FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download PTU B-Tech CSE-IT 2020 Dec 6th Sem 71172 Information Security And Risk Management Question Paper

Download PTU (I.K.Gujral Punjab Technical University (IKGPTU)) B-Tech (Bachelor of Technology) (CSE-IT)- Computer Science Engineering -Information Technology 2020 December 6th Sem 71172 Information Security And Risk Management Previous Question Paper

This post was last modified on 13 February 2021

PTU B.Tech Question Papers 2020 December (All Branches)


FirstRanker.com

Roll No. Total No. of Pages : 02
Total No. of Questions : 18

--- Content provided by‌ FirstRanker.com ---

B.Tech.(IT) (2012 to 2017) (Sem.—6)
INFORMATION SECURITY AND RISK MANAGEMENT
Subject Code : BTIT-602
M.Code : 71172
Time : 3 Hrs. Max. Marks : 60

--- Content provided by FirstRanker.com ---

INSTRUCTION TO CANDIDATES :

  1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks each.
  2. SECTION-B contains FIVE questions carrying FIVE marks each and students have to attempt any FOUR questions.
  3. SECTION-C contains THREE questions carrying TEN marks each and students have to attempt any TWO questions.

SECTION-A

--- Content provided by‍ FirstRanker.com ---

Answer briefly :

  1. What is role of cryptography?
  2. What are worms in Information Security?
  3. Discuss SHA2 hash function.
  4. What are digital signatures?
  5. --- Content provided by⁠ FirstRanker.com ---

  6. Give the role of Key management in cryptography.
  7. Define message integrity.
  8. What is the goal of a DoS attack?
  9. Write the purpose of MD4.
  10. What is threat assessment?
  11. --- Content provided by​ FirstRanker.com ---

  12. Write the syntax of RSA algorithm.

FirstRanker.com

SECTION-B

  1. How firewalls are used to prevent the threats in information security?
  2. What is a DMZ and why would we use it?
  3. --- Content provided by⁠ FirstRanker.com ---

  4. What are the message authentication functions? What are its requirements?
  5. How Pretty Good Privacy is used for sending secure encrypted messages in network?
  6. Discuss the role of qualitative risk analysis in risk management.

SECTION-C

  1. Explain the importance of DES algorithm using the block diagram. Discuss the modified mode AES.
  2. --- Content provided by‌ FirstRanker.com ---

  3. Discuss the Web Security issues. Which are the key Web services security requirements?
  4. What is risk management process? How would you identify, analysis and evaluate the risk?

NOTE : Disclosure of identity by writing mobile number or making passing request on any page of Answer sheet will lead to UMC against the Student.

FirstRanker.com


--- Content provided by FirstRanker.com ---


This download link is referred from the post: PTU B.Tech Question Papers 2020 December (All Branches)