4 2 Cyber Security Ob Paper 1
4 2 Cyber Security Ob Paper 1
4 2 Cyber Security Ob Paper 1
G.PULLAIAH COLLEGE OF ENGINEERING & TECHNOLOGY (AT) G.PULLAIAH COLLEGE OF ENGINEERING & TECHNOLOGY (AT)
IV B.Tech II Semester 1st Mid Examination - Objective IV B.Tech II Semester 1st Mid Examination - Objective
Branch: Computer Science and Engineering Branch: Computer Science and Engineering
Sub: CYBER SECURITY Date: 22-02-19 Sub: CYBER SECURITY Date: 22-02-19
Time: 20 mins Max.Marks:10 Time: 20 mins Max.Marks:10
============================================================= =============================================================
Answer all the following: Answer all the following:
Multiple choice questions: Multiple choice questions:
1) Bluetooth hacking tools [ ] 1) Bluetooth hacking tools [ ]
a) car whisperer b) Trojan horse c) trapdoor d) all of the above a) car whisperer b) Trojan horse c) trapdoor d) all of the above
2) The security of RAS system involves [ ] 2) The security of RAS system involves [ ]
a) server b) client c) data transmission d) all of the above a) server b) client c) data transmission d) all of the above
3) NIST stands for [ ] 3) NIST stands for [ ]
a)National industry of standards and technology a)National industry of standards and technology
b)National international of standards and technology b)National international of standards and technology
c)National internet of standards and technology c)National internet of standards and technology
d)National institute of standards and technology d)National institute of standards and technology
4) IMEI stands for [ ] 4) IMEI stands for [ ]
a)International mobile equipmental identity a)International mobile equipmental identity
b)International mobile equipments identity b)International mobile equipments identity
c)International mobile equipment identity c)International mobile equipment identity
d)International mobile equipmention identity d)International mobile equipmention identity
5) The most profitable uses of the information gained through a vishing attack 5) The most profitable uses of the information gained through a vishing attack
include [ ] include [ ]
a)Identity theft b)purchasing luxury goods and services a)Identity theft b)purchasing luxury goods and services
c)transferring money/funds d)all of the above c)transferring money/funds d)all of the above
6) To hide information side a picture, what technology is used? [ ] 6) To hide information side a picture, what technology is used? [ ]
a)Root kits b)Bitmapping c)Steganography d)Image Rendering a)Root kits b)Bitmapping c)Steganography d)Image Rendering
7) The first phase of hacking an IT system is compromise of which foundation 7) The first phase of hacking an IT system is compromise of which foundation
of security? [ ] of security? [ ]
a) Availability b) Confidentiality c) Integrity d) Authentication a) Availability b) Confidentiality c) Integrity d) Authentication
8) What type of password attack would be most successful against the 8) What type of password attack would be most successful against the
password T63k#s23A? [ ] password T63k#s23A? [ ]
a) Dictionary b) Hybrid c) Password guessing d)Brute force a) Dictionary b) Hybrid c) Password guessing d)Brute force
9) Keyloggers are a form of ______________. [ ] 9) Keyloggers are a form of ______________. [ ]
a)spyware b) Shoulder surfing c) Trojan d) Social engineering a)spyware b) Shoulder surfing c) Trojan d) Social engineering
10) What is the most significant legal issue in computer forensics? [ ] 10) What is the most significant legal issue in computer forensics? [ ]
a) Preserving Evidence b) Seizing Evidence a) Preserving Evidence b) Seizing Evidence
c) Admissibility of Evidence d) Discovery of Evidence c) Admissibility of Evidence d) Discovery of Evidence
Fill in the blanks: Fill in the blanks:
11) _______________ is the crime that involves a computer and a network. 11) _______________ is the crime that involves a computer and a network.
12) _____________ is where the information held on either the magnetic 12) _____________ is where the information held on either the magnetic
strip on the back of the credit card or the data stored on the smart chip are strip on the back of the credit card or the data stored on the smart chip are
copied from one card to another. copied from one card to another.
13) The two components of security in mobile computing are ______________ 13) The two components of security in mobile computing are ______________
and ______________ and ______________
14) Computer Forensics is known as _______________________ approach to 14) Computer Forensics is known as _______________________ approach to
network and computer security. network and computer security.
15) The best defense against any type of sniffing is ________________ 15) The best defense against any type of sniffing is ________________
11) The best defense against any type of sniffing is ________________ 11) The best defense against any type of sniffing is ________________
12) _______________ is the crime that involves a computer and a network. 12) _______________ is the crime that involves a computer and a network.
13) Computer Forensics is known as _______________________ approach to 13) Computer Forensics is known as _______________________ approach to
network and computer security. network and computer security.
14) _____________ is where the information held on either the magnetic 14) _____________ is where the information held on either the magnetic
strip on the back of the credit card or the data stored on the smart chip are strip on the back of the credit card or the data stored on the smart chip are
copied from one card to another. copied from one card to another.
15) The two components of security in mobile computing are ______________ 15) The two components of security in mobile computing are ______________
and ______________ and ______________