FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTU-Hyderabad MBA 2nd Sem R15 2019 May 721CV Principles Of Information Security Question Paper

Download JNTUH (Jawaharlal Nehru Technological University Hyderabad) MBA (Master of Business Administration) 2nd Semester (Second Semester) R15 2019 May 721CV Principles Of Information Security Previous Question Paper

This post was last modified on 23 October 2020

This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)


FirstRanker's choice

FirstRanker.com

Code No: 721CV

--- Content provided by FirstRanker.com ---

R15

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MBA II Semester Examinations, April/May-2019

PRINCIPLES OF INFORMATION SECURITY

Time: 3hrs

--- Content provided by FirstRanker.com ---

Max.Marks:75

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.

PART - A

5×5 Marks = 25

--- Content provided by FirstRanker.com ---

  1. a) Discuss about the balancing of information security and access with a neat sketch? [5]
  2. b) Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change? [5]
  3. c) Define and describe honeypots, honeynets, and padded cell systems? [5]
  4. d) What drawbacks to symmetric and asymmetric encryption are resolved by using a hybrid method like Diffie-Hellman? [5]
  5. e) What general attributes do organizations seek in candidates when hiring information security professionals across all positions? Prioritize the list and justify your ranking? [5]
  6. --- Content provided by FirstRanker.com ---

PART - B

5 × 10 Marks = 50

  1. Explain in detail about the Bottom Up approach for implementing the information security. [10]
    OR
  2. What is intellectual property (IP)? Is it afforded the same protection in every country of the world? What laws currently protect it in the United States and Europe? [10]
  3. --- Content provided by FirstRanker.com ---

  4. Identify and describe the categories and operating models of intrusion detection and prevention systems. [10]
    OR
  5. What is risk management? Why is the identification of risks, by listing assets and their vulnerabilities, so important to the risk management process? [10]
  6. Explain the basic principles of cryptography. [10]
    OR
  7. --- Content provided by FirstRanker.com ---

  8. Describe key physical security considerations, including fire control and surveillance systems. [10]
  9. Describe the special requirements needed to ensure the privacy of personnel data. [10]
    OR
  10. What does CERT stand for? Is there more than one CERT? What is the purpose of a CERT? Explain. [10]

FirstRanker.com

--- Content provided by FirstRanker.com ---



This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)

--- Content provided by FirstRanker.com ---