R20
Code No: R20A6202
MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous Institution – UGC, Govt. of India)
III B.Tech I Semester Regular Examinations, December 2022
Cyber Security
(CSE-CS)
Roll No
Time: 3 hours Max. Marks: 70
Note: This question paper Consists of 5 Sections. Answer FIVE Questions, Choosing ONE
Question from each SECTION and each Question carries 14 marks.
***
SECTION-I
1 A Discuss about Internet Governance. [7M]
B Illustrate about CIA Triad. [7M]
OR
2 A Distinguish between Software attacks and Hardware attacks. [7M]
B Explain about Security Models. [7M]
SECTION-II
3 A Discuss about the roles of International Law. [7M]
B Describe the need for Computer Forensics. [7M]
OR
4 A Explain about the INDIAN Cyberspace. [7M]
B Illustrate about various approaches that are used for e-mail forensic. [7M]
SECTION-III
5 A Explain about the trends in Mobility. [7M]
B Illustrate about the attacks on Mobile-Cell Phones. [7M]
OR
6 A Discuss about the Organizational Measures for Handling Mobile. [7M]
B Describe about the Physical Security Countermeasures for protecting [7M]
Laptops.
SECTION-IV
7 A Distinguish about various types of web threats for Organizations. [7M]
B Discuss about social computing and the associated challenges for organizations. [7M]
OR
8 A Explain about the ethical dimension of cybercrimes. [7M]
B Describe the Psychology, mindset and skills of Hackers. [7M]
SECTION-V
9 A Discuss about various Data Privacy attacks. [7M]
B Explain about privacy in financial domain. [7M]
OR
10 A Illustrate about the Fundamental concepts in privacy issues. [7M]
B Explain about Privacy policies in different languages. [7M]
****
Page 1 of 1
, R20
Code No: R20A6202
MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous Institution – UGC, Govt. of India)
III B.Tech I Semester Regular Examinations, December 2022
Cyber Security
(CSE-CS)
Roll No
Time: 3 hours Max. Marks: 70
Note: This question paper Consists of 5 Sections. Answer FIVE Questions, Choosing ONE
Question from each SECTION and each Question carries 14 marks.
***
SECTION-I
1 A Discuss about Internet Governance. [7M]
B Illustrate about CIA Triad. [7M]
OR
2 A Distinguish between Software attacks and Hardware attacks. [7M]
B Explain about Security Models. [7M]
SECTION-II
3 A Discuss about the roles of International Law. [7M]
B Describe the need for Computer Forensics. [7M]
OR
4 A Explain about the INDIAN Cyberspace. [7M]
B Illustrate about various approaches that are used for e-mail forensic. [7M]
SECTION-III
5 A Explain about the trends in Mobility. [7M]
B Illustrate about the attacks on Mobile-Cell Phones. [7M]
OR
6 A Discuss about the Organizational Measures for Handling Mobile. [7M]
B Describe about the Physical Security Countermeasures for protecting [7M]
Laptops.
SECTION-IV
7 A Distinguish about various types of web threats for Organizations. [7M]
B Discuss about social computing and the associated challenges for organizations. [7M]
OR
8 A Explain about the ethical dimension of cybercrimes. [7M]
B Describe the Psychology, mindset and skills of Hackers. [7M]
SECTION-V
9 A Discuss about various Data Privacy attacks. [7M]
B Explain about privacy in financial domain. [7M]
OR
10 A Illustrate about the Fundamental concepts in privacy issues. [7M]
B Explain about Privacy policies in different languages. [7M]
****
Page 1 of 1
Code No: R20A6202
MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous Institution – UGC, Govt. of India)
III B.Tech I Semester Regular Examinations, December 2022
Cyber Security
(CSE-CS)
Roll No
Time: 3 hours Max. Marks: 70
Note: This question paper Consists of 5 Sections. Answer FIVE Questions, Choosing ONE
Question from each SECTION and each Question carries 14 marks.
***
SECTION-I
1 A Discuss about Internet Governance. [7M]
B Illustrate about CIA Triad. [7M]
OR
2 A Distinguish between Software attacks and Hardware attacks. [7M]
B Explain about Security Models. [7M]
SECTION-II
3 A Discuss about the roles of International Law. [7M]
B Describe the need for Computer Forensics. [7M]
OR
4 A Explain about the INDIAN Cyberspace. [7M]
B Illustrate about various approaches that are used for e-mail forensic. [7M]
SECTION-III
5 A Explain about the trends in Mobility. [7M]
B Illustrate about the attacks on Mobile-Cell Phones. [7M]
OR
6 A Discuss about the Organizational Measures for Handling Mobile. [7M]
B Describe about the Physical Security Countermeasures for protecting [7M]
Laptops.
SECTION-IV
7 A Distinguish about various types of web threats for Organizations. [7M]
B Discuss about social computing and the associated challenges for organizations. [7M]
OR
8 A Explain about the ethical dimension of cybercrimes. [7M]
B Describe the Psychology, mindset and skills of Hackers. [7M]
SECTION-V
9 A Discuss about various Data Privacy attacks. [7M]
B Explain about privacy in financial domain. [7M]
OR
10 A Illustrate about the Fundamental concepts in privacy issues. [7M]
B Explain about Privacy policies in different languages. [7M]
****
Page 1 of 1
, R20
Code No: R20A6202
MALLA REDDY COLLEGE OF ENGINEERING & TECHNOLOGY
(Autonomous Institution – UGC, Govt. of India)
III B.Tech I Semester Regular Examinations, December 2022
Cyber Security
(CSE-CS)
Roll No
Time: 3 hours Max. Marks: 70
Note: This question paper Consists of 5 Sections. Answer FIVE Questions, Choosing ONE
Question from each SECTION and each Question carries 14 marks.
***
SECTION-I
1 A Discuss about Internet Governance. [7M]
B Illustrate about CIA Triad. [7M]
OR
2 A Distinguish between Software attacks and Hardware attacks. [7M]
B Explain about Security Models. [7M]
SECTION-II
3 A Discuss about the roles of International Law. [7M]
B Describe the need for Computer Forensics. [7M]
OR
4 A Explain about the INDIAN Cyberspace. [7M]
B Illustrate about various approaches that are used for e-mail forensic. [7M]
SECTION-III
5 A Explain about the trends in Mobility. [7M]
B Illustrate about the attacks on Mobile-Cell Phones. [7M]
OR
6 A Discuss about the Organizational Measures for Handling Mobile. [7M]
B Describe about the Physical Security Countermeasures for protecting [7M]
Laptops.
SECTION-IV
7 A Distinguish about various types of web threats for Organizations. [7M]
B Discuss about social computing and the associated challenges for organizations. [7M]
OR
8 A Explain about the ethical dimension of cybercrimes. [7M]
B Describe the Psychology, mindset and skills of Hackers. [7M]
SECTION-V
9 A Discuss about various Data Privacy attacks. [7M]
B Explain about privacy in financial domain. [7M]
OR
10 A Illustrate about the Fundamental concepts in privacy issues. [7M]
B Explain about Privacy policies in different languages. [7M]
****
Page 1 of 1