FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUA B.Tech 4-2 R15 2019 April Regular 15A05806 Cyber Security Question Paper

Download JNTUA (JNTU Anantapur) B.Tech R15 (Bachelor of Technology) 4th Year 2nd Semester 2019 April Regular 15A05806 Cyber Security Previous Question Paper || Download B-Tech 4th Year 2nd Sem 15A05806 Cyber Security Question Paper || JNTU Anantapur B.Tech 4-2 Previous Question Paper || JNTU Anantapur B.Tech ME 4-2 Previous Question Paper || JNTU Anantapur B.Tech CSE 4-2 Previous Question Paper || JNTU Anantapur B.Tech Mech 4-2 Previous Question Paper || JNTU Anantapur B.Tech EEE 4-2 Previous Question Paper || JNTU Anantapur B.Tech ECE 4-2 Previous Question Paper

This post was last modified on 10 September 2020

JNTU Anantapur B-Tech 4-2 last 10 year question papers 2010 -2020 -All regulation- All branches- 4th Year 2nd Sem


Firstranker's choice

Code: 15A05806

Time: 3 hours

--- Content provided by⁠ FirstRanker.com ---

B.Tech IV Year II Semester (R15) Regular Examinations April 2019

CYBER SECURITY

(Common to CSE & IT)


PART - A

(Compulsory Question)

Answer the following: (10 X 02 = 20 Marks)

--- Content provided by⁠ FirstRanker.com ---

  1. (a) What is an IMEI number? What is its significance?
  2. (b) Write short notes on SMS blocker.
  3. (c) List various kinds of DOS attacks.
  4. (d) What is steganalysis?
  5. (e) What are the types of computer crimes? Explain.
  6. --- Content provided by⁠ FirstRanker.com ---

  7. (f) Define computer forensics.
  8. (g) Briefly explain CDMA features.
  9. (h) Define mobile phone forensics.
  10. (i) What is a security breach?
  11. (j) What is cookie? How does it compromise privacy of a user?
  12. --- Content provided by FirstRanker.com ---


PART - B

(Answer all five units, 5 X 10 = 50 Marks)

UNIT - I
  1. 1 Describe various kinds of attacks on mobile/cell phones.
  2. OR

    2 Elaborate on various authentication services in mobile devices.
UNIT - II
  1. 3 Describe various password cracking methods.
  2. --- Content provided by⁠ FirstRanker.com ---

  3. OR

    4 Write short notes on the following:
    1. Buffer overflow attacks.
    2. Trojan Horse.
UNIT - III
  1. 5 Explain the digital forensic life cycle.
  2. --- Content provided by‍ FirstRanker.com ---

  3. OR

    6 Describe how OSI layer 7 is relevant in computer forensics.
UNIT - IV
  1. 7 Compare the hardware characteristics of hand held devices in basic, advanced and smart variants.
  2. OR

    8 Describe toolkits available for hand held device forensics.
  3. --- Content provided by⁠ FirstRanker.com ---

UNIT - V
  1. 9 Describe the risks of social media marketing.
  2. OR

    10 Elaborate on the forensic best practices for organizations.

Max. Marks: 70

FirstRanker.com

--- Content provided by​ FirstRanker.com ---



This download link is referred from the post: JNTU Anantapur B-Tech 4-2 last 10 year question papers 2010 -2020 -All regulation- All branches- 4th Year 2nd Sem

--- Content provided by​ FirstRanker.com ---