0% found this document useful (0 votes)
66 views2 pages

V88/V89/V90/V91/M12/M17/P79/GEN121 TO GEN403/EE/20160523: Time: 3 Hours Marks: 80 Instruction

This document outlines instructions for a 3 hour exam worth 80 marks. It is divided into 4 sections with 5 sub-questions each. Students must answer any 4 sub-questions per section, with each answer between 75-100 words worth 5 marks. The sub-questions cover topics like data protection, online threats, securing email and social media accounts, ransomware, phishing, computer and mobile security, malware, and internet safety.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views2 pages

V88/V89/V90/V91/M12/M17/P79/GEN121 TO GEN403/EE/20160523: Time: 3 Hours Marks: 80 Instruction

This document outlines instructions for a 3 hour exam worth 80 marks. It is divided into 4 sections with 5 sub-questions each. Students must answer any 4 sub-questions per section, with each answer between 75-100 words worth 5 marks. The sub-questions cover topics like data protection, online threats, securing email and social media accounts, ransomware, phishing, computer and mobile security, malware, and internet safety.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

V88/V89/V90/V91/M12/M17/P79/GEN121 TO GEN403/EE/20160523

Time : 3 Hours Marks : 80

Instruction :
1. All Questions are Compulsory.
2. Each Sub-question carry 5 marks.
3. Each Sub-question should be answered between 75 to 100 words. Write every questions
answer on separate page.
4. Question paper of 80 Marks, it will be converted in to your programme structure marks.

1. Solve any four sub-questions.


a) List Data Protection Do's and Don'ts with suitable explanation. 5
b) What are online threats? List and explain them with precautionary measure. 5
c) Explain steps involved in securing G-mail Account. 5
d) Explain Social Engineering and phishing with example. 5
e) Risk and threats involved in mobile security. 5

2. Solve any four sub-questions.


a) List and explain positive and negative sides of social media. 5
b) What is ransomware, explain in detail with example. 5
c) How can you identify a phishing attack? 5
d) List and explain practices to secure your computer. 5
e) Explain the steps that should be taken post ransomware attack. 5

3. Solve any four sub-questions.


a) Explain how quick heal helps in securing your computer. 5
b) Explain types of phishing attacks. 5
c) Write a note on data privacy. 5
d) What is sandbox browser. 5
e) List do's and don'ts of internet security. 5

KA16-1111 V88/V89/V90/V91/M12/M17/P79/GEN121 TO GEN403/EE/20160523 : 1 (P.T.O.)


4. Solve any four sub-questions.
a) What are the risks and threats to android phone? 5
b) List and explain web based attacks. 5
c) How can you overcome Facebook addiction?
d) What is Malware. Explain different types of malwares. 5
e) What are the uses of mobile device? 5

sssssss

KA16-1111 V88/V89/V90/V91/M12/M17/P79/GEN121 TO GEN403/EE/20160523 : 2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy