FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R19 2022 March-April 864AH Cyber Laws And Ethics Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R19 2022 March-April 864AH Cyber Laws And Ethics Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

Code No: 864AH

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by‌ FirstRanker.com ---

MCA IV Semester Examinations, March/April - 2022

R19

CYBER LAWS AND ETHICS

Time: 3 Hours

Max.Marks:75

--- Content provided by FirstRanker.com ---

Answer any five questions

All questions carry equal marks

  1. a) Elaborate on the International security activity.
    b) List and explain the threats to security. [7+8]
  2. a) Discuss the various government requirements in cyber security.

    --- Content provided by‍ FirstRanker.com ---

    b) Explain the information protection and access controls. [8+7]
  3. a) Define network security. Explain in detail.
  4. Explain the RLD and RS in Orange Book. [5+10]
  5. a) List and explain the various types of security policy requirements. [15]
  6. a) Compare and contrast the Tier 2 and Tier 1 policies.

    --- Content provided by‌ FirstRanker.com ---

    b) Discuss the four information asset classifications identified. [8+7]
  7. a) Give a brief note on corporate policies.
    b) List and explain the developing standards in classification policy. [8+7]
  8. a) Explain the Tools of information security.
    b) Draw and explain the information classification. [8+7]
  9. --- Content provided by⁠ FirstRanker.com ---

  10. Explain the role of information security professionals.
  11. Describe the Adoption of Information Security Management Standards.

--00000--

FirstRanker.com


--- Content provided by⁠ FirstRanker.com ---


This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university