0% found this document useful (0 votes)
58 views

Cyber Security-II Assignment

Uploaded by

anilkewlani17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Cyber Security-II Assignment

Uploaded by

anilkewlani17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Course Name: Cyber Security-II Date: 16/04/2024

Total Marks: 25 MBA-I (Sem-II)


Last Date of Submission: 22/04/2024 ERP No.: Specialization:
Name of the student: Roll No.
Q1. Attempt all the questions (1 mark each)
1. What does the term "phishing" refer to in the context of cybersecurity?
a) A method of encrypting sensitive data
b) A type of malware that spreads through email attachments
c) A social engineering attack that tricks users into divulging sensitive information
d) A technique used to bypass firewalls and gain unauthorized access to networks
2. Which of the following is NOT considered a best practice for creating strong passwords?
a) Using a combination of uppercase and lowercase letters, numbers, and special
characters
b) Using personal information such as birthdates or names
c) Avoiding easily guessable words or phrases d) Changing passwords regularly
3. What is the purpose of encryption in cybersecurity?
a) To prevent unauthorized access to data by converting it into a format that
is unreadable without a decryption key
b) To detect and remove malware from computer systems
c) To authenticate users and control access to networks and systems
d) To monitor and analyze network traffic for suspicious activity
4. What is a firewall?
a) A physical barrier installed around computer systems to prevent physical access
b) A software or hardware-based security measure that monitors and controls incoming
and outgoing network traffic
c) A type of malware that spreads through email attachments
d) A tool used for encrypting sensitive data during transmission
5. What is the purpose of a VPN (Virtual Private Network) in cybersecurity?
a) To protect against viruses and malware by isolating infected devices from
the network
b) To encrypt data transmitted over public networks to ensure confidentiality and
security
c) To authenticate users and control access to sensitive information
d) To detect and prevent unauthorized access to computer systems and networks
6. What is the primary goal of a DDoS (Distributed Denial of Service) attack?
a) To steal sensitive information such as passwords or financial data
b) To encrypt data and demand a ransom for its release
c) To disrupt the normal functioning of a website or online service by overwhelming
it with traffic d
d) To gain unauthorized access to computer systems or networks
7. What is social engineering in the context of cybersecurity?
a) The use of software vulnerabilities to gain unauthorized access to computer systems
b) A method of encrypting sensitive data to prevent unauthorized access
c) The manipulation of individuals to divulge confidential information or
perform actions that compromise security
d) A technique used to detect and remove malware from computer systems

Que. 1 2 3 4 5 6 7
Ans.

1
Q2. Solve the following (4 Marks each)
a) Define Intellectual property? Explain the different types of intellectual property?

2
b) What do you mean by Application Security? Explain the steps involved in securing
database?

Q3. What are the important ethical issues in cyber security? (10 Marks)

3
4
Instructions to the Students:
1. This is an additional credit course and compulsory to earn the credits.
2. Download the cyber security-II assignment, and print it (both side).
3. Solve the assignment on the same print.
4. Submit it on or before 22/04/2024
5. Late submission will not be considered anyhow.

Dr. Bhalchandra Bite Dr. Bhagyashri Kanhere


Course Teacher Academic Coordinator

You might also like