Download JNTUH MCA 4th Sem R15 2018 June-July 824AR Cyber Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R15 2018 June-July 824AR Cyber Security Previous Question Paper


R15

Code No: 824AR















JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA IV Semester Examinations, June/July - 2018

CYBER SECURITY

Time: 3hrs















Max.Marks:75


Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.



PART - A



















5 ? 5 Marks = 25

1.a)

Give a note on social engineering and cyber stalking.







[5]

b) What are the security challenges posed by mobile devices?





[5]

c)

Briefly explain about cybercrime and punishment.







[5]

d)

Explain the challenges in computer forensics.









[5]

e) What is the cost of cybercrimes and List the IPR issues?







[5]



PART - B

















5 ? 10 Marks = 50



2.

Explain the concept of Botnets in detail.











[10]

OR

3.a)

Discuss about Cybercrime and Information security.

b)

Explain the global perspective on cybercrimes.









[5+5]



4.a)

List and explain the attacks on Mobile/Cellphones.

b)

What are the security implications for organizations? Discuss





[5+5]

OR

5.a)

Discuss about proliferation of Mobile and Wireless Devices.

b)

Explain the credit card frauds in mobile and wireless computing.



[5+5]


6.a)

List and explain the legal landscape around the world.

b)

Explain the challenges to Indian Law.











[5+5]

OR

7.a)

Explain the Digital signatures and the Indian IT Act.

b)

What are the amendments to the Indian IT Act? Discuss.





[5+5]



8.a)

Give a brief note on Computer Forensics, Cyber Forensics and Network Forensics.

b)

Briefly explain about Forensics analysis of Email.







[5+5]

OR

9.a)

Explain the concept of Chain of Custody.

b)

Give a note on Digital Forensics science and Forensics Auditing.



[5+5]



10.a) Describe the Security and Privacy Implications.
b) Discuss about the security risks and perils for organizations.





[5+5]

OR

11.a) Explain Social Computing and the associated challenges for organizations.
b) What are the web threats for organizations? Explain.







[5+5]



---oo0oo---

This post was last modified on 17 March 2023