0% found this document useful (0 votes)
4 views2 pages

CSL QB

Uploaded by

B06SHRUTI JAGTAP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views2 pages

CSL QB

Uploaded by

B06SHRUTI JAGTAP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

MUMBAI UNIVERSITY STUDENTS ASSOCIATION (MUSA)

QUESTION BANK OF CYBER SECURITY AND LAWS


B.E SEM-VII BRANCH: COMPS FOR WINTER SESSION – NOVEMBER 2024

Q.1) Explain classification and types of cybercrime with examples.

Q.2) What do you understand by DOS and DDOS attack? Explain in details.

Q.3) What are the objectives and features of IT Act 2000.

Q.4) Explain SQL Injection attacks and their steps also? State different counter measure to prevent
the attack.

Q.5) Explain various types of credit card frauds.

Q.6) Explain the types of E-Commerce models. What are the advantages and disadvantages of it.

Q.7) Explain different types of Intellectual property rights in India.

Q.8) What is of e-contrast and their types? Discuss elements of e-contrast and Act.

Q.9) Discuss steps involved in planning of cyberattacks by criminal.

Q.10) Why do we need cyber laws? Discuss the challenges to Indian cyber laws.

Q.11) Explain the term evidence and different types of evidence.

Q.12) Explain Intellectual property and their different types Aspects in cyber law.

Q.13) What are illegal activities observed in cyber cafes? What are safety and security measures
while using the computer in Cybercafé?

Q.14) Explain electronic banking in India and what are laws related to electronic banking in India.

Q.15) What are Botnets? How it is exploit by attacker to cause cyberattack?

Q.16) What are the different security risks for organizations?

Q.17) Explain methods of password cracking.

Q.18) Explain different buffer overflow attack also explain how to migrate buffer overflow attack.

Q.19) Explain Phishing and Identity theft in detail.

Q.20) Explain Information Security Standard and Explain HIPPA act in detail.

Q.21) Explain Bluetooth hacking with various tools.


Q.21) Explain various challenges posed by mobile devices. What are the basic security precautions
to be taken to safeguard Laptops and Wireless devices.

Q.22) Differentiate between the following:

i) Cybercrime and cyber fraud.


ii) Ethical hacker and malicious hacker.

Q.23) Write a short note on:

i) Digital signature
ii) SOX
iii) Salami attack
iv) Cyberstalking and harassment
v) Keylogger

*****ALL THE BEST*****

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy