FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTU-Hyderabad MBA 4th Sem R15 2018 Jan 724AP Cyber Security Question Paper

Download JNTUH (Jawaharlal Nehru Technological University Hyderabad) MBA (Master of Business Administration) 4th Semester (Fourth Semester) R15 2018 Jan 724AP Cyber Security Previous Question Paper

This post was last modified on 23 October 2020

This download link is referred from the post: JNTUH MBA 4th Semester Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)


FirstRanker's choice

FirstRanker.com

R15

--- Content provided by FirstRanker.com ---

Code No: 724AP

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MBA IV Semester Examinations, January-2018

CYBER SECURITY

Time: 3hours

--- Content provided by FirstRanker.com ---

Max.Marks:75

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A.

Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.

PART - A

--- Content provided by FirstRanker.com ---

  1. a) How criminals plan the attacks? [5]
  2. b) Why do we need cyber law? [5]
  3. c) State and explain the concept of Trojan horse? [5]
  4. d) Illustrate the real life use of forensics? [5]
  5. e) What are the web threats for organizations? [5]
  6. --- Content provided by FirstRanker.com ---

5 × 5 marks = 25

PART - B

5 × 10 marks = 50

  1. Give an example cases to explain Credit Card Frauds in Mobile and Wireless Computing Era? [10]

    OR

  2. --- Content provided by FirstRanker.com ---

  3. Explain Organizational Security Policies and measures in Mobile Computing Era? [10]
  4. Describe in detail about Proxy Servers and Anonymizers? [10]

    OR

  5. List and explain the techniques for password cracking? [10]
  6. Explain how forensic analysis is performed on E-mail data? [10]

    OR

    --- Content provided by FirstRanker.com ---

  7. With a neat diagram explain the lifecycle of digital forensics? [10]
  8. Describe in detail about the working characteristics of a cell phone? [10]

    OR

  9. Explain in detail about the organizational guidelines on cell phone forensics? [10]
  10. --- Content provided by FirstRanker.com ---

  11. Illustrate in detail about security risk and perils for organization? [10]

    OR

  12. Explain the organizational guidelines for internet usage? [10]

--00000--


--- Content provided by FirstRanker.com ---


This download link is referred from the post: JNTUH MBA 4th Semester Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)