FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download GTU B.Tech 2020 Winter 5th Sem 3150714 Cyber Security Question Paper

Download GTU (Gujarat Technological University Ahmedabad) B.Tech/BE (Bachelor of Technology/ Bachelor of Engineering) 2020 Winter 5th Sem 3150714 Cyber Security Previous Question Paper

This post was last modified on 04 March 2021

GTU B.Tech 2020 Winter Question Papers || Gujarat Technological University


FirstRanker.com

GUJARAT TECHNOLOGICAL UNIVERSITY
BE- SEMESTER-V (NEW) EXAMINATION - WINTER 2020

--- Content provided by‌ FirstRanker.com ---

Subject Code:3150714 Date:22/01/2021
Subject Name:Cyber Security
Time:10:30 AM TO 12:30 PM Total Marks: 56

Instructions:
1. Attempt any FOUR questions out of EIGHT questions.

--- Content provided by‌ FirstRanker.com ---

2. Make suitable assumptions wherever necessary.
3. Figures to the right indicate full marks.

MARKS

Q.1 (a) What is vulnerability in the Internet Crime. 03
(b) Explain Wireshark and how do we use Wireshark to find a password in 04 network?

--- Content provided by⁠ FirstRanker.com ---

(c) Explain passive attacks and active attacks with respect to cyber 07 criminals?

Q.2 (a) What is the difference between Threat, Vulnerability, and Risk? 03
(b) Brief Intrusion prevention system - snort? What is the difference 04 between IPS and IDS?
(c) Describe credit card fraud that can be done through mobile or other 07 wireless devices.

Q.3 (a) Discuss advantages and disadvantages of NAT. 03

--- Content provided by FirstRanker.com ---

(b) Discuss Traditional Problems Associated with Computer Crime. 04
(c) What is Pix Firewall Security? How does it differ from a firewall? 07

Q.4 (a) How does Zed Attack Proxy work? 03
(b) What is contemporary approach incriminology in the world of 04 computer science.?
(c) What is Cybercrime? Explain different types of Cybercrimes in detail. 07

--- Content provided by FirstRanker.com ---

Q.5 (a) Explain the need of Digital Forensics. 03
(b) Describe Steganography: 04
(c) List Brute Force Tools with brief explanation and describe how to 07 Prevent Brute Force Password Hacking?

Q.6 (a) What is the need of cyber law in India? 03
(b) How Buffer overflow attack works? 04

--- Content provided by​ FirstRanker.com ---

(c) What is Hacking? Explain types of Hackers. 07

Q.7 (a) How can we prevent DDOS attack? 03
(b) Explain attacks on wireless network. 04
(c) Which tools are used for password cracking? 07

Q.8 (a) What is SQL injection? 03

--- Content provided by⁠ FirstRanker.com ---

(b) Explain Virus and Worms, Trojan Horses and Backdoors. 04
(c) Why Keyloggers are a threat? How cyber criminals use Keyloggers? 07

FirstRanker.com


--- Content provided by⁠ FirstRanker.com ---


This download link is referred from the post: GTU B.Tech 2020 Winter Question Papers || Gujarat Technological University