0% found this document useful (0 votes)
23 views2 pages

Pec-Cs702e Cse 2022-23

This document is an examination paper for a Cyber Security course at Jalpaiguri Government Engineering College, consisting of objective and long answer type questions. It covers topics such as cybercrime definitions, digital signatures, hash functions, intruders, malicious software, and various authentication methods. The exam has a total of 70 marks and includes specific sections related to IT Acts and cyber law punishments.

Uploaded by

shirraaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views2 pages

Pec-Cs702e Cse 2022-23

This document is an examination paper for a Cyber Security course at Jalpaiguri Government Engineering College, consisting of objective and long answer type questions. It covers topics such as cybercrime definitions, digital signatures, hash functions, intruders, malicious software, and various authentication methods. The exam has a total of 70 marks and includes specific sections related to IT Acts and cyber law punishments.

Uploaded by

shirraaj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

JALPAIGURI GOVERNMENT ENGINEERING COLLEGE

[A GOVERNMENT AUTONOMOUS COLLEGE]


JGEC/B.TECH/CSE/PEC-CS702E/2022-23
2023
CYBER SECURITY

Full Marks: 70 Times: 3 Hours


The figures in the margin indicate full marks.
Candidates are instructed to write the answers in their own words as far as practicable.

GROUP-A
[OBJECTIVE TYPE QUESTIONS]
Answer allquestions 5x2=10
1. Define cybercrime.
2. State the non-repudiation feature of information security.
3. What is SQL injection?
4. Define symmetric and asymmetric cryptography.
5. Define threat and attack on the basis of cyber crime.

GROUP-B
[LONG ANSWER TYPE QUESTIONS]
Answer anyfour questions 4x15=60
6. i) Define Digital signature. Define the RSA approach for digital signature. 2+3
ii) List out the attacks related to Digital Signature. How Digital signature differs from authentication 2+3
protocols?
iii) How MAC differs from digital signature? Write a short note on SSL Certificate. 2+3

7. i) What is the role of compression function in hash function? What is the role of hash function in 2+3
knowledge-based authentication?
ii) Explain the features and properties of hash function? 8
iii) List out some hash algorithm. 2

8. i) Define Intruder. Name three different classes of intruder. 2+2


ii) Define Malicious software. Explain any three malicious software. 2+6
iii) Write a short note on End-to-end encryption. 3

9. i) Explain the cybercrime activities of “Bharatpur Gang” related to sextortion. 5


ii) What is one time password? Explain the OTP-based multi-layer authentication with example. 2+3
iii) What is online grooming? Who is at risk of cyber grooming? How do you know if it’s happening? 5

10. i) Define knowledge, token and biometric based authentications. 3


ii) What are the common attacks to a knowledge-based authentication? What is the way to set a strong and 4
secure password?
iii) How does social engineering help an attacker to guess our password? How can we protect our 3+2
password from social engineering?
iv) Explain password-less authentication system. 3

11. i) Describe different types of cyber attackers with their activities. 8


ii) Explain surface, deep and dark webs with example. 7

12. i) State the applicability of the following section/subsection under IT Acts 2000. a) Section 66B, b) 6
Section 66E, c) Section 66C
ii) State the cyber law and punishment for the following cybercrimes. a) cyber terrorism, b)publishing or 3+4+2
transmitting obscene material in electronic form, c) punishment for tampering computer source
documents
____________

You might also like