Firstranker's choice
Hall Ticket No
--- Content provided by FirstRanker.com ---
Question Paper Code: BCSB11
Time: 3 Hours
M.Tech II Semester End Examinations (Regular) - May, 2019
Regulation: R18
CYBER SECURITY
(CSE)
--- Content provided by FirstRanker.com ---
Answer ONE Question from each Unit
All Questions Carry Equal Marks
All parts of the question must be answered in one place only
UNIT I Max Marks: 70
-
- Explain in detail about various types of cyber crime and discuss briefly about Web Server.[7M]
- Explain the n-tier web application architecture with an example. [7M]
--- Content provided by FirstRanker.com ---
-
- Explain about public key cryptography, its applications with an example. [7M]
- Describe the overview of cybercrime, nature and scope of cybercrime. [7M]
--- Content provided by FirstRanker.com ---
UNIT - II
-
- Apply RSA algorithm to perform encryption and decryption for the p = 3; q = 11, e = 7;M = 5. [7M]
- Describe briefly about mail bombs and exploitation and various web attacks. [7M]
-
- What are digital laws and legislation. What are the roles and responses of law enforcement. Explain. [7M]
- Explain security management system in online shopping and payment gateway system. [7M]
--- Content provided by FirstRanker.com ---
UNIT - III
-
- Differentiate between symmetric and asymmetric encryptions [7M]
- Explain briefly about cybercrime investigation tools. [7M]
--- Content provided by FirstRanker.com ---
-
- Explain about e-mail tracking, IP tracking and digital evidence collection? [7M]
- What step you will take to conclude that a URL is malicious and steps will you take when you encounter a malicious URL. [7M]
UNIT IV
--- Content provided by FirstRanker.com ---
-
- What are the advanced tools used for forensics software and hardware analysis explain. [7M]
- Can a computer spoof a tcp connection to frame another computer in the same broadcast domain? If so, explain in detail how? If not, explain why not. [7M]
-
- Explain briefly the concept of digital forensics with example. [7M]
- Explain in detail about how forensics helps in face,iris, fingerprint recognition, audio video analysis. [7M]
--- Content provided by FirstRanker.com ---
Firstranker's choice
UNIT - V
--- Content provided by FirstRanker.com ---
-
- Explain in detail how large scale applications are protected from unauthorized users. [7M]
- Explain the digital evidence handling procedure and evidence control. [7M]
-
- List and explain all the sections of the electronic communication privacy act. Give example situation where a criminal is let free due to the drawbacks in electronic communication privacy act. [7M]
- Assume you are developing a website of a UNIVERSITY. List all the JDBC APIs and JDBC drivers used to develop the software. [7M]
--- Content provided by FirstRanker.com ---
-?-
--- Content provided by FirstRanker.com ---
This download link is referred from the post: DBATU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. Babasaheb Ambedkar Technological University