CCL R23 I-II QUESTION BANK.docx
Document Details
Uploaded by RejoicingSnail
Tags
Full Transcript
**SoS -- B.Sc. (Digital Forensics)** **I Year II semester (R23)** **CYBER CRIME AND CRIME LAW (MR23-1FSCC05)** +-----------------+-----------------+-----------------+-----------------+ | **Q. No.** | **Question** | **Marks** | **Section** | +=================+=================+=...
**SoS -- B.Sc. (Digital Forensics)** **I Year II semester (R23)** **CYBER CRIME AND CRIME LAW (MR23-1FSCC05)** +-----------------+-----------------+-----------------+-----------------+ | **Q. No.** | **Question** | **Marks** | **Section** | +=================+=================+=================+=================+ | 1 | What do you | 08 Marks | Section-I | | | mean by | | | | | Cybercrime? | | | +-----------------+-----------------+-----------------+-----------------+ | 2 | Discuss who are | 08 Marks | Section-I | | | called as cyber | | | | | criminals? | | | +-----------------+-----------------+-----------------+-----------------+ | 3 | Explain the | 08 Marks | Section-I | | | classification | | | | | of cybercrime | | | | | with examples? | | | +-----------------+-----------------+-----------------+-----------------+ | 4 | Explain how | 08 Marks | Section-I | | | cybercrimes can | | | | | be prevented? | | | +-----------------+-----------------+-----------------+-----------------+ | 5 | Distinguish | 08 Marks | Section-I | | | between a | | | | | computer virus | | | | | and a worm. | | | +-----------------+-----------------+-----------------+-----------------+ | 6 | Discuss the | 08 Marks | Section-I | | | reasons of | | | | | commission of | | | | | cybercrime. | | | +-----------------+-----------------+-----------------+-----------------+ | 7 | Define | 08 Marks | Section-I | | | cybercrime and | | | | | give two | | | | | examples of | | | | | crimes that can | | | | | be classified | | | | | as cybercrimes | | | | | against | | | | | property. | | | +-----------------+-----------------+-----------------+-----------------+ | 8 | Define | 08 Marks | Section-I | | | cybercrime and | | | | | give one | | | | | examples of | | | | | crimes that can | | | | | be classified | | | | | as cybercrimes | | | | | against Govt. | | | +-----------------+-----------------+-----------------+-----------------+ | 9 | a\. Discuss | 08 Marks | Section-I | | | two reasons | | | | | why people | | | | | might be | | | | | motivated to | | | | | commit | | | | | cybercrime. | | | | | (4M) | | | | | | | | | | b\. Briefly | | | | | explain how | | | | | individuals | | | | | can take | | | | | steps to | | | | | protect | | | | | themselves | | | | | from these | | | | | cyber threats | | | | | (prevention). | | | | | (4M) | | | +-----------------+-----------------+-----------------+-----------------+ | 10 | Explain the | 08 Marks | Section-II | | | concept of | | | | | e-mail | | | | | spoofing. How | | | | | can e-mail | | | | | spoofing be | | | | | used in social | | | | | engineering | | | | | attacks? | | | +-----------------+-----------------+-----------------+-----------------+ | 11 | Differentiate | 08 Marks | Section-II | | | between | | | | | traditional | | | | | defamation and | | | | | cyber | | | | | defamation. | | | +-----------------+-----------------+-----------------+-----------------+ | 12 | Explain the | 08 Marks | Section-II | | | salami attack | | | | | technique used | | | | | in cybercrime | | | | | with example. | | | +-----------------+-----------------+-----------------+-----------------+ | 13 | What is forgery | 08 Marks | Section-II | | | in the context | | | | | of cybercrime & | | | | | its laws | | | +-----------------+-----------------+-----------------+-----------------+ | 14 | Explain cyber | 08 Marks | Section-II | | | defamation and | | | | | its laws? | | | +-----------------+-----------------+-----------------+-----------------+ | 15 | Describe email | 08 Marks | Section-II | | | bombing and the | | | | | various types | | | | | of it. | | | +-----------------+-----------------+-----------------+-----------------+ | 16 | What are credit | 08 Marks | Section-II | | | card frauds and | | | | | their types? | | | +-----------------+-----------------+-----------------+-----------------+ | 17 | Define email | 08 Marks | Section-II | | | bombing and its | | | | | types. | | | +-----------------+-----------------+-----------------+-----------------+ | 18 | Explain the | 08 Marks | Section-II | | | following with | | | | | sections | | | | | | | | | | a\) Cyber- | | | | | Pornography | | | | | (4M) | | | | | | | | | | b\) Web | | | | | jacking (4M) | | | +-----------------+-----------------+-----------------+-----------------+ | 19 | Write a short | 08 Marks | Section-II | | | note on | | | | | | | | | | a\) Spamming | | | | | (2M) | | | | | | | | | | b\) Industrial | | | | | spying (2M) | | | | | | | | | | c\) Online | | | | | frauds (2M) | | | | | | | | | | d\) Data | | | | | diddling | | | | | (2M). | | | +-----------------+-----------------+-----------------+-----------------+ | 20 | Explain the | 08 Marks | Section-II | | | Following | | | | | Sections of IPC | | | | | | | | | | a. 383 (2M) | | | | | | | | | | b. 420 (2M) | | | | | | | | | | c. 292 (2M) | | | | | | | | | | d. 464 (2M) | | | +-----------------+-----------------+-----------------+-----------------+ | 21 | Explain the | 08 Marks | Section-III | | | concept of | | | | | Identity Theft | | | | | & its types? | | | +-----------------+-----------------+-----------------+-----------------+ | 22 | a\. Explain | 08 Marks | Section-III | | | Identity | | | | | theft with | | | | | section & | | | | | Techniques of | | | | | Identity | | | | | theft? (4M) | | | | | | | | | | b\. Describe | | | | | Phishing with | | | | | example of | | | | | Phishing | | | | | attack (4M) | | | +-----------------+-----------------+-----------------+-----------------+ | 23 | Define Deep | 08 Marks | Section-III | | | fake, types of | | | | | Deep fakes and | | | | | explain its | | | | | section? | | | +-----------------+-----------------+-----------------+-----------------+ | 24 | Explain Ransom | 08 Marks | Section-III | | | ware Attack | | | | | with an | | | | | example? | | | +-----------------+-----------------+-----------------+-----------------+ | 25 | Explain ATM | 08 Marks | Section-III | | | Skimming and | | | | | its methods of | | | | | Skimming? | | | +-----------------+-----------------+-----------------+-----------------+ | 26 | Explain with | 08 Marks | Section-III | | | sections | | | | | | | | | | a\. Picture | | | | | Morphing (2M) | | | | | | | | | | b\. Camera | | | | | hacking (2M) | | | | | | | | | | c\. Cyber | | | | | Stalking (2M) | | | | | | | | | | d\. Debit card | | | | | cloning (2M) | | | +-----------------+-----------------+-----------------+-----------------+ | 27 | Write a short | 08 Marks | Section-III | | | Note on | | | | | | | | | | a\. Doxing | | | | | (2M) | | | | | | | | | | b\. Cyber | | | | | Grooming (2M) | | | | | | | | | | c\. Juice | | | | | Jacking (2M) | | | | | | | | | | d\. Fake | | | | | Profile with | | | | | Sextortion | | | | | (2M) | | | +-----------------+-----------------+-----------------+-----------------+ | 28 | Write a short | 08 Marks | Section-III | | | Note on | | | | | | | | | | a. | | | | | Exam-Malpractic | | | | | e | | | | | (2M) | | | | | | | | | | b\. Ponzi | | | | | Scheme (2M) | | | | | | | | | | c\. Honey Trap | | | | | (2M) | | | | | | | | | | d\. Key logger | | | | | (2M) | | | +-----------------+-----------------+-----------------+-----------------+ | 29 | Define | 08 Marks | Section-III | | | following | | | | | sections of IT | | | | | Act 2000 | | | | | | | | | | a. 66C | | | | | | | | | | b. 66E | | | | | | | | | | c. 72 | | | | | | | | | | d. 43 | | | +-----------------+-----------------+-----------------+-----------------+ | 30 | Difference | 08 Marks | Section-IV | | | between Cyber | | | | | Crime and | | | | | Conventional | | | | | Crime. | | | +-----------------+-----------------+-----------------+-----------------+ | 31 | Explain | | | | | Conventional | | | | | Crime with | | | | | Parameters? | | | +-----------------+-----------------+-----------------+-----------------+ | 32 | Explain Cyber | | | | | Crime with | | | | | Parameters? | | | +-----------------+-----------------+-----------------+-----------------+ | 33 | Explain why do | 08 Marks | Section-IV | | | we need | | | | | cyber-Laws? | | | +-----------------+-----------------+-----------------+-----------------+ | 34 | Explain about | 08 Marks | Section-IV | | | the positive | | | | | and negative | | | | | Aspects of ITA | | | | | 2000? | | | +-----------------+-----------------+-----------------+-----------------+ | 35 | Describe the | 08 Marks | Section-IV | | | types of domain | | | | | name Disputes. | | | +-----------------+-----------------+-----------------+-----------------+ | 36 | Describe | 08 Marks | Section-IV | | | Hacking with | | | | | help of law and | | | | | the various | | | | | forms of it. | | | +-----------------+-----------------+-----------------+-----------------+ | 37 | Describe the | 08 Marks | Section-IV | | | types of | | | | | Intellectual | | | | | Property | | | | | Rights. | | | +-----------------+-----------------+-----------------+-----------------+ | 38 | Write a short | 08 Marks | Section-IV | | | note | | | | | | | | | | a) | | | | | Cybersquatting | | | | | | | | | | b\) Electronic | | | | | records | | | +-----------------+-----------------+-----------------+-----------------+ | 39 | Difference | 08 Marks | Section-V | | | between | | | | | E-commerce and | | | | | traditional | | | | | commerce | | | +-----------------+-----------------+-----------------+-----------------+ | 40 | Difference | 08 Marks | Section-V | | | between cyber | | | | | security and | | | | | cyber forensic | | | +-----------------+-----------------+-----------------+-----------------+ | 41 | Difference | 08 Marks | Section-V | | | between | | | | | cryptography | | | | | and | | | | | steganography | | | +-----------------+-----------------+-----------------+-----------------+ | 42 | Define | 08 Marks | Section-V | | | Cryptography | | | | | with | | | | | representation | | | | | and example | | | +-----------------+-----------------+-----------------+-----------------+ | 43 | Define | 08 Marks | Section-V | | | steganography | | | | | with | | | | | representation | | | | | and example | | | +-----------------+-----------------+-----------------+-----------------+ | 44 | Explain CIA | 08 Marks | Section-V | | | triad with | | | | | Diagram ? | | | +-----------------+-----------------+-----------------+-----------------+ | 45 | Define Crypto | 08 Marks | Section-V | | | currency. & | | | | | Explain what | | | | | Crypto frauds | | | | | are? | | | +-----------------+-----------------+-----------------+-----------------+ | 46 | Write a short | 08 Marks | Section-V | | | note | | | | | | | | | | a\) Digital | | | | | Evidence | | | | | | | | | | b\) Digital | | | | | Signature | | | | | | | | | | c\) Data | | | | | Privacy | | | | | | | | | | d) | | | | | Confidentiality | | | +-----------------+-----------------+-----------------+-----------------+ | | | | | +-----------------+-----------------+-----------------+-----------------+