Download JNTU-Hyderabad MBA 4th Sem R15 2018 June 724AD Cyber Security Question Paper

Download JNTUH (Jawaharlal Nehru Technological University Hyderabad) MBA (Master of Business Administration) 4th Semester (Fourth Semester) R15 2018 June 724AD Cyber Security Previous Question Paper



Code No: 724AD
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MBA IV Semester Examinations, June/July-2018
CYBER SECURITY
Time: 3 hours Max.Marks:75

Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A.
Part B consists of 5 Units. Answer any one full question from each unit. Each question
carries 10 marks and may have a, b, c as sub questions.

PART - A 5 ? 5 marks = 25

1.a) What is cybercrime? Give an example of the cybercrime that has happened recently.
[5]
b) Discuss the purpose of proxy server. [5]
c) Explain the need for network forensics. [5]
d) How to identify Digital Evidence? Explain. [5]
e) List and define the Web threats for organizations. [5]

PART - B 5 ? 10 marks = 50

2.a) What attacks are possible on mobile phones? Explain.
b) Describe the measures the organization has to take while handling mobile devices.
[5+5]
OR
3. List and explain the Security policies and measures in mobile computing era.[10]

4.a) Compare and contrast virus and worm.
b) How to protect from Trojan Horses and backdoors? Explain. [5+5]
OR
5.a) Give an example ?C? program to illustrate Buffer overflow attack.
b) Describe the possible attacks in wireless environment. [5+5]

6.a) Explain the Computer forensic from compliance perspectives.
b) Draw and explain the lifecycle of Digital Forensics. [5+5]
OR
7. Describe the Relevance of the OSI 7 Layer model to computer Forensic. [10]

8. How hand-held devices are in digital forensics. Also describe the Forensic of
i-pod and digital music devices. [10]
OR
9.a) Give a brief note on the working characteristics of cell phone.
b) List the Techno legal Challenges with evidence from hand held devices. [5+5]

10.a) Describe the IPR related threats in the cyber space.
b) What do you think are the best practices to be adopted by the organization related to
digital forensics? [5+5]
OR
11. What is cyber security? Discuss various ways of ensuring security to an organization
against cybercrimes. [10]
--ooOoo--
R15

FirstRanker.com - FirstRanker's Choice

This post was last modified on 23 October 2020