FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R15 2020 November 824AE Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R15 2020 November 824AE Information Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

Firstranker's choice

FirstRanker.com

--- Content provided by‌ FirstRanker.com ---

Code No: 824AE Rl 5

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA 1V Semester Examinations, October/ November - 2020

INFORMATION SECURITY

Time: 2 Hours Max.Marks:75

--- Content provided by⁠ FirstRanker.com ---

Answer any five questions

All questions carry equal marks

  1. Define Caesar cipher? Calculate the encryption and decryption for the following plain text P= “COME TO MY HOME” by using ceaser cipher with Key k=3. [15]

  2. a) Specify and contrast all kinds of cipher techniques in the cryptography. [7+8]

    --- Content provided by‍ FirstRanker.com ---

    b) Mention the key principles of security.

  3. a) Differentiate between AES and DES in a brief manner. [7+8]

    b) Explain how key is generated in the RSA algorithm.

  4. --- Content provided by‌ FirstRanker.com ---

  5. a) Differentiate block cipher and stream cipher techniques. [7+8]

    b) Explain key distribution of symmetric key.

  6. a) Define authentication service. And explain x.509 authentication services in a detail. [7+8]

    b) Describe why Kerberos is more secure than the other security mechanisms?

    --- Content provided by‌ FirstRanker.com ---

  7. Describe the following terms in detail [7+8]

    a) Whirlpool b) knapsack algorithm.

  8. a) Demonstrate combining security-associations. [7+8]

    --- Content provided by​ FirstRanker.com ---

    b) Discuss about the IP security architecture in detail.

  9. a) Differentiate socket layer security and transport security. [7+8]

    b) Demonstrate techniques used to avoid guessable password.

  10. --- Content provided by FirstRanker.com ---

---00000---



This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university

--- Content provided by‍ FirstRanker.com ---