTL3|[|CO04)
a. Differentiate between signature-based antivirus and heuristic-based antivirus.
[5][BTL2][CO04]
b. How DNS work in recursive mode? Explain with the help of diagram.
[5][BTL2][CO03]
c. Jdentify the IP Address Class for the following: (2][BTL2][CO03]
i. 15.23.45.56
199.200.201.202 B
182.16.45.67
iv. 10.9.0.4
d. Consider yourself as a Network Infrastructure Manager. Design the 7 layers of the OSI
model from bottom to top approach in your organisation. |10|BTL2][CO03]
(a) Mention the protocols that will be working on each layer.
(b) Mention the cyber-attacks possible on cach layer.
Page 3 of3
Amrita Vishwa Vidyapcetlhan1
Amrita School
lof
Mid-lernm ExamiComput
nantioinng.
3Jech. Chennai
October 2023
First Semester
Computer Science and :ngineering (Cyber
Security)
19CSET00 Problenm Solving and Algorithmic Thinking
Time: Two hours
Maximum: 50 Marks
CO
Course Outcomes (COs):
CO1 Course Outcomes
CO2 Apply algorithmic thinking to
Design and implement understand, definc and solve problems.
CO3
CO4 Apply the basic algorithm(s)
programming
fora given problem
constructs for problem solving
Understand an algorithm by
coTrecting them tracing its computational states, identifying bugs and
Answer all questions
a)Design an algorithm to find the factorial of agiven positive integer.
a flowchart and Represent this algorithm using
provide
b) You are given the
a step-by-step
explanation of how it works. [5] (CO2]
there isa bug in the following pseudocode that attempts to reverse a
positive integer num. However,
pscudocode. Youi task is to identify the bug and provide
aorrewd anltian
Input: num (a positive integer)
Output: reversedNum (the reversed integer)
Set reversedNum to 0
While num > 0
digit = num/ 10
reversedNum =reversedNum * 10 +digit
num num % 10
End While
Print "Reversed number:", reversedNum (51|CO4)
2. a)Given areal-world problem, such as optimizng the delivery routes feraleet of trucks,describe
how you would apply algorithmic thinking to solve it. Provide ahigh-level algorithm and tlow
chart youwould use to implement it. Fxplain the expected benetits of your solution. (10| |CO21
Page l of 2
3. a) Design atlowchart to find the sumn of all even numbers between l and 100 using a"for" loop.
the key
explain vour flow-chart and identify programming constructs used. [S||CO3)
b) Design aflow chart to checks whetheragiven 1number is prime or not using a"while'" loop.
identify the key programming constructs used.
explain your flow-chart and (5] |CO3]
are inductive or deductive
4. State whether the following statements
|)"Every time I've visited the park, I've seen squirrels. Therefore, I conclude that there are sguirrels
in the park."
2)This marble from the bag is black. That marble from the bag is black. Athird marble from the
bag is black. Therefore all the marbles in the bag black"
3)"Triangles have three sides. This shape has three sides. Therefore, this shape is a triangle due to
its three sides."
4) "Over the course of several decades, scientists have conducted numerous experiments and
observed aconsistent rise in global temperatures. They have documented more frequent and severe
heatwaves, the shrinking of polar ice caps, and shifts in climate patterns. Based on this extensive
body of evidence, it is reasonable to conclude that human activities, such as the burning of fossil
fuels and deforestation, are contributing to climate change. While individual weather events may
vary. the overall trend indicates a warming planet due to human influence"
5)*To get a Bachelor's degree at Utah Sate University, a student must have 120 credits. Sally has
more than 130credits. Therefore, Sally has abachelor's degree." [10] [CO1]|
5. Design a flowchart to print number sequence up to a given positive integer, then update the same
flowchart to add all the numbers in the sequence. [10] [C02]
Page 2 of2
AmritaVishwa Vidya Chennai
Computing, toher23
of
AmritaSchool
CH.3C. Du(ys 230ub
RollNo,:
AmritaVishwa Vidyapcetham
Computing. Chennai
AnritaSehool ofExarminations October' 23
Semester
B lech. Mid Question Paper
ISemester
Engineering-Cyber Security
Computer Scienceand Engineering
20CYS102 Principle of Maximum: 50 Marks
Duration: 120 Minutes
Course Outcomes magnetic
electric and
concepts and basic
|CO engineering
understand the
COI Ability to
circuits
andAC circuits.
CO2 Ability to analyse DC
principles of PN junctions and transistors
basic
CO3 Ability to understandthe and op amp-based
circuits.
analyse basictransistor
CO4 Ability to
10 Marks
Part A - Answer all the question
4|[BTL3| |CO2|
circuit
1 Determine the voltage v in the
25A() 25 A(1)
a supply current of
When three resistors 22, 32 and 6 N are connected in parallel with
2 [3||BTL3] |CO1|
2 2 resistors.
22A, then find the current flowing through
science in Electronics field [3][BTL3| |CO1|
3 Identify the role of
40 Marks
PART B(Answer allthe questions)
combination of two resistances
4 Aresistance of 20 ohms is connected in series with a
resistance R3 which should be
arranged in parallel each of value 40 ohms. Determine the
the circuit is 1.5A
shunted across the parallel combination sothat the totalcurrent drawn by
with applied voltage of 40 V. 16| |BTL3||CO2|
SUsing superpositiontheorenm to find the current I, in the network Shown below
|10| |BTL3| |CO2|
I50 40 A
6. Using mesh analysis to find the all-loop currents present in the given circuit
(Note: AIlresistors are mentioned in ohms,Current source in Amp & Voltage source in Volt)
[|14| |BTL4||CO2)
)10
3lo
7. Describe the working principle of PN junction diode under open circuit condition, torward bias
and reverse bias condition with suitable diagrams. |10||BTL2| |CO3|
%%%%%%%%%%%%%%% ALL THE BEST%%%%%%%9%%%%%%%%
-ita VIST
|RollNo.
Amrita Vishwa Vidyapectham
Chennai
Computing, October' 23
of
AmritaSchool Examinations -
Midterm Test
First Semester Security
B.Tech. Engincering-Cyber
Essentials
Maximum: 50 Marks
Scienceand and Systen
Computer Hardware
Computer
20CYSI03 - (desktop
computing devices
Duration: 120 Minutes
of
different
Course Outcomes principles
working devices,
the
CO Understanding
computers, laptops, etc.). hardwarecomponents. devices, storage
CO1
laptop peripheral
PC and between upgrading
Understand connection interfaces supporting,
and
OS - Linux
CO2
Understand of
CO3 Installation
displays. procedure for
Understand the and circuit building.
CO4 and new applications. system
concepts ofnumber
Understand the (2|[BTL3|[COS]
COs the question
Answer all gates.
BD) with only NOR
AB)(AC +
Implement F = (AB +
1
following
Solve the
2 t× (O16,Os
a) (65.342)s
(9B2.IA)16 to ()8
[4][BTL2I[COS]
b)
(0.640624)1o to )8
c)
(0001.11010)2 to ()16
d)
Boolean expersion
3 Reduce the ABC (AB + C)
a)AB + (AC) + + + BC
[6][BTL3][CO4|
b) + AD + ABC + ABC = AB + AC
ABC +
c)Prove that ABC +
12,13,14) using 8x1 and 4x1 multiplexer.
=Em(0,2,3,6,8,1 0,11, [10][BTL3|[COS]
F(A,B,C,D)
4 Implement
forms
simplest possible POS and SOP
following expression to the [8|[BTL3|[COS]
5 Implement them(0,2,3,6.7) +Sd(8, 10,11,15)
F(w,x.y,z)-
and NOR
function using K-Maps and Realize using NAND
logic
6 Find the Minimnized =m(1,3,5,8,9, 11,15) +d(2, 13). [10][BTL3||COS]
(A, B,
gate. F C, D)
subtractor [10|[BTL2|[CO4]
7 Design a three variable adder and
Roll No
Amrita Vishwa Vidyapcethan1
Amrita School of Computing. Chennai
B Tech Midterm Examinations October 2023
ISemester
Cyber Security
20MATI02 - Linear Algebra
Time: 2Hours Maximum: 50 Marks
Course Outcomes (COs)
COs Course Outcomes
COI Understand the basic concepts of vector space, subspace, basis and dimension.
CO2 Understand the basic concepts of inner product space, norm, angle, Orthogonality
and projection and implementing the Gram-Schmidt process, to obtain least square
solution.
CO3 Understand the concept of linear transfornmations, the relation between matrices and
linear transformations, kernel, range and apply it to change the basis, to get the QR
decomposition,and to transform the given matrix to diagonal/Jordan canonical
form.
CO4 Understand the concept of positive definiteness, matrix norm and condition number
for a given square matrix.
Note:
1. Allthe questions are compulsory and descriptive.
2 While answering, justify your steps. Just writing the final answer will receive no credit.
1. Determine the relation between a, band c so that the following system will be consistent.
X+y t 2z = a
xtz= b
2x + y + 3z = c
14| |BTL2||CO01|
2. Express the polynomial v=t'+4t -3 in P(t) as a linear combination of the
polynomials
p, = t'2t + 5, P2 = 2t' -3t, Pa =t+1
14||BTL2]|CO01|
3. Findthe eigenvalues andeigenvectors of the following matrix
Page Iof2
I8||BTL3|CO0|
4 Find amatnx P that orthogonally diagonatizes
[4 2 21
A -|2 4
l2 2
(8| |BTL3|CO02)
$. Find the values of aand b so that the given matrix is orthogonal
1a a 1
A= 1 b
a
14|[BTL3||CO02]
6. a) Find the symmetric matrix corresponding to the quadratic form
Qr) = 3x - 2xy + 3xz + 2y2 + 3z' |2||BTL2||C001|
b) For what values of k is the quadratic form Q(x) = kr'- 6xy +ky' is positive
detinite?
[3) |BTL2||CO01|
7. Prove the following:
a) If A and B are symmetric matrices of same order, then AB + BA is a symmetric matrix.
(2] [BTL3||CO02]
b) IfA is any square matrix, then A-A* is a skew-Hemitian Matrix.
[3|[BTL3||CO02|
8. Verify whether the set of all pairs of real numbers of the form (1, x) with the operations
(1,y) +(1,y) = (1,y +y) and k(1, y) = (1, ky).
[8] [BTL3||CO01|
9. Verify whether the set of all nxn matrices Asuch that A' = -A forms the subspaces of
Mnxn:
14| |BTL3||CO01]
Page 2 of 2