FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTU-Hyderabad MBA 4th Sem R15 2018 Dec 724AP Cyber Security Question Paper

Download JNTUH (Jawaharlal Nehru Technological University Hyderabad) MBA (Master of Business Administration) 4th Semester (Fourth Semester) R15 2018 Dec 724AP Cyber Security Previous Question Paper

This post was last modified on 23 October 2020

This download link is referred from the post: JNTUH MBA 4th Semester Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)


FirstRanker's choice

Code No: 724AP

FirstRanker.com

--- Content provided by FirstRanker.com ---

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MBA IV Semester Examinations, December - 2018

CYBER SECURITY

Time: 3hours

Max.Marks:75

--- Content provided by FirstRanker.com ---

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.

PART - A 5×5 marks = 25

  1. a) List and define the attacks on mobile phones. [5]
  2. b) What are the similarities and differences between steganography and cryptography? [5]
  3. --- Content provided by FirstRanker.com ---

  4. c) Explain in detail about network forensics. [5]
  5. d) Discuss the Forensic of Handheld devices. [5]
  6. e) Give a brief note on the evils and Perils. [5]

PART - B 5 × 10 marks = 50

  1. 2.a) Explain the credit card frauds in mobile and wireless computing. [5+5]

    --- Content provided by FirstRanker.com ---

    b) Give a brief note on trend mobility.
    OR
    3. Explain the organizational measurement for handling mobile. [10]
  2. 4.a) List and explain the attacks on network. [5+5]
    b) How does a trusted system defend Trojan horse attack? Explain.

    --- Content provided by FirstRanker.com ---

    OR
    5.a) What are the typical phases of operations of a virus or worm? Explain. [5+5]
    b) Give a brief note on password cracking and spyware.
  3. 6. Describe the developing standard procedure for Network Forensics. [10]
    OR

    --- Content provided by FirstRanker.com ---

    7. Explain the digital forensic life cycle-network forensic. [10]
  4. 8. Discuss the Forensic of i-pod and digital music devices. [10]
    OR
    9. Illustrate the techno legal challenges with evidence from handheld devices. [10]
  5. 10.a) How can you reduce the risks of social media to your organization? [5+5]

    --- Content provided by FirstRanker.com ---

    b) Elaborate the difference between security and threats and explain web security.
    OR
    11. Describe the Intellectual Property Issues (IPR). [10]

--00000--

FirstRanker.com

--- Content provided by FirstRanker.com ---



This download link is referred from the post: JNTUH MBA 4th Semester Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)

--- Content provided by FirstRanker.com ---