This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)
Code No: 721CV
R15
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
--- Content provided by FirstRanker.com ---
MBA II Semester Examinations, January-2018
PRINCIPLES OF INFORMATION SECURITY
Time: 3hrs
Max.Marks:75
Note: This question paper contains two parts A and B.
--- Content provided by FirstRanker.com ---
Part A is compulsory which carries 25 marks. Answer all questions in Part A.
Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.
PART - A
5×5 marks = 25
-
- What are the three components of the C.I.A. triangle? What are they for? Explain. [5]
- How is due diligence different from due care? Why are both important? [5]
- Describe how outsourcing can be for risk transference. [5]
- Which kind of attack on cryptosystem involves using a collection of pre identified terms? [5]
- Explain the special requirements needed for the privacy of personnel data. [5]
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
PART – B
5 × 10 marks = 50
-
- List and explain the components of information system.
- Why is the top-down approach to information security superior to the bottom-up approach? Explain. [5+5]
-
- Identify the six components of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study?
- Why do employees constitute one of the greatest threats to information security? Discuss. [5+5]
- What is intellectual property (IP)? Does it afforded the same protection in every country of the world? What laws currently protect it in the United States and Europe? [10]
OR
-
- What can be done to deter someone from committing a crime? Explain
- Give a brief note on Information Security Policy, Standards, and Practices. [5+5]
- Write the basic terminology that makes residential/SOHO firewall appliances effective in protecting a local network. Why is this usually adequate for protection? [10]
OR
- Explain the following terms:
- Intrusion Detection and Prevention Systems
- Firewalls and VPNs [5+5]
-
- Why is it important to exchange keys “out of band” in symmetric encryption?
- How to implement nontechnical aspects of information security? Discuss. [5+5]
--- Content provided by FirstRanker.com ---
OR
- Write the average key size of a “strong encryption” system in use today. Explain in detail. [10]
-
- How an organization's employment policies and practices can support the information security effort?
- With the help of neat diagram, explain the Vulnerability Assessment and Remediation. [5+5]
--- Content provided by FirstRanker.com ---
OR
- List and explain the Issues and concerns about staffing information security. [10]
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
---00000---
Get more at: FirstRanker.com
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)
--- Content provided by FirstRanker.com ---