Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

MODEL LESSON PLAN / CONSOLIDATED UNIT WISE LESSON PLAN:

FUNDAMENTALS OF CYBER SECURITY(18MC0CS02)


Subject
Faculty Mr.R.Uttham Sai/ Mr.B.Krishna Kumar
Text Books (to be acquired by the Students)
1. Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal
Book 1
Perspectives, Nina Godbole and Sunil Belapure, Wiley INDIA.
2. B. B. Gupta, D. P. Agrawal, Haoxiang Wang, “Computer and Cyber Security:
Book 2
Principles, Algorithm, Applications, and Perspectives”, CRC Press.
Chapters
Unit Topic Book 1 No of Classes

I Introduction to Cybercrime Ch-1,Ch-2 12

Cybercrime: Mobile and


II Wireless Devices Ch-3,Ch-4 12
Introduction
Cybercrimes and Cyber
III Ch-6,Ch-7 13
Security
Cyber Security:
IV Organizational Implications Ch-9, Ch-10 9
Introduction
Cybercrime: Illustrations,
Ch-11
V Examples and Mini-Cases 9
Examples
Contact classes for syllabus coverage 55

Tutorial Classes 16
Descriptive Tests 02
Classes for beyond Syllabus 03
Remedial Classes / NPTEL 04
Total Number of Classes 80
TEACHING SCHEDULE/MICRO LESSON PLAN
Sl No. of
Cumulativ Teaching
. Classes
e number AID
N Name of the Topic require
of periods
o d
Course Objective and Course Outcomes: E-Board
1 Explaining Course Objective and Course 1 1
Outcomes
UNIT-I

Introduction to Cyber Security: Basic cyber PPT/E-Board


2 security concepts, motive of attackers 1 2

Active attacks, passive attacks, cyber crime and PPT/E-Board


3 information security, computer criminals 1 4
Classification of cyber crimes: E-Mail spoofing, PPT/E-Board
4 spamming, cyber defamation 1 5
Internet time threat , salami attack, data diddling, PPT/E-Board
5 forgery, web jacking 1 7

Newsgroup spam , industrial espionage, hacking, PPT/E-Board


6 1 8
online frauds
Software piracy , computer sabotage ,email PPT/E-Board
7 1 9
bombing
8 Computer network intrusions, password sniffing 1 10 PPT/E-Board

9 Usenet newsgroup as the source of cybercrimes, PPT/E-Board


1 11
identity theft
10 PPT/E-Board
Cyber threats-cyber warfare, CIA traid 1 13

UNIT-II
11 Cybercrime: Mobile and Wireless PPT/E-Board
1 14
Devices :Introduction
12 proliferation of mobile and wireless devices 1 16 PPT/E-Board
13 Trends in mobility, credit card frauds in mobile PPT/E-Board
and wireless computing era 1 18
14 Descriptive Test
15 Security challenges posed by mobile devices PPT/E-Board
1 21
16 Authentication service security, attacks on 1 22 PPT/E-Board
mobile/cell phones
Tools and methods used in cyber crime: phishing PPT/E-Board
17 1 24
Password cracking PPT/E-Board
18 1 26
UNIT-III

Cyber Law – The Legal Perspectives: PPT/E-Board


19 Introduction 1 27
Cybercrime and the Legal Landscape around the PPT/E-Board
20 World 1 29

21 Why do we need cyber laws: the Indian context, 1 30 PPT/E-Board


the Indian IT act
22 Cyber Forensics: Introduction, historical 1 32 PPT/E-Board
background of cyber forensics
digital forensics science, the need for computer PPT/E-Board
23 1 34
forensics
cyber forensics and digital evidence PPT/E-Board
24 1 36

digital forensics lifecycle PPT/E-Board


25 1 38
challenges in computer forensics PPT/E-Board
26 1 40

UNIT-IV
27 Cyber Security - Organizational implications: 1 41 PPT/E-Board
Introduction,
Cost of cyber crimes and IPR issues, PPT/E-Board
28 1 42
Web threats for organizations, security and PPT/E-Board
29 privacy implications from cloud computing 1 43

Social media marketing: security risks and perils PPT/E-Board


30 1 44
for organizations
Social computing and the associated challenges PPT/E-Board
31 1 45
for organizations.

32 Cybercrime and Cyber terrorism: Introduction 1 46 PPT/E-Board

33 intellectual property in the cyberspace, 1 47 PPT/E-Board

The ethical dimension of cybercrimes, the PPT/E-Board


34 psychology 1 48
Mindset and skills of hackers and other cyber PPT/E-Board
35 criminals. 1 49

UNIT-V
Cyber Crime Examples: Introduction, Real-life PPT/E-Board
36 Examples :Official website of Maharashtra 1 50
Government
E-Mail spoofinghacked
instances, Indian banks lose PPT/E-Board
37 1 51
millions of rupees,
Parliament attack,Pune city police bust Nigerian PPT/E-Board
38 1 52
racket,
39 Mini-Cases: The Indian case of online gambling 1 53 PPT/E-Board
an Indian case of intellectual property crime, PPT/E-Board
40 1 55
illustrations of financial frauds in cyber domain.
41 Descriptive Test
TOTAL HOURS 55
Tutorial classes 16
Descriptive Tests 02
Classes for beyond Syllabus 03
Remedial Classes/NPTL 04
Total Number of Classes 80

Assignment Questions:
Academic Year : 2020-21
Subject Name with code : FUNDAMENTALS OF CYBER SECURITY (18MC0CS02)
Class : III-CSE-1,2,3
Name of the Faculty Member : Mr.R.Uttham Sai/Mr.B.Krishna Kumar
Blooms Taxonomy Levels (BTL)
1. Remembering
2. Understanding
3. Applying
4. Analyzing
5. Evaluating
6. Creating

Sl. Questions BTL Course


No. (Select Questions from University question Bank and mention level Outcome
year in bracket or you may give own standard question with (new) (Please (Please
in bracket) mention mention
L1 or L2 CO1 or
or etc...) CO2
etc…)
Unit - I
1. L-1 CO 1
List the types of cyber threats and Explain.
2. Explain who are called as computer criminals. L-2 CO 1
3. Describe Information security and cyber security. L-2 CO 1
4. Illustrate how criminals plan the attacks? L-3 CO 1
5. Explain briefly about Computer sabotage and Software piracy. L-2 CO 1
Unit – II
1. Explain proliferation of mobile devices. L-2 CO 2
2. List the vulnerabilities of mobile. L-1 CO 2
3. Explain about Mobile Viruses? L-2 CO 2
4. Demonstrate the security challenges posed by mobile devices? L-3 CO 2
5. Illustrate the Authentication service security in mobile computing? L-3 CO 2
Unit – III
1. List the offences included in IT Act 2000. L-1 CO 3
2. Illustrate the methods of dealing with Spam. L-3 CO 3
Illustrate the challenges to Indian law and cyber crime scenario in
3 L-3 CO 3
India?
4 Describe anti-spam laws in Canada. L-2 CO 3
5 Briefly explain section 65 and 66 of ITA 2000 in detail. L-4 CO 3
Unit – IV
1. Define copyright and patent. L-1 CO 4
2. Describe Trademark and Trade Name. L-2 CO 4
3 Explain about the Intellectual property in cyberspace? L-2 CO 4
Illustrate the precautive measures to be taken during social media
4 L-3 CO 4
marketing?
5 Demonstrate the ethical dimension of cyber crime? L-3 CO 4
Unit - V
1 List the basic types of financial fraud in businesses? L-1 CO 5
2 Define Confidentiality and privacy. L-1 CO 5
Illustrate the case study of “official website of Maharashtra
3 L-3 CO 5
Government Hacked”?
4 Illustrate the case study of “Parliament Attack”? L-3 CO 5
5 Illustrate the mini-case of “Pune City Police bust Nigerian Racket? L-3 CO 5
Question Bank /Previous Question Papers Questions:
Academic Year : 2020-21
Subject Name with code : FUNDAMENTALS OF CYBER SECURITY (18MC0CS02)
Class : III-CSE-1,2,3
Name of the Faculty Member : Mr.R.Uttham Sai/Mr.B.Krishna Kumar
Blooms Taxonomy Levels (BTL)
1. Remembering
2. Understanding
3. Applying
4. Analyzing
5. Evaluating
6. Creating

Sl. Questions BTL Course


No. (Select Questions from University question Bank and mention level Outcome
year in bracket or you may give own standard question with (new) (Please (Please
in bracket) mention mention
L1 or L2 CO1 or
or etc...) CO2
etc…)
Unit - I
Part – A (2 Marks )
4. Define Cyber Security? L-1 CO 1

5. Discuss about E-Mail Spoofing? L-2 CO 1


6. Describe Salami attack? L-2 CO 1
7. Define Cyber crime? L-1 CO 1
8. Write short notes on online frauds? L-2 CO 1
9. What is Hacking. L-2 CO 1
10. List types of motives of attackers. L-1 CO 1
11. Define Spamming. L-1 CO 1
12. Explain about password sniffing. L-2 CO 1
13. What is forgery. L-2 CO 1
Part – B (5 Marks )
1 Discuss about the classification of cyber crimes? L-2 CO 1
2 Explain the types of attacks? L-2 CO 1
3 Describe the various types of cyber criminals? L-2 CO 1
4 Illustrate how criminals plan the attacks? L-3 CO 1
5 Explain about spamming? L-2 CO 1
6 Explain briefly about Computer sabotage and Software piracy. L-2 CO 1
7 Explain Computer network intrusions. L-2 CO 1
8 List the types of cyber threats and Explain. L-1 CO 1
9 Explain who are called as computer criminals. L-2 CO 1
10 Describe Information security and cyber security. L-2 CO 1
Unit – II
Part – A (2 Marks )
4. Explain the types of trend in mobility? L-2 CO 2
5. Define Phishing? L-1 CO 2
6. Describe the phases of attack on mobiles? L-2 CO 2
7. Write short notes on Vishing? L-2 CO 2
8. Explain the various tools and methods used in cyber crime? L-2 CO 2
9. Define Smishing. L-1 CO 2
10. Explain proliferation of mobile devices. L-2 CO 2
11. List the vulnerabilities of mobile. L-1 CO 2
12. Explain about Mobile Viruses? L-2 CO 2
13. Explain proliferation of wireless devices. L-2 CO 2
Part – B (5/7/10/14 Marks )
1 Explain about credit card frauds in mobile & wireless computing? L-2 CO 2
2 Describe the proliferation of mobile and wireless devices? L-2 CO 2
3 Demonstrate the security challenges posed by mobile devices? L-3 CO 2
4 Illustrate the Authentication service security in mobile computing? L-3 CO 2
5 Explain the different ways of password cracking? L-2 CO 2
6 Explain how to protect a mobile phone from being stolen. L-2 CO 2
7 Describe the variants of Mishing. L-2 CO 2
8 Explain the common bluetooth hacking techniques in detail. L-3 CO 2
9 Explain about Malicious code and Insider threats. L-2 CO 2
10 List common bluetooth attack tools.Explain in detail. L-2 CO 2
Unit – III
Part – A (2 Marks )
3. Define cyber law? L-1 CO 3
4. Describe computer forensics? L-2 CO 3
5. List the phases in computer forensics/digital forensics? L-1 CO 3
6. Explain about network forensics? L-2 CO 3
7. Describe cyber forensics? L-2 CO 3
8. List the offences included in IT Act 2000. L-1 CO 3
9. Write a short notes on section 70 ITA 2000. L-1 CO 3
10. Describe about computer trespassing. L-2 CO 3
11. Illustrate the methods of dealing with Spam. L-3 CO 3
12. Write a short notes on section-73 ITA 2000. L-1 CO 3
Part – B (5/7/10/14 Marks )
1 Explain the digital forensics science? L-2 CO 3
2 Describe computer security laws of different countries. L-2 CO 3
3 Explain the need for computer forensics? L-2 CO 3
4 Explain the phases in computer forensics/digital forensics? L-2 CO 3
Illustrate the challenges to Indian law and cyber crime scenario in
5 L-3 CO 3
India?
6 Describe anti-spam laws in Canada. L-2 CO 3
7 Illustrate the weak areas of ITA 2000. L-3 CO 3
8 Briefly explain section 65 and 66 of ITA 2000 in detail. L-4 CO 3
9 Explain about Australian cyber crime act 2001. L-2 CO 3
10 Discuss about rules of digital evidence? L-2 CO 3
Unit – IV
Part – A (2 Marks )
3. Describe cyber terrorism? L-2 CO 4
4. Explain the different perils for organizations? L-2 CO 4
5. Explain about the web threats for organizations? L-2 CO 4
6. Describe Social media Marketing? L-2 CO 4
7. Discuss about the IPR? L-2 CO 4
Explain the security and privacy implications from cloud L-2 CO 4
8.
computing.
9. Discuss the ethical dimension of cybercrimes? L-2 CO 4
10. Describe IP based-blocking and IP based - Cloaking. L-2 CO 4
11. Define copyright and patent. L-1 CO 4
12. Describe Trademark and Trade Name. L-2 CO 4
Part – B (5/7/10/14 Marks )
What are different tools organization is using for social media
1 L-4 CO 4
marking? Explain its risks?
2 Explain about the Intellectual property in cyberspace? L-2 CO 4
Illustrate the precautive measures to be taken during social media
3 L-3 CO 4
marketing?
4 Explain in detail about the IPR issues? L-2 CO 4
5 Demonstrate the ethical dimension of cyber crime? L-3 CO 4
What is insider attack? Explain Heartland payment system fraud?
6 L-2 CO 4
Briefly explain Blue shield blue cross attack?
Explain cost of cyber crimes and consequences associated cyber
7 L-2 CO 4
security incidents?
What is “Web 2.0”? Explain social computing and the associated
8 L-2 CO 4
challenges for organizations?
Who are Hackers? What are the different levels of hackers?
9 L-2 CO 4
Explain generations of hackers?
What are the different spheres of privacy scenarios in terms of user
10 L-2 CO 4
spheres.
Unit - V
Part – A (2 Marks )
1 Describe online gambling? L-2 CO 5
2 List the basic types of financial fraud in businesses? L-1 CO 5
3 Explain about the Indian bank lose millions of rupees? L-2 CO 5
Explain the mini case of an Indian Case of Intellectual Property L-2 CO 5
4
Crime?
5 Define IPR Violation? L-2 CO 5
6 Explain the Example of E mail spoofing instances? L-1 CO 5
7 Define Confidentiality and privacy. L-1 CO 5
8 Explain briefly about phishing incidence. L-2 CO 5
9 Explain briefly shadowcrew- the internet mafia gang. L-2 CO 5
10 Describe briefly pune city police bust nigerian racket. L-2 CO 5
Part – B (5/7/10/14 Marks )
Illustrate the case study of “official website of Maharashtra
1 L-3 CO 5
Government Hacked”?
2 Illustrate the case study of “Parliament Attack”? L-3 CO 5
3 Explain in brief about credit card related frauds? L-2 CO 5
Demonstrate E-mail spoofing instances with an appropriate
4 L-2 CO 5
example?
5 Illustrate the mini-case of “Pune City Police bust Nigerian Racket? L-3 CO 5
Illustrate the incident of cybercrime happened on Indian bank lose
6 L-2 CO 5
millions of rupees?
What do you found on the cyber crime of Indian Case of online
7 L-2 CO 5
Gambling?
Explain the minicase of llustrations of Financial Frauds in Cyber
8 L-4 CO 5
Domain?
9 Illustrate Phishing incidence of financial frauds. L-3 CO 5
L-2
10 Describe about Online credit card theft ring. CO 5
Objective Type Questions Unit-wise with Answers:
Unit-1
1. Which of the following is not a type of cyber crime?
a) Data theft b) Forgery c) Damage to data and systems d) Installing antivirus for protection

2. Which of them is not a wireless attack?


a) Eavesdropping b) MAC Spoofing c) Wireless Hijacking d) Phishing

3. An attempt to harm, damage or cause threat to a system or network is broadly termed as


______
a) Cyber-crime b) Cyber Attack c) System hijacking d) Digital crime

4. Cyber-crime can be categorized into ________ types.


a) 4 b) 3 c) 2 d) 6

5. Which of the following is not done by cyber criminals?


a) Unauthorized account access b) Mass attack using Trojans as botnets
c) Email spoofing and spamming d) Report vulnerability in any system

6. These are a collective term for malicious spying programs used for secretly monitoring
someone’s activity and actions over a digital medium.
a) Malware b) Remote Access Trojans c) Key loggers d) Spyware

7. Stuxnet is a _________
a) Worm b) Virus c) Trojan d) Antivirus

8. ___________ is a violent act done using the Internet, which either threatens any
technology user or leads to loss of life or otherwise harms anyone in order to accomplish
political gain.
a) Cyber-warfare b) Cyber campaign c) Cyber-terrorism d) Cyber attack

9. In general how many key elements constitute the entire security structure?
a) 1 b) 2 c) 3 d) 4

10. According to the CIA Triad, which of the below-mentioned element is not considered in
the triad?
a) Confidentiality b) Integrity c) Authenticity d) Availability

11. This is the model designed for guiding the policies of Information security within a
company, firm or organization. What is “this” referred to here?
a) Confidentiality b) Non-repudiation c) CIA Triad d) Authenticity
12. CIA triad is also known as ________
a) NIC (Nonrepudiation,Integrity,Confidentiality)
b)AIC(Availability,Integrity,Confidentiality)
c) AIN (Availability, Integrity, Nonrepudiation)
d) AIC (Authenticity, Integrity, Confidentiality)

13. When you use the word _____ it means you are protecting your data from getting
disclosed.
a) Confidentiality b) Integrity c) Authentication d) Availability

14. _____ means the protection of data from modification by unknown users.
a) Confidentiality b) Integrity c) Authentication d) Non-repudiation

15. When integrity is lacking in a security system, _________ occurs.


a) Database hacking b) Data deletion c) Data tampering d) Data leakage

16. _______ of information means, only authorized users are capable of accessing the
information.
a) Confidentiality b) Integrity c) Non-repudiation d) Availability

17. Why these 4 elements (confidentiality, integrity, authenticity & availability) are
considered fundamental?
a) They help understanding hacking better
b) They are key elements to a security breach
c) They help understands security and its components better
d) They help to understand the cyber-crime better

18. This helps in identifying the origin of information and authentic user. This referred to here
as __________
a) Confidentiality b) Integrity c) Authenticity d) Availability

19. Data ___________ is used to ensure confidentiality.


a) Encryption b) Locking c) Deleting d) Backup

20. Which of these is not a proper method of maintaining confidentiality?


a) Biometric verification
b) ID and password based verification
c) 2-factor authentication
d) switching off the phone

UNIT-2

1. Which of the following is not an OS for mobile?


a) Symbian b) Windows c) Mango d) Android

2. Mobile Phone OS contains open APIs that may be _____________ attack.


a) Useful for b) vulnerable to c) easy to d) meant for

3. Mobile security is also known as ____________


a) OS Security b) Wireless security c) Cloud security d) Database security

4. DDoS in mobile systems wait for the owner of the _____________ to trigger the attack.
a) Worms b) virus c) botnets d) programs

5. Hackers cannot do which of the following after compromising your phone?


a) Steal your information b) Rob your e-money c) Shoulder surfing d) Spying

6. Which of the following tool is used for Blackjacking?


a) BBAttacker b) BBProxy c) Blackburried d) BBJacking

7. BBProxy tool is used in which mobile OS?


a) Android b) Symbian c) Raspberry d) Blackberry

8. The full form of Malware is ________


a) Malfunctioned Software b) Multipurpose Software c) Malicious Software
d) Malfunctioning of Security

9. XSS is abbreviated as __________


a) Extreme Secure Scripting b) Cross Site Security c) X Site Scripting
d) Cross Site Scripting

10. Compromising a user’s session for exploiting the user’s data and do malicious activities
or misuse user’s credentials is called ___________
a) Session Hijacking b) Session Fixation c) Cookie stuffing d) Session Spying

11. Which of this is an example of physical hacking?


a) Remote Unauthorized access b) Inserting malware loaded USB to a system
c) SQL Injection on SQL vulnerable site d) DDoS (Distributed Denial of Service) attack

12. Which of them is not a wireless attack?


a) Eavesdropping b) MAC Spoofing c) Wireless Hijacking d) Phishing

13. Which method of hacking will record all your keystrokes?


a) Keyhijacking b) Keyjacking c) Keylogging d) Keyboard monitoring

14. _________ are the special type of programs used for recording and tracking user’s
keystroke.
a) Keylogger b) Trojans c) Virus d) Worms

15. Which of the following is not an example of a computer as weapon cyber-crime?


a) Credit card fraudulent b) Spying someone using keylogger c) IPR Violation
d) Pornography
16. Who deploy Malwares to a system or network?
a) Criminal organizations, Black hat hackers, malware developers, cyber-terrorists
b) Criminal organizations, White hat hackers, malware developers, cyber-terrorists
c) Criminal organizations, Black hat hackers, software developers, cyber-terrorists
d) Criminal organizations, gray hat hackers, Malware developers, Penetration testers

17. Wireshark is a ____________ tool.


a) network protocol analysis b) network connection security
c) connection analysis d) defending malicious packet-filtering

18. ___________ is a web application assessment security tool.


a) LC4 b) WebInspect c) Ettercap d) QualysGuard

19. ________ is a password recovery and auditing tool.


a) LC3 b) LC4 c) Network Stumbler d) Maltego

10. 1. Why would a hacker use a proxy server?


A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection.
D. To hide malicious activity on the network.
10. 1. Why would a hacker use a proxy server?
A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection.
D. To hide malicious activity on the network.
1. Why would a hacker use a proxy server?
A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection.
D. To hide malicious activity on the network.
1. Why would a hacker use a proxy server?
A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection.
D. To hide malicious activity on the network.
20. To hide information inside a picture, what technology is used?
a) A. Rootkits b) Bitmapping c) Steganography d) Image Rendering

UNIT-3
1. What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008

2. In which year India’s IT Act came into existence?


a) 2000 b) 2001 c) 2002 d) 2003

3. What is the full form of ITA-2000?


a) Information Tech Act -2000
b) Indian Technology Act -2000
c) Information Technology Act -2000
d) International Technology Act -2000

4. Under which section of IT Act, stealing any digital asset or information is written a
cyber-crime.
a) 65 b) 65-D c) 67 d) 70

5. What is the punishment in India for stealing computer documents, assets or any
software’s source code from any organization, individual, or from any other means?
a) 6 months of imprisonment and a fine of Rs. 50,000
b) 1 year of imprisonment and a fine of Rs. 100,000
d) 3 years of imprisonment and a fine of Rs. 500,000
6. What is the updated version of the IT Act, 2000?
a) IT Act, 2007 b) Advanced IT Act, 2007 c) IT Act, 2008d) Advanced IT Act, 2008

7. In which year the Indian IT Act, 2000 got updated?


a) 2006 b) 2008 c) 2010 d) 2012

8. What type of cyber-crime, its laws and punishments does section 66 of the Indian IT
Act holds?
a) Cracking or illegally hack into any system b) Putting antivirus into the victim
c) Stealing data d) Stealing hardware components

9. Stealing of digital files comes under __________ of the Indian IT Act.


a) section 66-A b) section 66-B c) section 66-C d) section 66-D

10. Sending offensive message to someone comes under _____________ of the Indian IT
Act ______
a) section 66-A, 2000 b) section 66-B, 2008 c) section 67, 2000 d) section 66-
A, 2008

11. Misuse of digital signatures for fraudulent purposes comes under __________ of IT
Act.
a) section 65 b) section 66 c) section 71 d) section 72
12. Using of spy cameras in malls and shops to capture private parts of any person comes
under section 67 of IT Act, 2008 and is punished with imprisonment of ___________
a) 2 years b) 3 years c) 4 years d) 5 years

13. Using spy cameras in malls and shops to capture private parts of any person comes
under _______ of IT Act, 2008.
a) Section 66 b) Section 67 c) Section 68 d) Section 69

14. If anyone publishes sexually explicit type digital content, it will cost that person
imprisonment of _________ years.
a) 2 b) 3 c) 4 d) 5

15. T Act 2008 make cyber-crime details more precise where it mentioned if anyone
publishes sexually explicit digital content then under ___________ of IT Act, 2008
he/she has to pay a legitimate amount of fine.
a) section 67-A b) section 67-B c) section 67-C d) section 67-D

16. Any digital content which any individual creates and is not acceptable to the society,
it’s a cyber-crime that comes under _________ of IT Act.
a) Section 66 b) Section 67 c) Section 68 d) Section 69

17. How many years of imprisonment can an accused person face, if he/she comes under
any cyber-crime listed in section 66 of the Indian IT Act, 2000?
a) 1 year b) 2 years c) 3 years d) 4 years

18. Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined
of around Rs ________
a) 2 lacs b) 3 lacs c) 4 lacs d) 5 lacs

19. Cracking digital identity of any individual or doing identity theft, comes under
__________ of IT Act.
a) Section 65 b) Section 66 c) Section 68 d) Section 70

20. Accessing computer without prior authorization is a cyber-crimes that come under
_______
a) Section 65 b) Section 66 c) Section 68 d) Section 70

UNIT-IV

1. Performing hacking activities with the intent on gaining visibility for an unfair situation
is called ________.
a) Cracking b) Analysis c) Hacktivism d) Exploitation
2. Intellectual Property Rights (IPR) protect the use of information and ideas
that are of
a) Ethical value b) Moral value c) Social value d) Commercial value
3. Which of the following will allow foot printing to be conducted without
detection?
a) PingSwee b) Tracerout c) War d) ARIN

4. What is the most important activity in system hacking?


a) Information gathering b) Cracking passwords
c) Escalating privileges d) Covering tracks

5. Sniffing is used to perform ______________ fingerprinting


a) Passive stack b) Active stack c) Passive banner grabbing d) Scanned

6. Enumeration is part of what phase of ethical hacking.


a)Reconnaissance b) Maintaining Access c) Gaining Access d) Scanning

7. Which of the following is an example of a economic cyber crime?


a) Cyber stalking b) cyber luring c) phishing d) cyber terrorism

8. If the Internet History file has been deleted, ____________ may still provide
Information about what Web sites the user has visited.
a) Cookies b) Metadata c) User profiles d) Sessions

9. What is the purpose of a Denial of Service attack?


A. Exploit a weakness in the TCP/IP stack
B. To execute a Trojan on a system
C. To overload a system so it is no longer operational
D. To shutdown services by turning them off

10. The first phase of hacking an IT system is compromise of which foundation


of security?
A. Availability B. Confidentiality C. Integrity D. Authentication

11. What is the best statement for taking advantage of a weakness in the security
of an IT system?
A. Threat B. Attack C. Exploit D. Vulnerability

12. Which of the following is not a factor in securing the environment against an
attack on security?
A. The education of the attacker
B. The network architecture
C. The business strategy of the company
D. The level of access provided to employees

13. Why would HTTP Tunneling be used?


A. To identify proxy servers B. Web activity is not scanned
C. To bypass a firewall D. HTTP is a easy protocol to work with

14. The investigator-in-charge is suppose to Identifying and collect ______


A. e-evidence B. Proof C. data D. Information

15. Which word best fits with this definition - officials set up a perimeter around a
crime scene?
a. Civilian b. Police Officer c. Law Enforcement d. math

16. the most important thing to keep track of is the______


a. Date and Time b. Data c. Network d. Backup computer

17. What happens when first securing the area?


a. Start looking for evidence b. Make sure that the crime scene is safe
c. Gather evidence d. Make sure computer is on

18. What is the best statement for taking advantage of a weakness in the security of an
IT system?
a. Threat b. Attack c. Exploit d. Vulnerability
19. The area that begins at the end of the last sector that contains logical data and
terminates at the end of the cluster is known as
a. File slack b. ROM slack c. HDD slack d. RAM slack

20. Areas of files and disks that are not apparent to the user, and sometimes not even
to the operating system, is termed:
a. Missing data b. latent data c. exceptional data d. hidden data

UNIT-V

1. What type of attack uses a fraudulent server with a relay address?


A. NTLM B. MITM C. NetBIOS D. SMB

2. ------- are often delivered to a PC through an email attachment and are often designed to do
harm.
A. Spam B. Email C. Portals D. Virus

3. When did the cyber security discourse emerge?


A. 1970 B. 1990 C. 1960 D. 1980

4.What is the referent object in contemporary cyber security?


A.Digitalised sensitive information B.Critical information Infrastructures
C.Govterment IT systems D.Telecomnication networks

5.Whitch of the following tool is used for Wi-Fi hacking?


A.Nessus B.Snort C.wireshark D.Aircrack-ng

6. Whitch of the following is a popular IP address and port scanner?


A.Ettercap B.Snort C.cain and abel D.Angry IP scanner

7. Whitch of the following is not an example of physical data leakage?


A. phishing B. Dumpster diving C. Shoulder surfing D. Printers and photocopiers

8. What is the unauthorized movement of data?


A. Data cracking B. Data infiltration C. Data exfiltration D. Database hacking

9. Whitch of the following is not an information source over the internet for target attackers?
A. Archive sites B. whois C. You Tube D. Nslookup

10. There are __types of scanning in ethical hacking and cyber –security
A. 2 B. 3 C. 4 D. 6

11.__ is not a valid scanning method

A. Null Scan B. Cloud scan C. SYN Stealth scan D. Xmas Tree Scan

12. Which of the following is the most important activity in system hacking?
A. Covering Tracks B. Escalating privileges C. cracking passwords D. information
gathering

13. Which of the followings is the types of scanning?


A. Passive, Active and interactive B. port, network and services C. Server, client and network
D. Network, vulnerability and port

14. Which of the following database is queried by whois?


A. ARIN B. APNIC C. DNS D. ICANN

15. Which of the following is the first computer virus?


A. Creeper B. Blaster C. Sasser D. None of the above

16. We should turn on ___ to protect Our Computer from hacker


A. VLC B. Script C. Antivirus D. Firewall

17. What is code red?


A. Virus B. Script C. photo edit software D. Malware
18. Which of the following is also as malicious software?
A. Badware B. illegalware C. Malware D. Maliciousware

19. ------- is attempts by individuals to obtain confidential information from you to falsifying
their identity.
a) Computer viruses b) Phishing scams c) Phishing trips d) Spyware scams

20. Which of the following describes programs that can run independently travel from system to
system and disrupt computer communication?
a)Viruses b)Trojans c) Droppers d)Worm

MULTIPLE CHOICE QUESTIONS


Answers:
Unit-1 Unit-2 Unit-3 Unit-4 Unit-5
1. D 1. C 1. C 1. C 1. B
2. D 2. B 2. A 2. D 2. D
3. B 3. B 3. C 3. D 3. A
4. C 4. C 4. A 4. B 4. C
5. D 5. C 5. D 5. A 5. D
6. D 6. B 6. C 6. D 6. D
7. A 7. D 7. B 7. D 7. A
8. C 8. C 8. A 8. A 8. C
9. D 9. D 9. C 9. C 9. C
10. C 10. A 10. D 10. B 10. B
11. C 11. B 11. D 11. C 11. B
12. B 12. D 12. B 12. D 12. C
13. A 13. C 13. B 13. C 13. D
14. B 14. A 14. D 14. A 14. D
15. C 15. B 15. A 15. C 15. A
16. D 16. A 16. B 16. A 16. D
17. C 17. A 17. C 17. B 17. A
18. C 18. B 18. D 18. C 18. C
19. A 19. B 19. B 19. A 19. B
20. D 20. C 20. B 20. A 20. B

You might also like