FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTU-Hyderabad MBA 2nd Sem R15 2019 Dec 721CV Principles Of Information Security Question Paper

Download JNTUH (Jawaharlal Nehru Technological University Hyderabad) MBA (Master of Business Administration) 2nd Semester (Second Semester) R15 2019 Dec 721CV Principles Of Information Security Previous Question Paper

This post was last modified on 23 October 2020

This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)


FirstRanker's choice

FirstRanker.com


R15

--- Content provided by FirstRanker.com ---

Code No: 721CV

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MBA II Semester Examinations, December - 2019

PRINCIPLES OF INFORMATION SECURITY

Time: 3hours

--- Content provided by FirstRanker.com ---

Max.Marks:75

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.

PART - A 5 × 5 Marks = 25

  1. a) Discuss about various types of Security attacks. [5]
  2. --- Content provided by FirstRanker.com ---

  3. b) Explain the difference between law and ethics? [5]
  4. c) What is a hybrid firewall? [5]
  5. d) What are cryptography and cryptoanalysis? [5]
  6. e) What is vulnerability assessment? [5]

PART - B 5 × 10 Marks = 50

--- Content provided by FirstRanker.com ---

  1. 2.a) Identify the six components of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study?
  2. b) What is the difference between a denial-of-service attack and a distributed denial-of- service attack? Which is more dangerous? Why? [5+5]

OR

  1. 3.a) Why is a methodology important in the implementation of information security? How does a methodology improve the process?
  2. b) How does technological obsolescence constitute a threat to information security? How can an organization protect against it? [5+5]
  3. --- Content provided by FirstRanker.com ---

  1. 4.a) What is intellectual property (IP)? Is it afforded the same protection in every country of the world? Explain.
  2. b) Where can a security administrator find information on established security frameworks? [5+5]

OR

  1. 5.a) Explain about Policy versus Law.
  2. b) What benefit can a private, for-profit agency derive from best practices designed for federal agencies? [5+5]
  3. --- Content provided by FirstRanker.com ---

  1. 6.a) In risk management strategies, why must periodic review be a part of the process?
  2. b) Write about biometric authentication technologies. [5+5]

OR

  1. 7. With neat diagrams, explain in detail about firewall processing modes. [10]
  1. 8. Compare and Contrast between Symmetric and Asymmetric key cryptography. [10]
  2. --- Content provided by FirstRanker.com ---

OR

  1. 9.a) List and describe the four categories of locks. In which situation is each type of lock preferred?
  2. (b) Discuss about executing plan with neat diagram. [5+5]
  1. 10. Explain in detail about employment policies and practices. [10]

OR

--- Content provided by FirstRanker.com ---

  1. 11. Explain the information security services life cycle with diagram. [10]

---00000---



--- Content provided by FirstRanker.com ---

This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)