Download JNTUA (JNTU Anantapur) MCA (Master of Computer Applications) 2014 Feb Regular-Supplementary 1st Sem 9F00404a Information Security Question Paper
MCA IV Semester Supplementary February 2014 Examinations
INFORMATION SECURITY
(For 2009, 2010 & 2011 admitted batches only)
Time: 3 hours Max. Marks: 60
Answer any FIVE questions
All questions carry equal marks
*****
1 How Kerberos model is implemented for encryption and decryption.
2 (a) How intruder accesses the machine? Discuss various techniques used by intruders.
(b) What is mean by Trojan horse? Explain in detail.
3 Discuss AES cryptography algorithm in detail.
4 ?Proxy Good Privacy? (PGP) provides confidentiality. Prove this sentence with various
cryptographic functions.
5 Discuss IP sec transport mode and IP tunneling mode.
6 Write a short note on
(a) Intrusion detection system.
(b) Firewall types.
7 Explain the concept of S/MIME with Email security techniques.
8 How securely electronic transaction is performed?
*****
FirstRanker.com - FirstRanker's Choice
This post was last modified on 28 July 2020