FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R15 2019 December 824AE Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R15 2019 December 824AE Information Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com
Firstranker's choice
Code No: 824AF R15

--- Content provided by FirstRanker.com ---

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD




--- Content provided by‌ FirstRanker.com ---


MCA IV Semester Examinations, December - 2019
INFORMATION SECURITY
Time: 3hrs Max.Marks:75
Note: This question paper contains two parts A and B.

--- Content provided by‍ FirstRanker.com ---

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 10 marks and may have a, b, c as sub questions.

PART - A 5 x 5 Marks =25

  1. Explain the model for network security. 5
  2. Discuss about Linear and differential cryptanalysis? 5
  3. What is the function of TGS server in Kerberoes. 5
  4. --- Content provided by⁠ FirstRanker.com ---

  5. Draw and explain fields in AH header. 5
  6. What are the limitations of firewalls? 5

PART -B 5 x 10 Marks =50

  1. Give an example to explain the concept of transposition ciphers in detail. [10]
    OR

    --- Content provided by​ FirstRanker.com ---

    Compare and Contrast between Symmetric and Asymmetric key cryptography. [10]
  2. In an RSA system, the public key of a given user is e=31, n=3599. What is the private key of this user? [10]
    OR
    Explain DES algorithm with suitable examples. Discuss its advantages and limitations [10]
  3. Give a neat sketch to explain the concept of Secure Hash Algorithm (SHA). [10]

    --- Content provided by‍ FirstRanker.com ---

    OR
    With the help of an example explain how knapsack algorithm is used for authentication? [10]
  4. Explain the operation PGP message generation and message reception. [10]
    OR
    Draw the IP security authentication header and explain the functions of each field. [10]
  5. --- Content provided by‍ FirstRanker.com ---

  6. Explain the steps involved in performing Secure Inter-branch Payment Transactions. [10]
    OR
    List the characteristics of a good firewall implementation? How is circuit gateway different from application gateway? [10]

---00000---


--- Content provided by⁠ FirstRanker.com ---

FirstRanker.com



This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university

--- Content provided by​ FirstRanker.com ---