0% found this document useful (0 votes)
221 views2 pages

Answer Key - CyberSecurity

Uploaded by

anandsoni9179
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
221 views2 pages

Answer Key - CyberSecurity

Uploaded by

anandsoni9179
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

CS- 503 (C) Cyber Security

Answer Key
Unit 1: Introduction of Cyber Crime and its Classifications:

1. B) Cybercrime
2. C) Lack of skilled cybercriminals
3. A) Identity theft
4. B) To steal sensitive information by impersonating a legitimate email sender
5. A) Phishing
6. A) Unauthorized use of an organization's internet connection or computer resources for personal
purposes
7. D) Salami Attack/Salami Technique
8. B) Email servers
9. C) Manipulating financial transactions by siphoning off small amounts of money
10. C) Implementing email authentication protocols like SPF and DKIM

Unit 2: Cyber Crimes and Criminal Perceptions:

1. C) Cyber fraud
2. B) To gain unauthorized access to computer networks
3. B) Secondary evidence
4. D) By comparing the signature with handwritten samples
5. B) False and damaging information about individuals online
6. C) Sending offensive or threatening messages via email
7. C) Strengthening cybersecurity measures
8. A) Web Jacking
9. B) Deceiving individuals or organizations for financial gain using the internet
10. B) As cybercriminals engaging in illegal activities for political or ideological motives

Unit 3: Indian Evidence Act of 1872 vs. Information Technology Act, 2000:

1. A) The Indian Evidence Act does not recognize electronic records as evidence, whereas the IT Act
does.
2. C) Electronic records are admissible as secondary evidence.
3. B) Electronic records are admissible as primary evidence.
4. A) Digital verification
5. B) Presenting a digital certificate issued by a licensed certifying authority
6. A) Its relevance to the case and authenticity
7. D) Producing a printed copy of the agreement with digital signatures
8. A) Spoofing
9. A) It ensures the integrity and authenticity of the evidence from its creation to presentation in court.
10. D) All of the above

Unit 4: Tools and Methods in Cybercrime:


1. B) To hide the identity and location of the user
2. D) To bypass password authentication
3. A) Keylogger
4. C) It monitors user activity without their knowledge or consent
5. B) To damage or disrupt computer operations
6. D) Block access to certain websites or services
7. C) Denial-of-Service (DoS) attacks
8. B) Distributed Denial-of-Service
9. B) Phishing
10. B) Phishing

Unit 5:

1. B) To hide the identity and location of the user

2. D) To bypass password authentication

3. A) Keylogger

4.C) It monitors user activity without their knowledge or consent

5. B) To damage or disrupt computer operations

6. B) Perform actions without the user's knowledge or consent

7. A) A security vulnerability that allows unauthorized access to a computer system

8. C) To disrupt or disable the normal functioning of a computer network

9. B) Distributed Denial-of-Service

10. B) Phishing

You might also like