Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R15 2018 June-July 824AR Cyber Security Previous Question Paper
R15
Code No: 824AR
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MCA IV Semester Examinations, June/July - 2018
CYBER SECURITY
Time: 3hrs
Max.Marks:75
Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.
PART - A
5 ? 5 Marks = 25
1.a)
Give a note on social engineering and cyber stalking.
[5]
b) What are the security challenges posed by mobile devices?
[5]
c)
Briefly explain about cybercrime and punishment.
[5]
d)
Explain the challenges in computer forensics.
[5]
e) What is the cost of cybercrimes and List the IPR issues?
[5]
PART - B
5 ? 10 Marks = 50
2.
Explain the concept of Botnets in detail.
[10]
OR
3.a)
Discuss about Cybercrime and Information security.
b)
Explain the global perspective on cybercrimes.
[5+5]
4.a)
List and explain the attacks on Mobile/Cellphones.
b)
What are the security implications for organizations? Discuss
[5+5]
OR
5.a)
Discuss about proliferation of Mobile and Wireless Devices.
b)
Explain the credit card frauds in mobile and wireless computing.
[5+5]
6.a)
List and explain the legal landscape around the world.
b)
Explain the challenges to Indian Law.
[5+5]
OR
7.a)
Explain the Digital signatures and the Indian IT Act.
b)
What are the amendments to the Indian IT Act? Discuss.
[5+5]
8.a)
Give a brief note on Computer Forensics, Cyber Forensics and Network Forensics.
b)
Briefly explain about Forensics analysis of Email.
[5+5]
OR
9.a)
Explain the concept of Chain of Custody.
b)
Give a note on Digital Forensics science and Forensics Auditing.
[5+5]
10.a) Describe the Security and Privacy Implications.
b) Discuss about the security risks and perils for organizations.
[5+5]
OR
11.a) Explain Social Computing and the associated challenges for organizations.
b) What are the web threats for organizations? Explain.
[5+5]
---oo0oo---
This post was last modified on 17 March 2023