Important RGPV Question
Table of Contents
ToggleCS- 503 (C) Cyber Security
V Sem, CS
UNIT 1- Introduction of Cyber Crime
Q.1)Β What are the various modes or manner of committing cybercrime?
(RGPV Nov 2023)
Q.2)Β What is internet time theft in cybercrime? What is the 1st cybercrime in India?
(RGPV Nov 2023)
Q.3)Β Where did the term Salami attack come from? Can a single salami attack take away a large sum of money from a single account? If yes explain the process.
(RGPV Nov 2023)
Q.4)Β What are the different layers of cyber security?
(RGPV Nov 2023)
Q.5)Β What are the common cyber-attacks which can be used by Hackers to damage network?
(RGPV Nov 2023)
Q.6)Β Explain the term Cyber Crime. List down some important cyber crimes and explain each of them in two to three sentences.
(RGPV June 2020)
Q.7)Β What are the various classifications of Cyber Crime? Explain each in brief.
(RGPV June 2020)
Q.8)Β Define βSpoofingβ and βSpammingβ in detail. Describe types of spamming in cyber space and give some prevention mechanism regarding email spoofing.
(RGPV June 2020)
Q.9)Β What do you understand by βAttack on web serverβ? Explain the steps taken to avoid web server hacking.
(RGPV June 2020)
Q.10)Β What do you mean by βSalami attackβ? What are its adverse effect on economic structure of society explain with example?
(RGPV June 2020)
UNIT 2- Web jacking
Q.1)Β Write the differences between Session Hijacking and Spoofing?
(RGPV Nov 2023)
Q.2)Β Explain how to prevent session hijacking attacks from happening?
(RGPV Nov 2023)
Q.3)Β Determine the conceptual differences between Spoofing and Session Hijacking.
(RGPV Nov 2022)
Q.4)Β Talk about the different issues and challenges of cybercrime. Also explain the power and characteristics of cyber terrorism.
(RGPV Nov 2022)
Q.5)Β Discuss the different issues and challenges of cybercrime? Also explain the power and characteristics of cyber terrorism.
(RGPV Nov 2022)
Q.6)Β Explain βSession Hijackingβ in detail along with the methods for initiating session hijacking.
(RGPV June 2020)
Q.7)Β Explain βSoftware piracyβ. Write down various activities that constitute software piracy.
(RGPV June 2020)
UNIT 3- Cyber Crime and Criminal justice
Q.1)Β What are the different activities under the jurisdiction of cybercrime laws?
(RGPV Nov 2023)
Q.2)Β What are the monetary penalties under IT Act 2000?
(RGPV Nov 2023)
Q.3)Β Will cybercrime in the coming years affect hackers’ attacks aimed at technology devices of the Internet of things?
(RGPV Nov 2023)
Q.4)Β Explain the term βFraudsβ with reference to cyber crime and define the various types of online frauds.
(RGPV June 2020)
Q.5)Β Explain the term βHackingβ. What are the various classifications of hackers? Mention them.
(RGPV June 2020)
Q.6)Β What do you know about IT Act 2000? Explain in brief.
(RGPV June 2020)
Q.7)Β Write down the objectives and some of the important provisions of Cyber Crimes in the IT Act, 2000.
(RGPV June 2020)
Q.8)Β Explain defamation in the context of cyber crime. List down some important provision about cyber defamation mentioned in Indian penal code 1860.
(RGPV June 2020)
UNIT 4- The Indian Evidence Act of 1872
Q.1)Β What is the Information Technology Act 2000 dealing with who issues the digital signature under the Information Technology Act 2000?
(RGPV Nov 2023)
Q.2)Β What are the different types of evidences required for proving the electronic agreements and how it is protected?
(RGPV Nov 2023)
Q.3)Β What are the various techniques for proofing evidence of digital record?
(RGPV Nov 2023)
Q.4)Β Discuss the importance of digital signatures and certificates in the formation of SSL/TLS-based sessions.
(RGPV Nov 2022)
Q.5)Β Explain Electronic Signature Certificate. What are the duties of subscriber in relation to it?
(RGPV Nov 2022)
UNIT 5- Tools and Methods in Cybercrime
Q.1)Β What is the role of proxy servers and anonymizers in phishing?
(RGPV Nov 2023)
Q.2)Β What is the differences between Trojan horses and Backdoors?
(RGPV Nov 2023)
Q.3)Β Which are more threatening to cyber security between viruses and worms? Describe precisely.
(RGPV Nov 2022)
Q.4)Β Illustrate, how password-based authentication system contributes to strengthening Secure System Design.
(RGPV Nov 2022)
Q.5)Β Analyse how phishing and pharming assaults have affected various web-based transactions.
(RGPV Nov 2022)
Q.6)Β How can attacker inject the malicious code in a specific address and execute it as per requirement using buffer overflow attack? – Explain it with suitable example.
(RGPV Nov 2022)
Q.7)Β Define DoS and DDoS Attacks in brief. What are the techniques behind such attacks?
(RGPV June 2020)
Q.8)Β List down some of the strategies to tackle Cyber crime.
(RGPV June 2020)
Q.9)Β Explain the term Phishing. Write down various methods or activities which constitute phishing.
(RGPV June 2020)
Q.10)Β What do you understand by term VIRUS and WORMS? Give definitions along with their types in detail.
(RGPV June 2020)
EXTRA QUESTIONS-
Q.1)Β Write short note on “Strategies to tackle Cyber Crime and Trends”.
(RGPV Nov 2022)
Q.2)Β Consider the following script:Β
<html><body>
<form name=”attack form”
action=”http://VULNERABLE_APP/attack.php” method=”POST”>
<input type=”hidden” name=”attack_param”
value=”POST_ATTACK”>
</form>
<script type=”text/javascript” >
document.attack_form.submit(); </script>
</body></html>
What type of vulnerabilities can be possible with the above script? Justify your answer with proper explanation.
(RGPV Nov 2022)
Q.3)Β user request.POst[‘user name’] passwd request.POST[‘password’] queryl=”SELECT id FROM users WHERE username=”” + user+”‘ AND password=”‘ + passwd +””””” database.execute(query1)
Analyse the above statements for any threat? If it exists, write the alternative statements to make them safe.
(RGPV Nov 2022)
Q.4)Β Explain the role of cookies in enhancing threats against various web applications?
(RGPV Nov 2022)
Q.5) What are the different types of offence in Information Technology Act 2000? Discuss cyber offence control mechanism under this Act.
(RGPV Nov 2022)
Q.6)Β Discuss the roles of Document Object Model (DOM) in web security. What is cross-window attack?
(RGPV Nov 2022)
Q.7)Β Discuss the importance of TLS handshaking in a secure session establishment.
(RGPV Nov 2022)
— Best of Luck for Exam —