FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R15 2017 August 824AE Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R15 2017 August 824AE Information Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

Code No: 824AE

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by​ FirstRanker.com ---

MCA IV Semester Examinations, August - 2017

INFORMATION SECURITY

Time: 3hrs Max.Marks:75

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.

--- Content provided by‌ FirstRanker.com ---

PART - A

5 x 5 Marks = 25

  1. a) Explain the need for computer security and describe various nature of attacks. [5]
  2. b) Write a short note on the weaknesses of DES algorithm. [5]
  3. c) Explain in detail the 0/1 Knapsack problem. [5]
  4. --- Content provided by‍ FirstRanker.com ---

  5. d) Write a short note on the functions provided by S/MIME. [5]
  6. e) State and explain the various kinds of Firewalls. [5]

PART - B

5 x 10 Marks = 50

  1. Explain in detail various principles of security. [10]

    --- Content provided by⁠ FirstRanker.com ---

    OR

  2. a) Distinguish between symmetric and asymmetric encryption.

    b) Demonstrate substitution and transposition techniques with examples. [5+5]

  3. --- Content provided by‍ FirstRanker.com ---

  4. Explain in detail about Advanced Encryption Standard (AES) algorithm. [10]

    OR

  5. a) Discuss the procedure involved in RSA public-key encryption algorithm along with its security issues.

    b) Illustrate Diffie-Hellman key exchange scheme with an example. [5+5]

    --- Content provided by‍ FirstRanker.com ---

  6. Explain the X.509 authentication services with a neat structure diagram. [10]

    OR

  7. Explain in detail the Secure Hash Algorithm. [10]

    --- Content provided by‌ FirstRanker.com ---

  8. Define PGP and explain in detail the five principal services provided by PGP. [10]

  9. Explain the scenario of IP Security with a neat diagram and list out the services provided by the IPSec at IP layer. [10]

  10. --- Content provided by⁠ FirstRanker.com ---

  11. Explain in detail about various kinds of Viruses and Worms. [10]

  12. List out the three categories of Intruders and with the help of a neat diagram explains the architecture of Distributed Intrusion Detection. [10]

FirstRanker.com

--- Content provided by‍ FirstRanker.com ---



This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university

--- Content provided by⁠ FirstRanker.com ---