FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R15 2022 March-April 824AE Marchapril Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R15 2022 March-April 824AE Marchapril Information Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

Code No: 824AE

R15

--- Content provided by FirstRanker.com ---

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA IV Semester Examinations, March/April - 2022

INFORMATION SECURITY

Time: 3 Hours Max.Marks:75

Answer any five questions

--- Content provided by‍ FirstRanker.com ---

All questions carry equal marks

  1. a) Explain the operations, requirements and components of Network security model.
    b) Differentiate between Active Attacks and Passive Attacks. [8+7]
  2. a) Use Playfair cipher with the key “COMPUTER” to encrypt the message “INFORMATION SECURITY”.
    b) Discuss about different poly-alphabetic cipher substitution techniques. [8+7]
  3. --- Content provided by‍ FirstRanker.com ---

  4. a) Explain cipher block modes of operations with suitable diagrams.
    b) Give the structure of AES. Explain how Encryption/Decryption is done in AES. [7+8]
  5. a) Alice and Bob agreed to use RSA algorithm for the secret communication. Alice securely choose two primes, p=5 and q=11 and a secret key d=7. Find the corresponding public key. Bob uses this public key and sends a cipher text 18 to Alice. Find the plain text.
    b) Illustrate man in the middle attack on Diffie-Hellman key exchange algorithm. [8+7]
  6. a) What are the Security Requirements of message authentication?

    --- Content provided by⁠ FirstRanker.com ---

    b) Discuss the various principles involved in private and public key cryptography. [8+7]
  7. a) Explain the authentication procedures defined by X.509 certificate.
    b) What is Kerberos? What are the main features of Kerberos Version 5? [7+8]
  8. a) How does PGP provide confidentiality and authentication service for e-mail and file storage applications? Draw the block diagram and explain its components.
    b) What are the services provided by IPSec? Where can be the IPSec located on a network? [8+7]
  9. --- Content provided by⁠ FirstRanker.com ---

  10. a) Write briefly about the signature based Intrusion Detection Systems.
    b) Discuss about the various types of firewalls. [8+7]

---00000---


--- Content provided by FirstRanker.com ---


This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university