This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)
FirstRanker's choice
R15
--- Content provided by FirstRanker.com ---
Code No: 721CV
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MBA II Semester Examinations, December - 2019
PRINCIPLES OF INFORMATION SECURITY
Time: 3hours
--- Content provided by FirstRanker.com ---
Max.Marks:75
Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.
PART - A 5 × 5 Marks = 25
- a) Discuss about various types of Security attacks. [5]
- b) Explain the difference between law and ethics? [5]
- c) What is a hybrid firewall? [5]
- d) What are cryptography and cryptoanalysis? [5]
- e) What is vulnerability assessment? [5]
--- Content provided by FirstRanker.com ---
PART - B 5 × 10 Marks = 50
--- Content provided by FirstRanker.com ---
- 2.a) Identify the six components of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study?
- b) What is the difference between a denial-of-service attack and a distributed denial-of- service attack? Which is more dangerous? Why? [5+5]
OR
- 3.a) Why is a methodology important in the implementation of information security? How does a methodology improve the process?
- b) How does technological obsolescence constitute a threat to information security? How can an organization protect against it? [5+5]
--- Content provided by FirstRanker.com ---
- 4.a) What is intellectual property (IP)? Is it afforded the same protection in every country of the world? Explain.
- b) Where can a security administrator find information on established security frameworks? [5+5]
OR
- 5.a) Explain about Policy versus Law.
- b) What benefit can a private, for-profit agency derive from best practices designed for federal agencies? [5+5]
--- Content provided by FirstRanker.com ---
- 6.a) In risk management strategies, why must periodic review be a part of the process?
- b) Write about biometric authentication technologies. [5+5]
OR
- 7. With neat diagrams, explain in detail about firewall processing modes. [10]
- 8. Compare and Contrast between Symmetric and Asymmetric key cryptography. [10]
--- Content provided by FirstRanker.com ---
OR
- 9.a) List and describe the four categories of locks. In which situation is each type of lock preferred?
- (b) Discuss about executing plan with neat diagram. [5+5]
- 10. Explain in detail about employment policies and practices. [10]
OR
--- Content provided by FirstRanker.com ---
- 11. Explain the information security services life cycle with diagram. [10]
---00000---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)