1.
Answer the following question [1*5=5]
a) Which of the following is a cybercrime, where
computer is not being used as a target
(i) Spamming (ii) Squatting
(iii) Spoofing (iv) Snooping
b) A malicious code that replicates itself is called as:
(i) Virus (ii) Worm
(iii) Cookie (iv) BOT
c) Web hijacking is a process of:
(i) Virus (ii) Hacking
(iii) Cookie (iv) BOT
d) Unauthorized access to a third party conversation
is called as:
(i) Denial of Service (ii) Cyber stalking
(iii) Cyber squatting (iv) Eavesdropping
e) Patent law comes under
(i) Denial of Service (ii) IPR
(iii) Cyber squatting (iv) Eavesdropping
2. Answer the following question [1*6=6]
a) IPR
b) VPN
c) DSC
d) DOS
e) VIRUS
f) SPAM
[Link] the following question (any 5) [2*5=10]
a) Explain about cookies?
b) Explain about hacking?
c) Explain about SPAM?
d) Explain about VPN?
e) Explain about FIREWALL?
f) Explain about IPR?
g) Explain about cyber terrorism?
4. Answer the following question? (any 3) [ 3*3=9]
a) Explain Digital signature?
b) Explain Phishing and Vishing?
c) Explain SNOOPING and SPOOFING?
d) Explain virus and types of virus?
5. Answer the following question? (any 1) [ 5*1=5]
a) Briefly explain cyber-crime and explain cyber
crime as a tool?
b) Briefly explain cyber-crime and explain cyber
crime as a target?