FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTU-Hyderabad MBA 2nd Sem R15 2018 Dec 721CV Principles Of Information Security Question Paper

Download JNTUH (Jawaharlal Nehru Technological University Hyderabad) MBA (Master of Business Administration) 2nd Semester (Second Semester) R15 2018 Dec 721CV Principles Of Information Security Previous Question Paper

This post was last modified on 23 October 2020

This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)


Firstranker's choice

FirstRanker.com

Code No: 721CV

--- Content provided by FirstRanker.com ---

R15

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MBA II Semester Examinations, December-2018

PRINCIPLES OF INFORMATION SECURITY

Time: 3hrs

--- Content provided by FirstRanker.com ---

Max.Marks:75

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.

PART - A 5×5 Marks = 25

  1. a) Define key terms and critical concepts of information security? [5]
  2. --- Content provided by FirstRanker.com ---

  3. b) Discuss the components of issue specific security policy? [5]
  4. c) Define risk management, risk identification, and risk control? [5]
  5. d) Discuss the relationship between information security and physical security? [5]
  6. e) Describe where and how the information security function should be positioned within organizations? [5]

PART - B 5 × 10 Marks = 50

--- Content provided by FirstRanker.com ---

  1. Enumerate the phases of the security systems development life cycle. [10]
    OR
  2. Describe how the information security organisation functions for an organization. [10]
  3. Explain the role of culture as it applies to ethics in information security. [10]
    OR
  4. --- Content provided by FirstRanker.com ---

  5. Define management's role in the development, maintenance, and enforcement of information security policy. [10]
  6. Explain the current Standards, practices, procedures and guidelines? [10]
    OR
  7. Explain the furent aspects of documenting risk via the process of risk assessment. [10]
  8. Describe firewall technology and the various approaches to firewall implementation. [10]

    --- Content provided by FirstRanker.com ---

    OR
  9. Describe key physical security considerations, including fire control and surveillance systems. [10]
  10. Describe the operating principles of the most popular cryptographic tools. [10]
    OR
  11. Illustrate how an organization's employment policies and practices can support the information security effort. [10]
  12. --- Content provided by FirstRanker.com ---

  13. Describe the process of acquiring, analyzing, and maintaining potential evidentiary material. [10]
    OR


--- Content provided by FirstRanker.com ---

This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)