This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)
FirstRanker's choice
Code No: 721CV
--- Content provided by FirstRanker.com ---
R15
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MBA II Semester Examinations, April/May-2019
PRINCIPLES OF INFORMATION SECURITY
Time: 3hrs
--- Content provided by FirstRanker.com ---
Max.Marks:75
Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.
PART - A
5×5 Marks = 25
--- Content provided by FirstRanker.com ---
- a) Discuss about the balancing of information security and access with a neat sketch? [5]
- b) Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change? [5]
- c) Define and describe honeypots, honeynets, and padded cell systems? [5]
- d) What drawbacks to symmetric and asymmetric encryption are resolved by using a hybrid method like Diffie-Hellman? [5]
- e) What general attributes do organizations seek in candidates when hiring information security professionals across all positions? Prioritize the list and justify your ranking? [5]
--- Content provided by FirstRanker.com ---
PART - B
5 × 10 Marks = 50
- Explain in detail about the Bottom Up approach for implementing the information security. [10]
OR - What is intellectual property (IP)? Is it afforded the same protection in every country of the world? What laws currently protect it in the United States and Europe? [10]
- Identify and describe the categories and operating models of intrusion detection and prevention systems. [10]
OR - What is risk management? Why is the identification of risks, by listing assets and their vulnerabilities, so important to the risk management process? [10]
- Explain the basic principles of cryptography. [10]
OR - Describe key physical security considerations, including fire control and surveillance systems. [10]
- Describe the special requirements needed to ensure the privacy of personnel data. [10]
OR - What does CERT stand for? Is there more than one CERT? What is the purpose of a CERT? Explain. [10]
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)
--- Content provided by FirstRanker.com ---