GUJARAT TECHNOLOGICAL UNIVERSITY
BE- SEMESTER-V (NEW) EXAMINATION - WINTER 2020
--- Content provided by FirstRanker.com ---
Subject Code:3150714 Date:22/01/2021Subject Name:Cyber Security
Time:10:30 AM TO 12:30 PM Total Marks: 56
Instructions:
1. Attempt any FOUR questions out of EIGHT questions.
--- Content provided by FirstRanker.com ---
2. Make suitable assumptions wherever necessary.3. Figures to the right indicate full marks.
MARKS
Q.1 (a) What is vulnerability in the Internet Crime. 03
(b) Explain Wireshark and how do we use Wireshark to find a password in 04 network?
--- Content provided by FirstRanker.com ---
(c) Explain passive attacks and active attacks with respect to cyber 07 criminals?Q.2 (a) What is the difference between Threat, Vulnerability, and Risk? 03
(b) Brief Intrusion prevention system - snort? What is the difference 04 between IPS and IDS?
(c) Describe credit card fraud that can be done through mobile or other 07 wireless devices.
Q.3 (a) Discuss advantages and disadvantages of NAT. 03
--- Content provided by FirstRanker.com ---
(b) Discuss Traditional Problems Associated with Computer Crime. 04(c) What is Pix Firewall Security? How does it differ from a firewall? 07
Q.4 (a) How does Zed Attack Proxy work? 03
(b) What is contemporary approach incriminology in the world of 04 computer science.?
(c) What is Cybercrime? Explain different types of Cybercrimes in detail. 07
--- Content provided by FirstRanker.com ---
Q.5 (a) Explain the need of Digital Forensics. 03
(b) Describe Steganography: 04
(c) List Brute Force Tools with brief explanation and describe how to 07 Prevent Brute Force Password Hacking?
Q.6 (a) What is the need of cyber law in India? 03
(b) How Buffer overflow attack works? 04
--- Content provided by FirstRanker.com ---
(c) What is Hacking? Explain types of Hackers. 07Q.7 (a) How can we prevent DDOS attack? 03
(b) Explain attacks on wireless network. 04
(c) Which tools are used for password cracking? 07
Q.8 (a) What is SQL injection? 03
--- Content provided by FirstRanker.com ---
(b) Explain Virus and Worms, Trojan Horses and Backdoors. 04(c) Why Keyloggers are a threat? How cyber criminals use Keyloggers? 07
--- Content provided by FirstRanker.com ---
This download link is referred from the post: GTU B.Tech 2020 Winter Question Papers || Gujarat Technological University