0% found this document useful (0 votes)
17 views2 pages

Cyber Security BTETPE703F

Cybersecurity and digital image processing pyq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views2 pages

Cyber Security BTETPE703F

Cybersecurity and digital image processing pyq
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DR.

BABASAHEB AMBEDKAR TECHNOLOGICAL UNIVERSITY, LONERE –


RAIGAD -402 103
Summer Supplementary –2023
-------------------------------------------------------------------------------------------------------
Branch: Electronics and Telecommunication Engineering Sem.:- VII

Subject with Subject Code: - Cyber Security BTETPE703F Marks: 60


Date:-18/07/2023 Time:- 3 Hr.
============================================================
Instructions to the Students
1. Each question carries 12 marks.
2. Attempt ALL questions.
3. Illustrate your answers with neat sketches, diagram etc., wherever necessary.
4. If some part or parameter is noticed to be missing, you may appropriately
assume it and should mention it clearly
_____________________________________________________________________
(Level) (Marks)
Q.1 Solve Any Two Questions from the following:
A) What are the Challenges in e-Governance? L1 (06)

B) What is cybercrime? What are the main types of cyber crime? Explain them. L2 (06)

C) What is the international convention on cyber crime? How it helps in L2 (06)


Securing Cyberspace?

Q.2 Solve Any Two Questions from the following:


A) What is Cyber Security Vulnerabilities? Give Examples of Cyber Security L1 (06)
Vulnerabilities.
B) What are the main Causes of Cyber Security Vulnerabilities? Explain in L2 (06)
short.

C) What is an Intrusion Detection System? Give basic classification of L3 (06)


Intrusion Detection Systems.

Q.3 Solve Any Two Questions from the following:


A) Write a note on Security of HTTP. L1 (06)

B) What is identity management in cyber security? Why is it required? L1 (06)

C) What is Cyber Espionage? What are its common attack techniques? L3 (06)
Q.4 Solve Any Two Questions from the following:
A) What is Phishing and how does it affect email users? How to protect oneself L2 (06)
from it?

B) What is a Firewall? What are the Limitations of a Firewall? L1 (06)

C) What are Transport Layer Securities (TLS) used for? What are the benefits L2 (06)
of TLS?

Q.5 Solve Any Two Questions from the following:


A) What is Cyber forensics? Explain its importance. L1 (06)

B) Explain in brief the techniques that cyber forensic investigators use. L2 (06)

C) What is the National Cyber Security Policy, 2013? What are the main L2 (06)
Objectives of the National Cyber Security Policy, 2013?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy