Download JNTU-Hyderabad MBA 2nd Sem R15 2019 Dec 721CV Principles Of Information Security Question Paper

Download JNTUH (Jawaharlal Nehru Technological University Hyderabad) MBA (Master of Business Administration) 2nd Semester (Second Semester) R15 2019 Dec 721CV Principles Of Information Security Previous Question Paper

Code No: 721CV
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MBA II Semester Examinations, December - 2019
PRINCIPLES OF INFORMATION SECURITY
Time: 3hours Max.Marks:75

Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.

PART - A 5 ? 5 Marks = 25

1.a) Discuss about various types of Security attacks. [5]
b) Explain the difference between law and ethics? [5]
c) What is a hybrid firewall? [5]
d) What are cryptography and cryptoanalysis? [5]
e) What is vulnerability assessment? [5]

PART - B 5 ? 10 Marks = 50

2.a) Identify the six components of an information system. Which are most directly
affected by the study of computer security? Which are most commonly associated with
its study?
b) What is the difference between a denial-of-service attack and a distributed denial-of-
service attack? Which is more dangerous? Why? [5+5]
OR
3.a) Why is a methodology important in the implementation of information security? How
does a methodology improve the process?
b) How does technological obsolescence constitute a threat to information security? How
can an organization protect against it? [5+5]

4.a) What is intellectual property (IP)? Is it afforded the same protection in every country
of the world? Explain.
b) Where can a security administrator find information on established security frameworks?
[5+5]
OR
5.a) Explain about Policy versus Law.
b) What benefit can a private, for-profit agency derive from best practices designed for
federal agencies? [5+5]

6.a) In risk management strategies, why must periodic review be a part of the process?
b) Write about biometric authentication technologies. [5+5]
OR
7. With neat diagrams, explain in detail about firewall processing modes. [10]

R15
S
FirstRanker.com - FirstRanker's Choice
Code No: 721CV
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MBA II Semester Examinations, December - 2019
PRINCIPLES OF INFORMATION SECURITY
Time: 3hours Max.Marks:75

Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.

PART - A 5 ? 5 Marks = 25

1.a) Discuss about various types of Security attacks. [5]
b) Explain the difference between law and ethics? [5]
c) What is a hybrid firewall? [5]
d) What are cryptography and cryptoanalysis? [5]
e) What is vulnerability assessment? [5]

PART - B 5 ? 10 Marks = 50

2.a) Identify the six components of an information system. Which are most directly
affected by the study of computer security? Which are most commonly associated with
its study?
b) What is the difference between a denial-of-service attack and a distributed denial-of-
service attack? Which is more dangerous? Why? [5+5]
OR
3.a) Why is a methodology important in the implementation of information security? How
does a methodology improve the process?
b) How does technological obsolescence constitute a threat to information security? How
can an organization protect against it? [5+5]

4.a) What is intellectual property (IP)? Is it afforded the same protection in every country
of the world? Explain.
b) Where can a security administrator find information on established security frameworks?
[5+5]
OR
5.a) Explain about Policy versus Law.
b) What benefit can a private, for-profit agency derive from best practices designed for
federal agencies? [5+5]

6.a) In risk management strategies, why must periodic review be a part of the process?
b) Write about biometric authentication technologies. [5+5]
OR
7. With neat diagrams, explain in detail about firewall processing modes. [10]

R15
S

8. Compare and Contrast between Symmetric and Asymmetric key cryptography. [10]
OR
9.a) List and describe the four categories of locks. In which situation is each type of lock
preferred?
b) Discuss about executing plan with neat diagram. [5+5]

10. Explain in detail about employment policies and practices. [10]
OR
11. Explain the information security services life cycle with diagram. [10]


---ooOoo---


S
FirstRanker.com - FirstRanker's Choice

This post was last modified on 23 October 2020