This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)
Firstranker's choice
Code No: 721CV
--- Content provided by FirstRanker.com ---
R15
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MBA II Semester Examinations, December-2018
PRINCIPLES OF INFORMATION SECURITY
Time: 3hrs
--- Content provided by FirstRanker.com ---
Max.Marks:75
Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.
PART - A 5×5 Marks = 25
- a) Define key terms and critical concepts of information security? [5]
- b) Discuss the components of issue specific security policy? [5]
- c) Define risk management, risk identification, and risk control? [5]
- d) Discuss the relationship between information security and physical security? [5]
- e) Describe where and how the information security function should be positioned within organizations? [5]
--- Content provided by FirstRanker.com ---
PART - B 5 × 10 Marks = 50
--- Content provided by FirstRanker.com ---
- Enumerate the phases of the security systems development life cycle. [10]
OR - Describe how the information security organisation functions for an organization. [10]
- Explain the role of culture as it applies to ethics in information security. [10]
OR - Define management's role in the development, maintenance, and enforcement of information security policy. [10]
- Explain the current Standards, practices, procedures and guidelines? [10]
OR - Explain the furent aspects of documenting risk via the process of risk assessment. [10]
- Describe firewall technology and the various approaches to firewall implementation. [10]
--- Content provided by FirstRanker.com ---
OR - Describe key physical security considerations, including fire control and surveillance systems. [10]
- Describe the operating principles of the most popular cryptographic tools. [10]
OR - Illustrate how an organization's employment policies and practices can support the information security effort. [10]
- Describe the process of acquiring, analyzing, and maintaining potential evidentiary material. [10]
OR
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUH MBA 2nd Sem Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)