FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUA B.Tech 4-2 R15 2019 July Advanced Supple 15A05806 Cyber Security Question Paper

Download JNTUA (JNTU Anantapur) B.Tech R15 (Bachelor of Technology) 4th Year 2nd Semester 2019 July Advanced Supple 15A05806 Cyber Security Previous Question Paper || Download B-Tech 4th Year 2nd Sem 15A05806 Cyber Security Question Paper || JNTU Anantapur B.Tech 4-2 Previous Question Paper || JNTU Anantapur B.Tech ME 4-2 Previous Question Paper || JNTU Anantapur B.Tech CSE 4-2 Previous Question Paper || JNTU Anantapur B.Tech Mech 4-2 Previous Question Paper || JNTU Anantapur B.Tech EEE 4-2 Previous Question Paper || JNTU Anantapur B.Tech ECE 4-2 Previous Question Paper

This post was last modified on 10 September 2020

JNTU Kakinada B-Tech 3-1 last 10 year question papers 2010 -2020 -All regulation- All branches- 3rd Year 1st Sem (JNTUK)


FirstRanker's choice

Code: 15A05806

FirstRanker.com

--- Content provided by‌ FirstRanker.com ---

B.Tech IV Year II Semester (R15) Advanced Supplementary Examinations July 2019

CYBER SECURITY

(Common to CSE & IT)

Time: 3 hours

Max. Marks: 70

--- Content provided by​ FirstRanker.com ---

PART - A

(Compulsory Question)

1 Answer the following: (10 X 02 = 20 Marks)

  1. List various mobility types.
  2. What is a carputer?
  3. --- Content provided by⁠ FirstRanker.com ---

  4. What is a boot sector virus?
  5. What is a key stroke logger?
  6. What is a chain of custody?
  7. Define network forensics.
  8. What is TDMA?
  9. --- Content provided by​ FirstRanker.com ---

  10. Differentiate between physical and logical acquisition of data from a device.
  11. List the costs associated with cyber security incidents.
  12. List any four social media platforms used by organizations.

PART - B

(Answer all five units, 5 X 10 = 50 Marks)

--- Content provided by‍ FirstRanker.com ---

UNIT - I

2 Describe various credit card frauds in mobile devices.

OR

3 Describe organizational policies and measures in mobile computing era.

UNIT - II

--- Content provided by⁠ FirstRanker.com ---

4 Explain SQL injection attacks and its implications.

OR

5 Describe buffer overflow attacks in wireless networks.

UNIT - III

6 Explain legal perspectives in computer forensics.

--- Content provided by FirstRanker.com ---

OR

7 Explain about forensic analysis of E-mails.

UNIT - IV

8 Explain iPod forensic techniques.

OR

--- Content provided by‍ FirstRanker.com ---

9 Describe techno legal challenges with evidence from hand held devices.

UNIT - V

10 Explain the security risks in social media marketing.

OR

11 Explain the importance of privacy of users in the organizations.

--- Content provided by FirstRanker.com ---

FirstRanker.com



This download link is referred from the post: JNTU Kakinada B-Tech 3-1 last 10 year question papers 2010 -2020 -All regulation- All branches- 3rd Year 1st Sem (JNTUK)

--- Content provided by⁠ FirstRanker.com ---