FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R15 2018 January 824AR Cyber Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R15 2018 January 824AR Cyber Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

Firstranker's choice


--- Content provided by‌ FirstRanker.com ---




Code No: 824AR Rl 5

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by FirstRanker.com ---

MCA IV Semester Examinations, January - 2018

CYBER SECURITY

Time: 3hrs Max.Marks:75


Note: This question paper contains two parts A and B.

--- Content provided by FirstRanker.com ---

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.

PART - A

5 x 5 Marks =25

1. a) Explain the cases to define them as cybercriminals. [5]

b) Explain the steps for Registry Settings for Mobile Devices. [5]

--- Content provided by​ FirstRanker.com ---

c) What is digital signature? Explain. [5]

d) Discuss the historical background of cyber forensics. [5]

e) Explain the cost of the cybercrimes. [5]

PART -B

5 x 10 Marks =50

--- Content provided by​ FirstRanker.com ---

2. Explain in detail about the Cybercrime and the Indian ITA 2000. [10]

OR

3. Describe the cases to explain how criminals plan the cyber offenses. [10]

4. What are the various attacks on mobile/cell phones? Explain. [10]

OR

--- Content provided by FirstRanker.com ---

5. Describe organizational security policies measures in mobile computing era. [10]

6. Explain the legal perspective of cybercrime and cyber security. [10]

OR

7. Discuss the challenges to Indian law and cybercrime scenario in India. [10]

8. With a neat diagram explain the lifecycle of digital forensics. [10]

--- Content provided by‌ FirstRanker.com ---

OR

9. What are the special tools and techniques used to perform computer forensics? [10]

10. Explain in detail about the web threats for the organization. [10]

OR

11. Describe the social computing and the associated challenges for organizations. [10]

--- Content provided by​ FirstRanker.com ---

---00000---



This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university

--- Content provided by‍ FirstRanker.com ---