0% found this document useful (0 votes)
44 views3 pages

CSL Sem QB

The document outlines a series of exam questions related to cyber security, cybercrime, and legal aspects of information technology from the years 2019 to 2024. It includes topics such as active vs passive attacks, types of key-loggers, cyber-terrorism, password cracking techniques, and the classification of cybercrimes. Additionally, it addresses the importance of cyber laws in India and various security risks associated with mobile devices and cloud computing.

Uploaded by

vadhelsmit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views3 pages

CSL Sem QB

The document outlines a series of exam questions related to cyber security, cybercrime, and legal aspects of information technology from the years 2019 to 2024. It includes topics such as active vs passive attacks, types of key-loggers, cyber-terrorism, password cracking techniques, and the classification of cybercrimes. Additionally, it addresses the importance of cyber laws in India and various security risks associated with mobile devices and cloud computing.

Uploaded by

vadhelsmit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CSL SEM QB

5 Marks:
2019 2

1. Compare active attacks vs Passive attacks.


2. Explain various types of key-loggers in brief.
3. Classify the cybercrimes and explain any one briefly.
4. Explain how the appeals can be made under The IT ACT 2000.
5. Write brief note on : Cyber-terrorism.

2022 2

6. Differentiate between cybercrime and cyber fraud.


7. Explain various threats associated with cloud computing.
8. Explain methods of password cracking.
9. Explain E-contracts and its different types.
10. Explain different attack vectors in cyber security.

2023 1

11. List General guidelines for password policies.


12. Difference between virus and worm.
13. How cybercrimes differs from most terrestrial crimes?
14. What are different Security Risks for Organizations?
15. What are Mobile Vulnerabilities?
16. Short note: Cyberdefamation.
17. Short note: HIPAA.
18. Short note: Buffer overflow attack.
19. Short note: Steganography.
20. Short note: DDOS attack.
21. Short note: Trojan horse and backdoor.

2023 2

22. Explain how criminals plan the attack


23. Explain various security challenges posed by mobile devices
24. Explain need of Cyber law in India
25. Explain E-contracts and its different types.
26. What are Botnets? How it is exploit by attacker to cause cyber-attack?

2024

27. Explain about digital evidence.


28. Explain different password cracking techniques.
29. What are different Security Risks for Organizations?
30. What is Cybercrime? Who are Cybercriminal? Explain.
31. Explain about Credit card frauds in Mobile and Wireless Computing era.
32. Short note: Salami attack.
33. Short note: HIPAA.
34. Short note: Mobile/Cell Phone attacks.
35. Short note: Cyberstalking and harassment.
36. Short note: SOX.
37. Short note: Buffer overflow attack.

10 Marks:
2019 2

1. How criminals plan the attack? Discuss various steps involved


2. Explain how Intellectual property laws protect the rights of the owner of the intellectual
Property.
3. Compare Vishing, Phishing and Smishing in cyber security.
4. What is E-commerce? Explain different types of e-commerce with suitable examples.
5. What is Bluetooth hacking? Explain Bluetooth hacking tools in brief.
6. How the Indian penal code IPC 1860 addresses cybercrime?
7. Discuss basic security precautions to be taken to safeguard Laptops and wireless devices.
8. What is E-contract? Discuss E-contract Act 1872.
9. Short note: Computer Sabotage.
10. Short note: Indian Information Technology Act 2000
11. Short note: Write key IT requirements for SOX and HIPAA.

2022 2

12. Explain the classification of cybercrimes with examples.


13. Explain various types of credit card frauds.
14. Explain different buffer overflow attacks also explain how to mitigate buffer overflow attack.
15. Explain electronic banking in India and what are laws related to electronic banking in India.
16. What do you understand by DOS and DDOS attack? Explain in detail.
17. Write a note on Intellectual Property Aspects in cyber law.
18. Explain the objectives and features of IT Act 2000.
19. What are Botnets? How it is exploit by attacker to cause cyber attack?.
20. Explain SQL injection attack. State different countermeasure to prevent the attack.
21. Explain what is Information Security Standard and Explain HIPAA act in detail.
2023 1

22. Discuss steps involved in planning of cyberattacks by criminal.


23. What is vishing attack? How it works? How to protect from vishing attack?
24. What is e-commerce? Discuss types of e-commerce.
25. Explain E-contracts and its different types.
26. What are basic security precautions to be taken to safeguard Laptops and Wireless devices?
Explain.
27. What is Cybercrime? Who are Cybercriminals? Explain.
28. What is digital evidence? Where one can find it.
29. What are illegal activities observed in Cyber Cafe? What are safety and security measures
while using the computer in Cyber Cafe?

2023 2

30. Explain the classification of cybercrimes with examples.


31. Explain Phishing and Identity theft in detail.
32. Explain different buffer overflow attacks also explain how to mitigate buffer overflow attack.
33. Explain electronic banking in India and what are laws related to electronic banking in India.
34. What do you understand by DOS and DDOS attack? Explain in detail.
35. Write a note on Intellectual Property Aspects in cyber law.
36. Explain SQL injection attack. State different countermeasure to prevent the attack.
37. Explain the objectives and features of IT Act 2000.
38. Explain the term evidence and different types of evidences.
39. Write key IT requirements for SOX and HIPAA..

2024

40. If a hacker creates a website similar to university website to cheat student. Identify attack
and explain different types it. How to prevent from such attack.
41. Discuss steps involved in planning of cyberattacks by criminal.
42. Explain different types of Cybercrimes and how security will provide?
43. Explain why do we need cyber laws? Discuss about the challenges to Indian cyber Laws.
44. Explain Steps for SQL Injection attack. How to prevent SQL Injection attacks?
45. If an attacker creates heavy traffic on the college website so that it becomes inaccessible to
the legitimate user. Which is this attack. Explain in details with it’s types.
46. What are illegal activities observed in Cyber Cafes? What are safety and security measures
while using the computer in Cyber Café?
47. What are basic security precautions to be taken to safeguard Laptops and Wireless devices?
Explain?

You might also like