FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 3rd Sem R19 2021 July-August 863AE Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 3rd Sem (Third Semester) Regulation-R19 2021 July-August 863AE Information Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 3rd Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

Code No: 863AE R19

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by‌ FirstRanker.com ---

MCA III Semester Examinations, July/August - 2021

INFORMATION SECURITY

Time: 3 Hours Max.Marks:75

Answer any five questions

All questions carry equal marks

--- Content provided by FirstRanker.com ---

  1. a) Describe the model for Network Security with a neat diagram.

    b) Explain about Block Cipher design principles. [8+7]

  2. What are the basic requirements of Authentication? How the message is authenticated using secure hash algorithm (SHA-512)? [15]

  3. --- Content provided by FirstRanker.com ---

  4. Describe the Kerberos security mechanism and explain why Kerberos is important for providing security in real time? [15]

  5. What are the applications of IPSec? Explain about IPSec architecture with a neat sketch. [15]

  6. a) What are the limitations of firewalls? Explain about Firewall design principles.

    --- Content provided by‍ FirstRanker.com ---

    b) Explain various file access activities used for intrusion detection. [8+7]

  7. a) Discuss about various kinds of security mechanisms in detail.

    b) Differentiate between Symmetric and Asymmetric key cryptography. [7+8]

  8. --- Content provided by⁠ FirstRanker.com ---

  9. Explain RSA algorithm for encryption and decryption. Find n, d where p=11, q=3,and e = 3. Encrypt the message “MEET ME AFTER” using RSA. [15]

  10. Explain the following

    a) S/MIME Functionalities

    b) Viruses and Worms. [7+8]

    --- Content provided by‍ FirstRanker.com ---

FirstRanker.com



--- Content provided by‌ FirstRanker.com ---

This download link is referred from the post: JNTUH MCA 3rd Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university