FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUA MCA 2016 Nov 4th Sem 9F00404a Information Security Question Paper

Download JNTU Anantapur (JNTU Anantapur) Master of Computer Applications (MCA) 2016 Oct-Nov Regular Supply 4th Sem 9F00404a Information Security Previous Question Paper

This post was last modified on 28 July 2020

JNTUA MCA 4th Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)


Code: 9F00404a

MCA IV Semester Regular & Supplementary Examinations July 2015

INFORMATION SECURITY

--- Content provided by‍ FirstRanker.com ---

(For students admitted in 2009, 2010, 2011, 2012 and 2013 only)

Time: 3 hours Max Marks: 60

Answer any FIVE questions

All questions carry equal marks

  1. Discuss the general model that reflects a concern for protecting an information system from unwanted access.
  2. --- Content provided by⁠ FirstRanker.com ---

  3. What criteria are to be met for a specification to become a standard?
  4. Draw the overall structure of AES and explain.
  5. List key distribution using public key cryptography.
  6. List the design objectives of HMAC.
  7. Explain PGP trust model with an example.
  8. --- Content provided by⁠ FirstRanker.com ---

  9. What is the difference between signed data and clear signed data?
  10. Explain about the routing applications of IPSec.
  11. Explain encapsulating security payload protocol in detail.
  12. What services SSL record protocol provides for SSL connections?
  13. Explain how a dual signature is constructed.
  14. --- Content provided by‌ FirstRanker.com ---

  15. Under what circumstances a decentralized distributed approach works best. Discuss.
  16. Who is an intruder? Discuss about the intrusion techniques.
  17. Explain the general model of access control as exercised by DBMS.
  18. Discuss in detail, two types of proxy based firewalls.

More resources available at: FirstRanker.com

--- Content provided by‌ FirstRanker.com ---



This download link is referred from the post: JNTUA MCA 4th Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)

--- Content provided by‍ FirstRanker.com ---