Professional Documents
Culture Documents
Me-Computer Sem1 Csl-Cbcgs May19
Me-Computer Sem1 Csl-Cbcgs May19
Me-Computer Sem1 Csl-Cbcgs May19
A 7 8 5
6A B7 F22 2531 1F97 718 065 675 50C6 6B8 8F50
B F2 53 F9 1 06 67 0C B F5 FC
AB 7F 25 1F 71 80 56 50 6B 8F 0F 5
2 3 9 6 7 C 5 6
B7 7F22 253 1F9 718 8065 5675 50C 6B8 8F5 0FC C56AAB7
F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2
7F 25 1F 7 80 56 50 6 8F 0F 5 A 7F 25
22 3 9 18 65 75 C B8 5 C 6A B7 2 3
22 531 1F97 7180 065 675 0C6 6B8 F50 0FC 56A B7 F22 2531 1F9
5 6 0 F 5 F 7
25 31F F971 1806 656 750 C6B B8F 50F FC5 6AB B7F 225 531F F97 180
31 97 80 56 75 C6 8 50 C5 6A 7 22 31 97 18 65
53 F9 18 65 7 0C B F5 FC 6 B F2 53 F9 1 06 67
58888
1F 7 0 6 50 6 8F 0F 5 A 7F 2 1 7 80 56 50
1F 971 1806 6567 750 C6B B8F 50F C56 6AB B7F 225 531F F971 180 656 750 C6B
C 5 2 6 7 C
F9 9718 8065 5675 50C 6B8 8F5 0FC C56AAB7 7F2 253 31F9 9718 806 567 50C 6B 8F5
71 06 67 0C 6B F5 0F 56 B F2 25 1F 71 06 567 50 6B 8F 0F
71 806 567 50C 6B 8F5 0F C56 AB 7F2 25 31F 971 806 567 50 C6B 8F 50F C56
80 56 50 6 8F 0F C5 A 7F 25 31 97 80 56 50 C6 8F 50 C5 A
65 75 C6 B8 50 C 6A B7 22 31 F9 18 65 75 C B8 5 FC 6A B7
67 0C B F5 FC 56 B F2 53 F 71 06 67 0C 6B F5 0F 56 B F2
50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6 8F 0F C5 A 7F 25
b) Key Logger
C6 8 50 C 6A 7 22 31 97 18 65 75 C6 B8 50 C 6A B7 22 31
c) Cyberstalking
B8 F50 FC 56A B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9
F5 FC 56 B F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2 253 1F 71
0F 56 AB 7F 25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80
d) Types of Phishing
C5 A 7F 22 31 97 80 56 750 C6 8F 50 C5 6A 7 22 31 97 180 65
6A B7 22 531 F97 18 65 75 C6 B8 50 FC 6A B7 F22 531 F9 18 65 675
B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9 718 065 67 0C
F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2 253 1F 71 06 67 50C 6B
N.B.: 1) Q.1 is compulsory.
25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6 8F
31 97 80 56 75 C6 8 50 C5 6A 7 22 31 97 18 65 75 C6 B8 50
F9 18 65 75 0C B8 F5 FC 6A B7 F2 53 F9 18 06 67 0C B F5 FC
71 06 67 0C 6B F5 0F 56 B F2 25 1F 71 06 567 50 6B 8F 0F 56
C6 8 50 C 6A 7 22 31 97 18 65 75 C6 B8 50 C 6A B7 22 31
B8 F50 FC 56A B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9
0F 56 AB 7F 25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80
C5 A 7F 22 31 97 80 56 750 C6 8F 50 C5 6A 7 22 31 97 180 65
6A B7 22 531 F97 18 65 75 C6 B8 50 FC 6A B7 F22 531 F9 18 65 675
________________
c) Explain LDAP & RSA Securities for mobile devices.
50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6 8F 0F C5 A 7F 25
2) Attempt any three from remaining five questions.
C6 8 50 C 6A 7 22 31 97 18 65 75 C6 B8 50 C 6A B7 22 31
B8 F50 FC 56A B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9
b) What is objective of computer based social engineering.
56AB7F22531F97180656750C6B8F50FC
6A B7 22 531 F97 18 65 75 C6 B8 50 FC 6A B7 F22 531 F9 18 65 675
B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9 718 065 67 0C
F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2 253 1F 71 06 67 50C 6B
Q3. a) Explain Cybercrime and Criminal Justice in Indian IT Act 2000.
.
25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6 8F
31 97 80 56 75 C6 8 50 C5 6A 7 22 31 97 18 65 75 C6 B8 50
F9 18 65 75 0C B8 F5 FC 6A B7 F2 53 F9 18 06 67 0C B F5 FC
71 06 67 0C 6B F5 0F 56 B F2 25 1F 71 06 567 50 6B 8F 0F 56
80 56 50 6 8F 0F C5 A 7F 25 31 97 80 56 50 C6 8F 50 C5 A
65 75 C6 B8 50 C 6A B7 22 31 F9 18 65 75 C B8 5 FC 6A B7
67 0C B F5 FC 56 B F2 53 F 71 06 67 0C 6B F5 0F 56 B F2
50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6 8F 0F C5 A 7F 25
C6 8 50 C 6A 7 22 31 97 18 65 75 C6 B8 50 C 6A B7 22 31
b) What is buffer overflow problem? How to minimize buffer overflow attack.
0F 56 AB 7F 25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80
C5 A 7F 22 31 97 80 56 750 C6 8F 50 C5 6A 7 22 31 97 180 65
6A B7 22 531 F97 18 65 75 C6 B8 50 FC 6A B7 F22 531 F9 18 65 6
B7 F22 53 F9 18 065 675 0C B8 F5 FC 56A B7 F2 53 F9 718 065 67
F2 53 1F9 71 06 67 0C 6B F5 0FC 56 B F2 253 1F 71 06 67
25 1F 71 806 56 50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50
31 97 80 56 75 C6 8 50 C5 6A 7 22 31 97 18 65 75
[10]
[10]
[10]
[10]
[10]
[10]
[10]
[20]
b) Explain some precaution measures that should be taken by end user at cyber cafe [10]
[05]
[05]
[05]
[05]
F9 18 65 75 0C B8 F5 FC 6A B7 F2 53 F9 18 06 67 0C
71 06 67 0C 6B F5 0F 56 B F2 25 1F 71 06 567 50
80 56 50 6 8F 0F C5 A 7F 25 31 97 80 56 50 C6
65 75 C6 B8 50 C 6A B7 22 31 F9 18 65 75 C
(Total Marks : 80)
67 0C B F5 FC 56 B F2 53 F 71 06 67 0C 6B
50 6B 8F 0F 5 AB 7F 25 1F 97 80 56 50 6
C6 8 50 C 6A 7 22 31 97 18 65 75 C6 B8
B8 F50 FC 56A B7 F22 53 F9 18 065 675 0C B8
F5 FC 56 B F2 53 1F9 71 06 67 0C 6B F5
0F 56 AB 7F 25 1F 71 806 56 50 6B 8F
C5 A 7F 22 31 97 80 56 750 C6 8F 50
6A B7 22 531 F97 18 65 75 C6 B8 50
B7 F22 53 F9 18 065 675 0C B8 F5 F
F2 53 1F9 71 06 67 0C 6B F5 0FC
8 5