FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

PTU B.Tech CSE 6th Semester May 2019 71172 INFORMATION SECURITY AND RISK MANAGEMENT Question Papers

PTU Punjab Technical University B-Tech May 2019 Question Papers 6th Semester Computer Science Engineering (CSE)

This post was last modified on 04 November 2019

PTU B.Tech 6th Semester Last 10 Years 2009-2019 Previous Question Papers|| Punjab Technical University


Roll No.

Total No. of Questions : 09

Total No. of Pages : 02

--- Content provided by‍ FirstRanker.com ---

B.Tech.(IT) (2011 Onwards) (Sem.-6)

INFORMATION SECURITY AND RISK MANAGEMENT

Subject Code : BTIT-602

M.Code: 71172

Time: 3 Hrs.

--- Content provided by​ FirstRanker.com ---

Max. Marks : 60

INSTRUCTION TO CANDIDATES :

  1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks each.
  2. SECTION-B contains FIVE questions carrying FIVE marks each and students have to attempt any FOUR questions.
  3. SECTION-C contains THREE questions carrying TEN marks each and students have to attempt any TWO questions.
  4. --- Content provided by⁠ FirstRanker.com ---

SECTION-A

Q1 Answer briefly :

  1. What are Intruders in Information Security?
  2. What do you mean by vulnerability?
  3. Discuss SHA 1 hash function.
  4. --- Content provided by FirstRanker.com ---

  5. What are digital signature standards?
  6. Give the role of Key management in cryptography.
  7. Define message confidentiality.
  8. What is DoS attack in information security?
  9. Write the purpose of DMZs?
  10. --- Content provided by​ FirstRanker.com ---

  11. What is risk assessment process?
  12. Discuss risk value analysis.

SECTION-B

Q2 List the steps to develop a corporate information security process life cycle.

Q3 Explain the principle of RSA algorithm by taking an example.

--- Content provided by⁠ FirstRanker.com ---

Q4 What are the message authentication functions? What are its requirements?

Q5 What is cyber crime and security? Give the examples of cyber crime.

Q6 Discuss the role of effective risk analysis in risk management.

SECTION-C

Q7 Explain the importance of DES algorithm using the block diagram. Discuss the modified AES.

--- Content provided by⁠ FirstRanker.com ---

Q8 How Pretty Good Privacy is used for sending secure encrypted messages in network?

Q9 Show how risk management is used to identifying, monitoring and managing potential risks?

NOTE : Disclosure of identity by writing mobile number or making passing request on any page of Answer sheet will lead to UMC against the Student.

FirstRanker.com


--- Content provided by‌ FirstRanker.com ---


This download link is referred from the post: PTU B.Tech 6th Semester Last 10 Years 2009-2019 Previous Question Papers|| Punjab Technical University