CO-Wise Question Bank
Subject Code: BCC401 Subject Name: Cyber Security
S.No. COx Q.No. Question (Statement) – Appeared in AKTU end Sem. Exams
1 1 Define cybercrime and briefly explain its origins.
2 2 What is information security, and how does it relate to cybercrime?
3 3 Who are cybercriminals, and what motivates them?
Discuss the evolution of the term "cybercrime" and its significance
4 4
in contemporary society.
Explain the relationship between information security and
5 5
cybercrime prevention.
Compare and contrast different types of cybercriminals based on
CO-1
6 6
their motives and methods.
Propose innovative strategies for enhancing global cybersecurity
7 7
resilience in the face of evolving cyber threats.
Discuss the ethical dilemmas faced by cybersecurity professionals
8 8
in balancing security measures with individual privacy rights.
Evaluate the impact of emerging technologies on the landscape of
9 9
cybercrimes and cybersecurity.
Analyze case studies of prominent cybercrimes and their
10 10
implications for cybersecurity policies and practices.
Propose strategies for building a resilient mobile security posture
11 1
that aligns with organizational goals and compliance requirements.
Examine the challenges and opportunities presented by the
12 2 integration of IoT (Internet of Things) devices with mobile
computing.
Discuss the role of cybersecurity awareness training in mitigating
13 3
risks associated with mobile device usage in organizations.
Discuss the security implications of integrating mobile devices into
14 4
organizational workflows.
Critically analyze the vulnerabilities exploited by attackers to
CO-2
15 5
compromise mobile/cell phones.
Explain the significance of registry settings in mitigating security
16 6
risks on mobile devices.
What are some security policies and measures organizations can
17 7
adopt in the mobile computing era?
Describe the proliferation of mobile and wireless devices in recent
18 8
years.
What are the key trends in mobility concerning mobile and wireless
19 9
devices?
What are mobile and wireless devices, and why are they significant
20 10
in the context of cybercrime?
21 1 What is the significance of tools and methods in cybercrime?
Define proxy servers and anonymizers and explain their role in
CO-3
22 2
cybercrime.
23 3 What is phishing, and how does it work?
24 4 Briefly explain the concept of password cracking.
Evaluate the impact of DoS and DDoS attacks on targeted systems
25 5
and networks.
Analyze real-world examples of SQL injection attacks and their
26 6
consequences.
Discuss mitigation strategies for preventing buffer overflow
27 7
vulnerabilities.
Discuss the ethical dilemmas faced by cybersecurity professionals
28 8
in combating cybercrime.
Examine the role of cybersecurity education and awareness in
29 9
mitigating cyber threats targeting buffer overflow vulnerabilities.
Explore the techniques used by cybercriminals to evade detection
30 10
and removal of Trojan horses and backdoors.
31 1 What is the purpose of computer forensics?
Define digital forensics science and its significance in investigating
32 2
cybercrimes.
33 3 Differentiate between cyber forensics and digital evidence.
Explain the significance of the digital forensics life cycle in
34 4
ensuring thorough and accurate investigations.
Discuss the techniques and tools used in network forensics
35 5
investigations.
CO-4
Analyze case studies of computer forensics investigations,
36 6
highlighting key challenges and lessons learned.
Propose a comprehensive framework for conducting computer
37 7 forensics investigations, considering legal, ethical, and technical
aspects.
Critically assess the effectiveness of current approaches to social
38 8
media forensics in addressing security and privacy threats.
Discuss the potential impact of emerging technologies such as
39 9
blockchain and IoT on computer forensics practices.
40 10 Define the concept of chain of custody in computer forensics.
41 1 Define the Digital Personal Data Protection Act 2023 and its scope.
Discuss the importance of addressing intellectual property issues in
42 2
cybersecurity.
Provide an overview of intellectual property-related legislation in
43 3
India.
44 4 Explain the concept of a patent.
Discuss the implications of the Digital Personal Data Protection Act
45 5
2023 on data privacy and protection.
CO-5
Evaluate the role of trademarks in brand protection and consumer
46 6
trust.
Discuss the ethical considerations surrounding the use of patented
47 7
technologies in cybersecurity solutions.
Discuss the implications of intellectual property legislation on
48 8
technology transfer and knowledge sharing in India.
Discuss the role of government agencies and industry bodies in
49 9 promoting cybersecurity awareness and compliance with cyber laws
in India.
50 10 Explain the significance of trademarks in business.
Assignment 1
Cyber Security (BCC401)
CO1 mm-10
1. Define cybercrime and briefly explain its origins.
2. What is information security, and how does it relate to cybercrime?
3. Analyze the impact of cybercrimes on a global scale, considering various regions and
nations.
4. Evaluate the effectiveness of strategies employed by netizens to protect themselves
from cybercrimes.
5. Propose innovative strategies for enhancing global cyber security resilience in the face
of evolving cyber threats.
Assignment 2
Cyber Security (BCC401)
CO2 mm-10
1. What are mobile and wireless devices, and why are they significant in the context of
cybercrime?
2. Describe the proliferation of mobile and wireless devices in recent years.
3. Assess the security challenges posed by BYOD (Bring Your Own Device) policies in
organizations.
4. Explain the significance of registry settings in mitigating security risks on mobile
devices.
5. Explore innovative approaches to securing mobile devices against advanced persistent
threats (APTs) and zero-day exploits.
Assignment 3
Cyber Security (BCC401)
CO3 mm-10
1. What is the significance of tools and methods in cybercrime?
2. Define proxy servers and anonymizers and explain their role in cybercrime.
3. Critically assess the impact of keyloggers and spywares on privacy and security.
4. Compare and contrast the characteristics of viruses and worms in cyber attacks.
5. Explore the techniques used by cybercriminals to evade detection and removal of
Trojan horses and backdoors.
Assignment 4
Cyber Security (BCC401)
CO4 mm-10
1. What is the purpose of computer forensics.
2. Define digital forensics science and its significance in investigating cybercrimes.
3. Explain the significance of the digital forensics life cycle in ensuring thorough and
accurate investigations.
4. Critically assess the importance of maintaining the chain of custody in computer
forensics.
5. Explore the role of international cooperation in computer forensics investigations,
particularly in cases involving transnational cybercrimes.
Assignment 5
Cyber Security (BCC401)
CO5 mm-10
1. Why is there a need for an information security policy?
2. What is the objective of Indian cyber law?
3. Examine the challenges faced by businesses in navigating intellectual property-related
legislation in India.
4. Critically assess the impact of patent laws on innovation and economic development.
5. Explore the ethical dilemmas faced by businesses in balancing the protection of
intellectual property with the principles of open innovation.