Download GTU (Gujarat Technological University Ahmedabad) B.Tech/BE (Bachelor of Technology/ Bachelor of Engineering) 2020 Winter 5th Sem 3150714 Cyber Security Previous Question Paper
Enrolment No.___________
GUJARAT TECHNOLOGICAL UNIVERSITY
BE- SEMESTER?V (NEW) EXAMINATION ? WINTER 2020
Subject Code:3150714 Date:22/01/2021
Subject Name:Cyber Security
Time:10:30 AM TO 12:30 PM Total Marks: 56
Instructions:
1. Attempt any FOUR questions out of EIGHT questions.
2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.
MARKS
Q.1
(a) What is vulnerability in the Internet Crime.
03
(b) Explain Wireshark and how do we use Wireshark to find a password in
04
network?
(c) Explain passive attacks and active attacks with respect to cyber
07
criminals?
Q.2
(a) What is the difference between Threat, Vulnerability, and Risk?
03
(b) Brief Intrusion prevention system - snort? What is the difference
04
between IPS and IDS?
(c) Describe credit card fraud that can be done through mobile or other
07
wireless devices.
Q.3
(a) Discuss advantages and disadvantages of NAT.
03
(b) Discuss Traditional Problems Associated with Computer Crime.
04
(c) What is Pix Firewall Security? How does it differ from a firewall?
07
Q.4
(a) How does Zed Attack Proxy work?
03
(b) What is contemporary approach in criminology in the world of
04
computer science.?
(c) What is Cybercrime? Explain different types of Cybercrimes in detail.
07
Q.5
(a) Explain the need of Digital Forensics.
03
(b) Describe Steganography.
04
(c)
List Brute Force Tools with brief explanation and describe how to
07
Prevent Brute Force Password Hacking?
Q.6
(a) What is the need of cyber law in India?
03
(b) How Buffer overflow attack works?
04
(c) What is Hacking? Explain types of Hackers.
07
Q.7
(a) How can we prevent DDOS attack?
03
(b) Explain attacks on wireless network.
04
(c) Which tools are used for password cracking?
07
Q.8
(a) What is SQL injection?
03
(b) Explain Virus and Worms, Trojan Horses and Backdoors.
04
(c) Why Keyloggers are a threat? How cyber criminals use Keyloggers?
07
*************
1
This post was last modified on 04 March 2021