FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R17 2020 November 844AE Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R17 2020 November 844AE Information Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

Code No: 844AE Rl 7

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by FirstRanker.com ---

MCA 1V Semester Examinations, October/ November - 2020

INFORMATION SECURITY

Time: 2 Hours Max.Marks:75

Answer any five questions

All questions carry equal marks

--- Content provided by⁠ FirstRanker.com ---

  1. a) List and explain the security services.
    b) Explain how Cipher Feedback mode can convert a block cipher to stream cipher. [7+8]
  2. Explain how a plain text block is encrypted using Blowfish algorithm. [15]
  3. a) Perform encryption and decryption using RSA algorithm of the following. p=17; q=11; e=7; M=88.
    b) With a neat diagram explain how to transfer a message confidentially and at the same time ensure integrity and authenticity. [7+8]
  4. --- Content provided by​ FirstRanker.com ---

  5. Explain KerberosV4 authentication dialogue in detail.
  6. What is the purpose of Digital certificates? Explain. [7+8]
    Explain the fields of PGP User Public keyRing?
  7. Write down the applications of Authentication protocols. [7+8]
    List and describe the security services offered by S'MIME.
  8. --- Content provided by​ FirstRanker.com ---

  9. What are the requirements of web security? [7+8]
    Describe how e-transactions are secured.
  10. What is the purpose of SSL Change Cipher Specification protocol? [7+8]
    List and explain different types of intruders.
  11. Explain any two approaches of intrusion detection. [7+8]
  12. --- Content provided by‍ FirstRanker.com ---

---00000---

FirstRanker.com



--- Content provided by​ FirstRanker.com ---

This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university