0% found this document useful (0 votes)
187 views1 page

15A05806 Cyber Security

This document contains an exam for a Cyber Security course, with two parts. Part A contains 10 short answer questions about cyber security topics like mobility types, boot sector viruses, keystroke loggers, and social media platforms used by organizations. Part B contains 5 essay questions across 5 units, asking about credit card frauds on mobile devices, SQL injection attacks, legal perspectives in computer forensics, iPod forensic techniques, and security risks in social media marketing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
187 views1 page

15A05806 Cyber Security

This document contains an exam for a Cyber Security course, with two parts. Part A contains 10 short answer questions about cyber security topics like mobility types, boot sector viruses, keystroke loggers, and social media platforms used by organizations. Part B contains 5 essay questions across 5 units, asking about credit card frauds on mobile devices, SQL injection attacks, legal perspectives in computer forensics, iPod forensic techniques, and security risks in social media marketing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Code: 15A05806 R15

B.Tech IV Year II Semester (R15) Advanced Supplementary Examinations July 2019


CYBER SECURITY
(Common to CSE & IT)
Time: 3 hours Max. Marks: 70
PART – A
(Compulsory Question)
*****
1 Answer the following: (10 X 02 = 20 Marks)
(a) List various mobility types.
(b) What is a carputer?
(c) What is a boot sector virus?
(d) What is a key stroke logger?
(e) What is a chain of custody?
(f) Define network forensics.
(g) What is TDMA?
(h) Differentiate between physical and logical acquisition of data from a device.
(i) List the costs associated with cyber security incidents.
(j) List any four social media platforms used by organizations.

PART – B
(Answer all five units, 5 X 10 = 50 Marks)
UNIT – I
2 Describe various credit card frauds in mobile devices.
OR
3 Describe organizational policies and measures in mobile computing era.
UNIT – II
4 Explain SQL injection attacks and its implications.
OR
5 Describe buffer overflow attacks in wireless networks.
UNIT – III
6 Explain legal perspectives in computer forensics.
OR
7 Explain about forensic analysis of E-mails.
UNIT – IV
8 Explain iPod forensic techniques.
OR
9 Describe techno legal challenges with evidence from hand held devices.
UNIT – V
10 Explain the security risks in social media marketing.
OR
11 Explain the importance of privacy of users in the organizations.

*****

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy