Download AKTU B-Tech 4th Sem 2016-17 Cyber Security Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 4th Semester (Fourth Semester) 2016-17 Cyber Security Question Paper

RollN0.|||||||||||
COMMON TO ALL BRANCHES
THEORY EXAMINATION (SEM?IV) 2016-17
CYBER SECURITY
Printed Pages : 1
T ime : 3 Hours
Note .' Be precise in your answer.
SECTION ? A
1. Attempt all of the following questions:
(a) What is CIA (Confidentiality, Integrity and Availability) trade?
(b) What are the threats to information system?
(c) What is System Development Life Cycle (SDLC)?
(d) Define the terms RTGS and NEFT.
(e) What do you mean by Virus, worm and IP spoofing?
(1) How cyber security is different from computer security?
AUC002
Max. Marks : 100
10x2=20
(g) State the difference between Risk Management and Risk Assessment.
(h) Explain brie?y about disposal of data.
(i) Define IT asset and the security of IT Assets.
(j) What is the need of cyber laws in India?
SECTION ? B
2. Attempt any ?ve parts of the following question:
5x10=50
(a) What are biometric? How can a biometric be used for access control? Discuss the
criteria for selection of biometrics.
(b) What is Intrusion Detection System (IDS)? Explain its type in detail.
(c) What are the backup security measures? Discuss its type.
(d) What are the basic fundamental principles of information security? Explain.
(e) Write a short note on CCTV and its applications.
(1) What is Electronic cash? How does cash based transaction system differ from credit
card based transactions?
(g) What do you mean by Virtual Private Networks? Discuss authentication mechanism
used in VPN.
(h) Write a short note on:
(i) Database Security (ii) Email Security (iii)
SECTION ? C
Attempt any two of the following questions:
Internet Security
2x15=30
3. What is Electronic Data Interchange (EDI)? What are the benefits of EDI? How can it be
helpful in governance?
4. What is digital signature? What are the requirements of a digital signature system? List the
security services provided by digital signature.
5. Explain the following in detail :
(i) Private Key cryptosystem and Public key cryptosystems.
(ii) Firewall.

This post was last modified on 29 January 2020