Page 79 - CA_165_V2.0_C9_Flipbook
P. 79

B.  Short answer type questions.
                     1.   Expand these abbreviations:
                         i.  CERT-In                                         ii.  LEA
                         iii.  MBR                                           iv.  BSOD

                     2.   Write short notes on:
                         i.  Privacy                                         ii.  Secure Transaction
                         iii.  Spyware                                       iv.  Password
                     3.   What are the various measures to reduce cyber-attack?
                     4.   What is firewall?

                     5.   What are the various categories of cybercrime?
                     6.   What is malware?
                     7.   What is virus?

                     8.   What are worms?
                     9.   Define Trojan horse.
                     10.  Define Spam.
                     11.  Define Program File Virus.
                     12.  Write two examples of each:
                         i.  Worms                     ii.  Trojan Horse          iii.  Virus
                         iv.  Boot Sector Virus        v.  Antivirus              vi.  Operating System
                         vii.  Password                viii. Malware
                 C.  Long answer type questions.
                     1.   What are the various points which we should keep in mind while browsing Internet?

                     2.   List the guidelines for creating non-guessable password.
                     3.   What do you mean by cyber security?
                     4.   Define confidentiality. What kind of data generally comes under confidential category?
                     5.   What are the various ways by which we can protect ourselves from Cyber Stalking?

                     6.   Name the nodal national agency which works for prevention of cybercrime. What are its various functions?
                     7.   What kind of violations can be reported to CERT-In?
                     8.   What are the various symptoms and effects of a virus infection?
                     9.   Define spyware. What measures can we take to prevent attacks of spyware?
                     10.  Write down the steps to perform the following operations:

                         i.  Report incidents to CERT-In                     ii.  Report vulnerability to CERT-In
                 D.  Application based questions.
                     1.     Your school’s account department is required to make a big transaction. How can it be sure that it is
                         making the transaction through a secure website?
                     2.     Your school’s system has been affected by malwares. What precaution would you suggest to offer real time
                         protection and restrict the computer by getting affected by malwares?









                                                                                                 Cyber Safety    77
   74   75   76   77   78   79   80   81   82   83   84