FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTU-Hyderabad MBA 4th Sem R15 2018 June 724AD Cyber Security Question Paper

Download JNTUH (Jawaharlal Nehru Technological University Hyderabad) MBA (Master of Business Administration) 4th Semester (Fourth Semester) R15 2018 June 724AD Cyber Security Previous Question Paper

This post was last modified on 23 October 2020

This download link is referred from the post: JNTUH MBA 4th Semester Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)


Code No: 724AD

R15

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by FirstRanker.com ---

MBA IV Semester Examinations, June/July-2018

CYBER SECURITY

Time: 3 hours

Max.Marks:75

Note: This question paper contains two parts A and B.

--- Content provided by FirstRanker.com ---

Part A is compulsory which carries 25 marks. Answer all questions in Part A.

Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.

PART - A 5 × 5 marks = 25

  1. a) What is cybercrime? Give an example of the cybercrime that has happened recently. [5]
  2. b) Discuss the purpose of proxy server. [5]
  3. --- Content provided by FirstRanker.com ---

  4. c) Explain the need for network forensics. [5]
  5. d) How to identify Digital Evidence? Explain. [5]
  6. e) List and define the Web threats for organizations. [5]

PART - B 5 × 10 marks = 50

  1. a) What attacks are possible on mobile phones? Explain. b) Describe the measures the organization has to take while handling mobile devices.

    --- Content provided by FirstRanker.com ---

    OR [5+5]
  2. List and explain the Security policies and measures in mobile computing era. [10]
  3. a) Compare and contrast virus and worm. b) How to protect from Trojan Horses and backdoors? Explain.
    OR [5+5]
  4. a) Give an example 'C' program to illustrate Buffer overflow attack. b) Describe the possible attacks in wireless environment. [5+5]
  5. --- Content provided by FirstRanker.com ---

  6. a) Explain the Computer forensic from compliance perspectives. b) Draw and explain the lifecycle of Digital Forensics.
    OR [5+5]
  7. Describe the Relevance of the OSI 7 Layer model to computer Forensic. [10]
  8. How hand-held devices are in digital forensics. Also describe the Forensic of i-pod and digital music devices. [10]
    OR
  9. --- Content provided by FirstRanker.com ---

  10. a) Give a brief note on the working characteristics of cell phone. b) List the Techno legal Challenges with evidence from hand held devices. [5+5]
  11. a) Describe the IPR related threats in the cyber space. b) What do you think are the best practices to be adopted by the organization related to digital forensics? [5+5]
    OR
  12. What is cyber security? Discuss various ways of ensuring security to an organization against cybercrimes. [10]

FirstRanker.com

--- Content provided by FirstRanker.com ---



This download link is referred from the post: JNTUH MBA 4th Semester Last 10 Year Question Papers (2010-2020) All Regulation - (JNTU Hyderabad)

--- Content provided by FirstRanker.com ---