Roll FirstRanker.com
COMMON TO ALL BRANCHES
THEORY EXAMINATION (SEM-IV) 2016-17
--- Content provided by FirstRanker.com ---
CYBER SECURITY
Time: 3 Hours
Max. Marks : 100
Note: Be precise in your answer.
SECTION - A
--- Content provided by FirstRanker.com ---
- Attempt all of the following questions: 10 x 2 = 20
- What is CIA (Confidentiality, Integrity and Availability) trade?
- What are the threats to information system?
- What is System Development Life Cycle (SDLC)?
- Define the terms RTGS and NEFT.
- What do you mean by virus, worm and IP spoofing?
- How cyber security is different from computer security?
- State the difference between Risk Management and Risk Assessment.
- Explain briefly about disposal of data.
- Define IT asset and the security of IT Assets.
- What is the need of cyber laws in India?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
SECTION – B
- Attempt any five parts of the following question: 5 x 10 = 50
- What are biometric? How can a biometric be used for access control? Discuss the criteria for selection of biometrics.
- What is Intrusion Detection System (IDS)? Explain its type in detail.
- What are the backup security measures? Discuss its type.
- What are the basic fundamental principles of information security? Explain.
- Write a short note on CCTV and its applications.
- What is Electronic cash? How does cash based transaction system differ from credit card based transactions?
- What do you mean by Virtual Private Networks? Discuss authentication mechanism used in VPN.
- Write a short note on:
- Database Security
- Email Security
- Internet Security
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
SECTION-C
--- Content provided by FirstRanker.com ---
- Attempt any two of the following questions: 2 x 15 = 30
- What is Electronic Data Interchange (EDI)? What are the benefits of EDI? How can it be helpful in governance?
- What is digital signature? What are the requirements of a digital signature system? List the security services provided by digital signature.
- Explain the following in detail :
- Private Key cryptosystem and Public key cryptosystems.
- Firewall.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University