FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R15 2017 August 824AR Cyber Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R15 2017 August 824AR Cyber Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

Code No: 824AR

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by FirstRanker.com ---

MCA IV Semester Examinations, August - 2017
CYBER SECURITY
Time: 3hrs Max.Marks:75

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A.

--- Content provided by‍ FirstRanker.com ---

Part B consists of 5 Units. Answer any one full question from each unit. Each
question carries 10 marks and may have a, b, c as sub questions.

PART - A

5 x 5 Marks = 25

  1. a) Write a short notes on cyber stalking. [5]
  2. --- Content provided by FirstRanker.com ---

  3. b) Discuss the trends in Mobility. [5]
  4. c) Explain about any two punishments in Cyber Law. [5]
  5. d) Briefly discuss about Network Forensics. [5]
  6. e) Explain Web threats for Organization. [5]

PART -B

--- Content provided by‍ FirstRanker.com ---

5 x 10 Marks =50

  1. Explain in detail about the concept of Botnets and in role in cyber security. [10]
  2. OR

  3. Give some examples to show how criminals plan attacks on social websites data? Explain. [10]
  4. Explain the credit card frauds in mobile and wireless computing. [10]
  5. --- Content provided by⁠ FirstRanker.com ---

    OR

  6. Describe the various attacks on mobile/cellphones. [10]
  7. Discuss the role of digital signatures in the Indian IT Act. [10]
  8. OR

  9. List and explain challenges to Indian Law and Cybercrime Scenario in India. [10]
  10. --- Content provided by FirstRanker.com ---

  11. Explain in detail about the concept of Digital evidence in Cyber Forensics. [10]
  12. OR

  13. Give an example to explain how forensics analysis is done for Emails. [10]
  14. Illustrate in detail about Cost of Cybercrimes and IPR issues. [10]
  15. OR

    --- Content provided by⁠ FirstRanker.com ---

  16. Discuss in detail about Security Risks and Perils for Organizations. [10]

---00000---

FirstRanker.com


--- Content provided by‍ FirstRanker.com ---


This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university