FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R15 2018 January 824AE Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R15 2018 January 824AE Information Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

Firstranker's choice

Code No: 824AE Rl 5

--- Content provided by⁠ FirstRanker.com ---

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

FirstRanker.com

MCA 1V Semester Examinations, January - 2018

INFORMATION SECURITY

Time: 3hrs Max.Marks:75

--- Content provided by⁠ FirstRanker.com ---

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.

PART - A

5 x 5 Marks = 25

  1. Explain in detail various types of attacks on encrypted messages. (5)
  2. --- Content provided by FirstRanker.com ---

  3. Explain briefly about RSA algorithm in detail manner. (5)
  4. Describe how hash algorithms will provide security. (5)
  5. Explain about IP traffic processing in IP security Policy. (5)
  6. Define firewall. Explain the firewall design principles in a detail manner. (5)

PART -B

--- Content provided by‌ FirstRanker.com ---

5 x 10 Marks = 50

  1. a) Explain about the model for internetwork security.
    b) Convert the following plain text message P.= “cryptography provides high security” into cipher text by using simple columnar transposition technique
    i) Basic technique
    ii) With multiple rounds. [5+5]

    --- Content provided by⁠ FirstRanker.com ---

    OR
    With a neat diagram explain-simplified model of conventional Encryption.
  2. a) Differentiate between symmetric and asymmetric key cryptography. [6+4]
    b) Illustrate the procedure of key distribution in conventional encryption.
    OR

    --- Content provided by‌ FirstRanker.com ---

    a) Differentiate between AES, DES and Blow fish algorithms. [7+3]
    b) Explain round function evaluation in feistel cipher structure.
  3. a) Write the difference between session key and master key. [7+3]
    b) Write in detail what types of attacks are addressed by message authentication.
    OR

    --- Content provided by⁠ FirstRanker.com ---

    a) Describe what arithmetical and logical functions are used in MD5? [6+4]
    b) With a neat diagram explain Kerberos security mechanism. And also explain how Kerberos is important in real time for providing security?
  4. a) What is the difference between a public key and private key. [7+3]
    b) Explain on what basis Zimmerman has developed PGP for email security?
    OR

    --- Content provided by‍ FirstRanker.com ---

    a) With a neat diagram explain function modules and standardized protocols used between them in Internet mail architecture. [5+5]
    b) Explain in detail about IP security overview?
  5. a) Write the difference between PGP and MIME types. [7+3]
    b) Write in a detail manner that define the parameters of an SSL session state.
    OR

    --- Content provided by​ FirstRanker.com ---

    a) Write differences between socket layer security and transport security. [7+3]
    b) Briefly explain What are the different types of firewalls.
  6. a) Enumerate counter measures for viruses and worms. [6+4]

FirstRanker.com


--- Content provided by‌ FirstRanker.com ---


This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university