This download link is referred from the post: JNTUH MBA 4th Semester Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)
Code No: 724AD
R15
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
--- Content provided by FirstRanker.com ---
MBA IV Semester Examinations, June/July-2018
CYBER SECURITY
Time: 3 hours
Max.Marks:75
Note: This question paper contains two parts A and B.
--- Content provided by FirstRanker.com ---
Part A is compulsory which carries 25 marks. Answer all questions in Part A.
Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.
PART - A 5 × 5 marks = 25
- a) What is cybercrime? Give an example of the cybercrime that has happened recently. [5]
- b) Discuss the purpose of proxy server. [5]
- c) Explain the need for network forensics. [5]
- d) How to identify Digital Evidence? Explain. [5]
- e) List and define the Web threats for organizations. [5]
--- Content provided by FirstRanker.com ---
PART - B 5 × 10 marks = 50
- a) What attacks are possible on mobile phones? Explain. b) Describe the measures the organization has to take while handling mobile devices.
--- Content provided by FirstRanker.com ---
OR [5+5] - List and explain the Security policies and measures in mobile computing era. [10]
- a) Compare and contrast virus and worm. b) How to protect from Trojan Horses and backdoors? Explain.
OR [5+5] - a) Give an example 'C' program to illustrate Buffer overflow attack. b) Describe the possible attacks in wireless environment. [5+5]
- a) Explain the Computer forensic from compliance perspectives. b) Draw and explain the lifecycle of Digital Forensics.
OR [5+5] - Describe the Relevance of the OSI 7 Layer model to computer Forensic. [10]
- How hand-held devices are in digital forensics. Also describe the Forensic of i-pod and digital music devices. [10]
OR - a) Give a brief note on the working characteristics of cell phone. b) List the Techno legal Challenges with evidence from hand held devices. [5+5]
- a) Describe the IPR related threats in the cyber space. b) What do you think are the best practices to be adopted by the organization related to digital forensics? [5+5]
OR - What is cyber security? Discuss various ways of ensuring security to an organization against cybercrimes. [10]
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUH MBA 4th Semester Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)
--- Content provided by FirstRanker.com ---