Download AKTU B-Tech 3rd Sem 2016-2017 AUC 002 Cyber Security Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 3rd Semester (Third Semester) 2016-2017 AUC 002 Cyber Security Question Paper

Printed Pages: 3 AUC-002
(Following Paper ID and Roll No. to be ?lled in your
Answer Books)
Paper ll) : 2289422 Roll No.
B.TECH.
Regular Theory Examination (Odd Sem ? 111), 2016-17
CYBER SECURITY
Time : 3 Hours Max. Marks : 100
Note : Attempt all Sections. If require any missing data; then
choose suitably.
SECTION -A
l. Attempt all questions in brief. (10X2=20)
a) Explain Functions of Information System with
suitable diagram.
b) Explain the concept of ED].
c) What are WWW policies in Cyber Security?
d) What are Email Security policies?
6) Explain is Copy right Law in Cyber Security.
f) What do you mean by access control to information
resources?
g) How do distributed information systems help the
global enterprises in today?s business world?
002/12/2016/24700 (1) - [P.T.O.

h)
j)
AUC-002
What are basic elements of information system
security?
What is Development of Information Systems?
What is digital signature?
SECTION - B
2. Attempt any three of the following : (3X10=30)
a)?
b)
C)
d)
e)
What is Intellectual Property Law?
What are the ?ngerprints? Brie?y describe the use
of the ?nger print in current scenario.
Explain Legal issues in Data mining Security.
Explain the concept of payment in E-commerce.
What are the security threats in mobile computing
SECTION - C
3. Attempt any one part of the following (1X10=10)
a)
b)
What is Security Threats to E Commerce?
What is Cyber Security? How to Secure you
information explain in detail?
4. Attempt any one part of the following (1 X10=10)
a) What are decision support systems? Discuss major
functional requirement of a decision support
system.
b) What is Virtual Private Network?
002/12/2016/24700 (2)
AUC-002
Attempt any one part of the following (1 X10=10)
a) Discuss the advantages of Biometrics over
traditional authentication method.
b) Explain the Payment System in E-Commerce.
Attempt any one part of the following (1 X10=10)
a) What is different type of Network Security?
b) Explain the different types of firewall with
limitations.
Attempt any one part of the following (1 X10=10)
a) What are decision support systems? Discuss major
functional requirement of a decision support
system.
b) What is F ace Recognisation in Cyber Security?
++++
002/12/2016/24700 (3)

This post was last modified on 29 January 2020