MCA IV Semester Supplementary February 2014 Examinations
INFORMATION SECURITY
--- Content provided by FirstRanker.com ---
(For 2009, 2010 & 2011 admitted batches only)
Time: 3 hours Max. Marks: 60
Answer any FIVE questions
All questions carry equal marks
- How Kerberos model is implemented for encryption and decryption.
- How intruder accesses the machine? Discuss various techniques used by intruders.
- What is mean by Trojan horse? Explain in detail.
- Discuss AES cryptography algorithm in detail.
- ‘Proxy Good Privacy’ (PGP) provides confidentiality. Prove this sentence with various cryptographic functions.
- Discuss IP sec transport mode and IP tunneling mode.
- Write a short note on:
- Intrusion detection system.
- Firewall types.
- Explain the concept of S/MIME with Email security techniques.
- How securely electronic transaction is performed?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUA MCA 2nd Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)
--- Content provided by FirstRanker.com ---