Download PTU (Punjab Technical University) BSc IT (BCA) 5th Semester 74375 INFORMATION SECURITY Last 10 Years 2020, 2019, 2018, 2017, 2016, 2015, 2014, 2013, 2012, 2011 and 2010 Previous Question Papers.
Roll No. Total No. of Pages : 02
Total No. of Questions : 07
B.Sc.(IT) (2015 & Onward) (Sem.?5)
INFORMATION SECURITY
Subject Code : BSIT-501
M.Code : 74375
Time : 3 Hrs. Max. Marks : 60
INSTRUCTIONS TO CANDIDATES :
1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks
each.
2. SECTION-B contains SIX questions carrying TEN marks each and students have
to attempt any FOUR questions.
SECTION-A
Q1. Answer briefly :
(a) What is security audit?
(b) List various phases of security systems development life cycle.
(c) What is use of S/MIME?
(d) List various threats to web security.
(e) Write the significance of RSA algorithm.
(f) Define AES.
(g) Differentiate identification and authorization.
(h) What is role of SSL?
(i) What is need of database security?
(j) List various security laws.
FirstRanker.com - FirstRanker's Choice
1 | M-74375 (S3)-457
Roll No. Total No. of Pages : 02
Total No. of Questions : 07
B.Sc.(IT) (2015 & Onward) (Sem.?5)
INFORMATION SECURITY
Subject Code : BSIT-501
M.Code : 74375
Time : 3 Hrs. Max. Marks : 60
INSTRUCTIONS TO CANDIDATES :
1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks
each.
2. SECTION-B contains SIX questions carrying TEN marks each and students have
to attempt any FOUR questions.
SECTION-A
Q1. Answer briefly :
(a) What is security audit?
(b) List various phases of security systems development life cycle.
(c) What is use of S/MIME?
(d) List various threats to web security.
(e) Write the significance of RSA algorithm.
(f) Define AES.
(g) Differentiate identification and authorization.
(h) What is role of SSL?
(i) What is need of database security?
(j) List various security laws.
2 | M-74375 (S3)-457
SECTION-B
Q2 Define information security. Discuss various principles of information security.
Q3 What are various malicious softwares? Explain.
Q4 Write notes on the following :
(a) Components of information system
(b) Policy framework
Q5 What is intrusion detection system? How it is different from intrusion prevention system?
Explain with example.
Q6 What is cryptography? Discuss the role and working of public key cryptosvstems.
Q7 Explain the following :
(a) Digital signature
(b) IPR
NOTE : Disclosure of Identity by writing Mobile No. or Making of passing request on any
page of Answer Sheet will lead to UMC against the Student.
FirstRanker.com - FirstRanker's Choice
This post was last modified on 07 December 2019