Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 3

Date: 07.04.

2022
COURSE CODE : CSH4376
COURSE NAME: Cybersecurity for Everyone
NAME OF THE DEPARTMENT: Computer Science and Engineering
MAX
DURATION 3 Hours MARKS 100

QUESTIONS
PART A (10 x 2 = 20 marks)
QUESTION
NO. Answer ALL questions CO BTL Marks
All questions carry equal marks

1 List few recent Cyber incident. 1 2 2


2 Infer on characteristics of CIA Triangle. 1 2 2
3 Who are Hackers? 2 1 2
4 Summarize the impact of Cybersecurity in India. 2 1 2
5 Enumerate the need of MAC Address 3 2 2
6 Pharaprase on reconnaissance. 3 2 2
7 What is E-mail Spoofing? 4 1 2
8 Recall the term Hacktivist 4 1 2
9 What is asymmetric cryptography? 5 2 2
10 List the application of IP Security. 5 1 2

PART B (5 x 6 = 30 marks)
QUESTION Answer ALL choosing either (a) or (b) of each question
NO. CO BTL Marks
All questions carry equal marks

11(a) Explain the working of Intrusion Detection Systems (IDS). 1 2 6


OR

During a security audit in an organisation, FTP server is receiving


incoming requests for connection is near or above 1,000 per
11(b) second (1 kHz). Sooner, the server stops working. Identify the 1 3 6
type of attack and suggest a right tool and method to stop this
attack.

12(a) Create a Case Study on Ransomware. 2 2 6


OR

In an organization, Network Administrator identifies their official


12(b) website has been redirected to malicious website and customer’s 2 3 6
information are stolen. As a Cyber Security Engineer, identify the
type of attack and suggest a countermeasure.
13(a) Enumerate various wireless threats and preventive methods. 3 2 6
OR
13(b) Why Mobile phones are highly targeted than Computers. Justify? 3 2 6
14(a) Explain in detail on various stages in Advanced Persistent Threat 4 2 6
progression.
0R
14(b) Explain in detail on ICANN and its working. 4 2 6
15(a) Enumerate the term weaponization and its working principle. 5 2 6
OR
Not all hackers represent a strategic problem for policy makers.
How would you characterize your threatactor? are they chiefly a
15(b) private problem for businesses or a public concern for policy 5 2 6
makers?
PART C (5 x 10 = 50 marks)
QUESTION x CO BTL Marks
NO.
All questions carry equal marks

16(a) Explain in detail on major elements of Cybersecurity. 1 2 10


OR
16(b) Explain in detail on Traceroute and its function. 1 2 10
17(a) What is Hacking and explain various types of Hackers with 2 2 10
example.
OR
In 2017, a cyber attack against Maersk line, a large container
transport company, resulted in thousand of their devices
distributed. The firm eventually rebuilt over 45000 desktops and
17(b) over 2500 servers. Port operations in 76 countries were 2 2 10
disrupted. As a cyber security expert identify what type of attack
would be done by the hackers and justify your answer with neat
diagram.
18(a) With neat diagram explain MITM attack. 3 2 10
OR
A hacker identifies an active connection over the targeted
network and discovers the IP’s of two devices that are
participating in a connection. The hacker identifies two IP address.
18(b) He turned one IP down and resumes communication by spoofing 3 2 10
the IP of disconnected user. Explain in detail how the IP was
turned off and IP is spoofed and the methods to protect from
such attacks.

A company facing a few close misses with phishing emails. The


19(a) company realized they had no proper email security across the 4 2 10
business. As a Cyber security expert suggest a proper security
mechanism.
OR
19(b) Illustrate email security. 4 2 10
20(a) With a neat diagram explain in detail on DDOS attack. 5 2 10
OR

20(b) Enumerate in detail on various government rules and policies to 5 2 10


safegaurd from Cyber attacks.

You might also like