FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download PTU BMCI 2020 March 5th Sem 74107 Information Security Question Paper

Download PTU (I.K. Gujral Punjab Technical University Jalandhar (IKGPTU) BMCI 2020 March (Bachelor in Mobile Computing & Internet) 5th Sem 74107 Information Security Previous Question Paper

This post was last modified on 31 March 2020

PTU BMCI 2020 March Previous Question Papers


FirstRanker.com

Roll No. Total No. of Pages : 02
Total No. of Questions : 09

--- Content provided by⁠ FirstRanker.com ---

BMCI (2014 & Onwards) (Sem. -5)

INFORMATION SECURITY

Subject Code : BMCI-505
M.Code : 74107

Time : 3 Hrs. Max. Marks : 60

--- Content provided by​ FirstRanker.com ---

INSTRUCTIONS TO CANDIDATES :

  1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks each.
  2. SECTION-B contains FIVE questions carrying FIVE marks each and students have to attempt any FOUR questions.
  3. SECTION-C contains THREE questions carrying TEN marks each and students have to attempt any TWO questions.

SECTION-A

--- Content provided by⁠ FirstRanker.com ---

  1. Answer briefly :
    1. Differentiate between active and passive attacks on network security.
    2. What is a Virus?
    3. What is IPR?
    4. Discuss PGP.
    5. How is database security provided?
    6. --- Content provided by FirstRanker.com ---

    7. What is Steganography? How is it different from Cryptography?
    8. What is security assurance?
    9. What are international security standards?
    10. What is the difference between DES and AES?
    11. What is cipher? How are ciphers used in encryption?
    12. --- Content provided by‌ FirstRanker.com ---

FirstRanker.com

SECTION-B

  1. Briefly discuss the security systems development life cycle.
  2. Discuss S/MIME for email security.
  3. --- Content provided by​ FirstRanker.com ---

  4. What is the role of business ethics and best practices in security?
  5. What do you mean by Digital Signature? What are the properties and requirements of digital signatures?
  6. Discuss and differentiate between symmetric and asymmetric key cryptography.

SECTION-C

  1. What are security vulnerabilities? Explain the process of vulnerability identification and assessment for different threats faced by an information security system.
  2. --- Content provided by​ FirstRanker.com ---

  3. What is a Firewall? Discuss the working of a firewall. Discuss any one type of firewall in detail.
  4. Elaborate the RSA algorithm and discuss its working with an example.

NOTE : Disclosure of Identity by writing Mobile No. or Making of passing request on any page of Answer Sheet will lead to UMC against the Student.

FirstRanker.com


--- Content provided by‌ FirstRanker.com ---


This download link is referred from the post: PTU BMCI 2020 March Previous Question Papers