Uploaded by Vibehav

be information-technology semester-7 2023 may iloc-i-cyber-security-and-laws-rev-2019-c-scheme

advertisement
90
8F
98
AC
4A
FD
AB
8D
A8
FD4AAC988F909152C418486181A88DAB
DA
88
88
1A
1A
18
86
84
6
48
18
C4
52
5
91
90
8F
98
AC
AC
9
4A
4A
FD
FD
AB
AB
8D
8D
A8
61
81
61
48
18
C4
52
91
90
8F
98
AC
4A
FD
AB
10
10
10
48
52
91
8F
98
AC
4A
10
18
C4
52
91
90
98
FD
81
61
48
18
C4
52
91
10
10
8D
A8
61
18
C4
52
91
90
8F
81
48
C4
15
AC
AB
8D
A8
81
61
48
18
C4
52
91
90
8F
91
90
8F
98
AC
4A
FD
A8
81
10
10
48
18
C4
52
91
90
8F
98
AC
4A
FD
AB
8D
A8
81
61
18
2C
48
41
61
84
81
86
A8
18
8D
1A
86
84
41
09
F9
FD
AB
8D
A8
81
61
48
18
C4
52
91
90
8F
4A
BF
DA
88
1A
18
86
84
41
88
C9
AA
D4
BF
DA
88
1A
18
86
2C
18
2C
09
F9
88
C9
AB
8D
A8
81
61
48
18
C4
52
91
90
8F
98
AC
4A
FD
AB
AA
D4
BF
DA
88
1A
18
86
84
41
2C
15
09
F9
88
C9
AA
D4
BF
DA
88
15
F9
88
C9
AA
D4
BF
DA
88
1A
18
86
84
41
2C
15
09
F9
88
C9
AA
D4
BF
DA
88
1A
18
86
84
41
15
09
88
C9
AA
D4
BF
DA
18
86
84
41
2C
15
09
F9
88
C9
AA
D4
BF
DA
88
41
09
F9
2C
15
F9
88
C9
AA
D4
1A
18
86
84
41
2C
15
09
F9
88
C9
AA
D4
88
1A
86
41
2C
15
09
F9
88
C9
BF
1A
2C
15
09
F9
88
C9
AA
D4
Write short notes on any FOUR
Cyberdefamation
HIPAA
Buffer overflow attack
Steganography
DDOS attack
Trojan horse and backdoor
*************
15
26426
98
18
86
84
41
2C
15
09
F9
88
C9
AA
D4
BF
DA
88
09
F9
DA
18
86
84
41
2C
15
09
F9
88
C9
What is digital evidence? Where one can find it.
What are illegal activities observed in Cyber Cafe? What are safety and security
measures while using the computer in Cyber Cafe?
Q.6
a
b
c
d
e
f
AC
88
1A
86
84
41
2C
15
09
F9
Q.5
a
b
20
What are basic security precautions to be taken to safeguard Laptops and Wireless
devices? Explain.
What is Cybercrime? Who are Cybercriminals? Explain.
84
41
AA
D4
BF
DA
88
1A
18
What is e-commerce? Discuss types of e-commerce.
Explain E-contracts and its different types.
AA
D4
BF
1A
88
84
C4
52
91
90
8F
98
AC
4A
FD
AB
8D
A8
81
61
48
18
C4
52
88
b
C9
18
2C
BF
Discuss steps involved in planning of cyberattacks by criminal.
What is vishing attack? How it works? How to protect from vishing attack?
91
90
8F
86
15
C9
AA
DA
Q.2
a
b
DA
88
1A
84
41
09
F9
88
D4
88
18
Attempt any FOUR of the following
List General guidelines for password policies.
Difference between virus and worm.
How cybercrimes differs from most terrestrial crimes?
What are different Security Risks for Organizations?
What are Mobile Vulnerabilities?
Q.3
a
b
AA
D4
BF
18
2C
15
C9
Max. Marks: 80
Q1
a
b
c
d
e
Q.4
a
98
AC
4A
FD
DA
88
1A
86
84
41
09
F9
AA
18
48
1A
61
88
81
DA
A8
BF
8D
N.B.: 1) Question No.1 is compulsory.
2) Attempt any THREE questions out of remaining FIVE questions.
3) Figures to the right indicates full marks.
4) Assume suitable data if necessary.
D4
86
41
09
2C
15
F9
88
C9
AA
D4
84
2C
15
09
8F
98
AC
4A
FD
AB
41
1T01237 - B.E.(Information Technology Engineering)(SEM-VII)(Choice Base Credit Grading
System ) (R- 19) (C Scheme) / 42686 - Cyber Security Laws
QP CODE: 10026426
DATE: 26/06/2023
Duration: 3 hours
DA
8
18
84
86
41
2C
91
90
1A
1
8
52
Paper / Subject Code: 42686 / Cyber Security Laws
20
Download