FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTU-Hyderabad MBA 4th Sem R15 2019 May 724AP Cyber Security Question Paper

Download JNTUH (Jawaharlal Nehru Technological University Hyderabad) MBA (Master of Business Administration) 4th Semester (Fourth Semester) R15 2019 May 724AP Cyber Security Previous Question Paper

This post was last modified on 23 October 2020

This download link is referred from the post: PTU BHMCT Last 10 Years 2010-2020 Previous Question Papers


FirstRanker.com

R15

Code No: 724AP

--- Content provided by FirstRanker.com ---

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MBA IV Semester Examinations, April/May-2019

CYBER SECURITY

Time: 3hours

Max.Marks:75

--- Content provided by FirstRanker.com ---

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.

PART - A 5 × 5 marks = 25

  1. a) Write a short notes on Cyber stalking? [5]
  2. b) State and explain phishing attack? [5]
  3. --- Content provided by FirstRanker.com ---

  4. c) Explain in detail about Forensics Auditing? [5]
  5. d) Discuss about forensics of ipod? [5]
  6. e) What is the implications-cost of cybercrimes? [5]

PART - B 5 × 10 marks = 50

  1. Describe the Relevance of the OSI 7 Layer model to computer Forensic? [10]
  2. --- Content provided by FirstRanker.com ---

  3. OR
  4. What are the Security Challenges Posed by Mobile Devices? Explain. [10]
  5. a) What are the various attacks perform on Wireless Networks? [5+5]
  6. b) Explain Buffer overflow.
  7. OR
  8. --- Content provided by FirstRanker.com ---

  9. Explain various techniques to perform Steganography? [10]
  10. Explain the approach to perform Computer Forensics Investigation? [10]
  11. OR
  12. List and explain in detail about the Organizational Measures for Handling Mobile security policy. [10]
  13. What are toolkits for Hand-Held Device Forensic? Explain. [10]
  14. --- Content provided by FirstRanker.com ---

  15. OR
  16. List and explain in detail about techno-legal challenges with evidence from hand-held devices? [10]
  17. Describe in detail about social computing and the associated challenges for organizations? [10]
  18. OR
  19. Explain in detail about safe computing guidelines and computer usage policy? [10]
  20. --- Content provided by FirstRanker.com ---

--00000--

FirstRanker.com



--- Content provided by FirstRanker.com ---

This download link is referred from the post: PTU BHMCT Last 10 Years 2010-2020 Previous Question Papers