FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download PTU MCA 2020 Dec 3rd Sem 74074 Information Security Question Paper

Download PTU I. K. Gujral Punjab Technical University (IKGPTU) MCA (Master of Computer Applications) 2020 December 3rd Sem 74074 Information Security Previous Question Paper

This post was last modified on 14 February 2021

PTU MCA Last 10 Years 2011-2021 Previous Question Papers|| Punjab Technical University


Firstranker's choice

FirstRanker.com

FirstRanker.com

--- Content provided by FirstRanker.com ---

Roll No. Total No. of Questions : 18
Total No. of Pages : 02

MCA (2015 to 2018) (Sem.-3)

INFORMATION SECURITY

Subject Code : MCA-302

M.Code : 74074

Time: 3 Hrs. Max. Marks : 60

INSTRUCTIONS TO CANDIDATES :

--- Content provided by⁠ FirstRanker.com ---

  1. SECTIONS-A, B, C & D contains TWO questions each carrying TEN marks each and students has to attempt any ONE question from each SECTION.
  2. SECTION-E is COMPULSORY consisting of TEN questions carrying TWENTY marks in all.

SECTION-A

  1. Discuss some computer security threats and how they can be prevented?
  2. What is message authentication in cryptography? How hash functions are used in message authentication?
  3. --- Content provided by FirstRanker.com ---

SECTION-B

  1. Discuss advantages and disadvantages of token based authentication system?
  2. Explain the need for database security? What are database access controls in dbms?

SECTION-C

  1. What are the type of malicious software? How they harm the network system?
  2. --- Content provided by FirstRanker.com ---

  3. What are software related security issues? Write the steps to handle security issues?

SECTION-D

  1. Explain the common criteria for Information technology security evaluation?
  2. What is security risk assessment and how it works?

SECTION-E

--- Content provided by‍ FirstRanker.com ---

  1. Discuss the importance of digital signatures?
  2. Write in short about Iris Biometric system?
  3. Define relational databases?
  4. What is social engineering attack?
  5. Give example of flooding attack?
  6. --- Content provided by⁠ FirstRanker.com ---

  7. What is safe programming coding?
  8. Discuss Keylogger system?
  9. Write a short note on windows security?
  10. What are trusted systems?
  11. What are worms in Information Security?
  12. --- Content provided by FirstRanker.com ---

NOTE : Disclosure of Identity by writing Mobile No. or Marking of passing request on any paper of Answer Sheet will lead to UMC against the Student.



This download link is referred from the post: PTU MCA Last 10 Years 2011-2021 Previous Question Papers|| Punjab Technical University

--- Content provided by FirstRanker.com ---