Download JNTU-Hyderabad MBA 2nd Sem R15 2019 May 721CV Principles Of Information Security Question Paper

Download JNTUH (Jawaharlal Nehru Technological University Hyderabad) MBA (Master of Business Administration) 2nd Semester (Second Semester) R15 2019 May 721CV Principles Of Information Security Previous Question Paper

Code No: 721CV
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MBA II Semester Examinations, April/May-2019
PRINCIPLES OF INFORMATION SECURITY
Time: 3hrs Max.Marks:75

Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.

PART - A 5 ? 5 Marks = 25

1.a) Discuss about the balancing of information security and access with a neat sketch?
[5]
b) Which law amended the Computer Fraud and Abuse Act of 1986, and what did it
change? [5]
c) Define and describe honeypots, honeynets, and padded cell systems? [5]
d) What drawbacks to symmetric and asymmetric encryption are resolved by using a
hybrid method like Diffie-Hellman? [5]
e) What general attributes do organizations seek in candidates when hiring information
security professionals across all positions? Prioritize the list and justify your ranking?
[5]

PART - B 5 ? 10 Marks = 50

2. Explain in detail about the Bottom Up approach for implementing the information
security. [10]
OR
3. Describe in detail about the security system development life cycle. [10]

4. Explain the role of culture as it applies to ethics in information security. [10]
OR
5. What is intellectual property (IP)? Is it afforded the same protection in every country of
the world? What laws currently protect it in the United States and Europe? [10]

6. Identify and describe the categories and operating models of intrusion detection and
prevention systems. [10]
OR
7. What is risk management? Why is the identification of risks, by listing assets and their
vulnerabilities, so important to the risk management process? [10]

8. Explain the basic principles of cryptography. [10]
OR
9. Describe key physical security considerations, including fire control and surveillance
systems. [10]

10. Describe the special requirements needed to ensure the privacy of personnel data. [10]
OR
11. What does CERT stand for? Is there more than one CERT? What is the purpose of a
CERT? Explain. [10]
---ooOoo---
R15

FirstRanker.com - FirstRanker's Choice

This post was last modified on 23 October 2020