FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R15 2018 June-July 824AR Cyber Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R15 2018 June-July 824AR Cyber Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA IV Semester Examinations, June/July - 2018

--- Content provided by‌ FirstRanker.com ---

CYBER SECURITY

Time: 3hrs Max.Marks:75

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.

PART - A 5 x 5 Marks =25

--- Content provided by‍ FirstRanker.com ---

  1. a) Give a note on social engineering and cyber stalking. [5]
  2. b) What are the security challenges posed by mobile devices? [5]
  3. c) Briefly explain about cybercrime and punishment. [5]
  4. d) Explain the challenges in computer forensics. [5]
  5. e) What is the cost of cybercrimes and List the IPR issues? [5]
  6. --- Content provided by⁠ FirstRanker.com ---

PART -B 5 x 10 Marks =50

  1. Explain the concept of Botnets in detail. [10]

    OR

  2. a) Discuss about Cybercrime and Information security.
    b) Explain the global perspective on cybercrimes: [5+5]
  3. --- Content provided by FirstRanker.com ---

  4. a) List and explain the attacks on Mobile/Cellphones.
    b) What are the security implications for organizations? Discuss [5+5]

    OR

  5. a) Discuss about proliferation of Mobile and Wireless Devices.
    b) Explain the credit card frauds in mobile and wireless computing. [5+5]
  6. --- Content provided by​ FirstRanker.com ---

  7. a) List and explain the legal landscape around the world.
    b) Explain the challenges to Indian Law. [5+5]

    OR

  8. a) Explain the Digital signatures and the Indian IT Act.
    b) What are the amendments to the Indian IT Act? Discuss. [5+5]
  9. --- Content provided by​ FirstRanker.com ---

  10. a) Give a brief note on Computer Forensics, Cyber Forensics and Network Forensics.
    b) Briefly explain about Forensics analysis of Email. [5+5]

    OR

  11. a) Explain the concept of Chain of Custody.
    b) Give a note on Digital Forensics science and Forensics Auditing. [5+5]
  12. --- Content provided by⁠ FirstRanker.com ---

  13. a) Describe the Security and Privacy Implications.
    b) Discuss about the security risks and perils for organizations. [5+5]

    OR

  14. a) Explain Social Computing and the associated challenges for organizations.
    b) What are the web threats for organizations? Explain. [5+5]
  15. --- Content provided by⁠ FirstRanker.com ---



This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university

--- Content provided by‌ FirstRanker.com ---