FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R13 2017 August 814AT Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R13 2017 August 814AT Information Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


Firstranker's choice

FirstRanker.com


--- Content provided by‌ FirstRanker.com ---



Code No: 814AT

FirstRanker.com


--- Content provided by​ FirstRanker.com ---

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA IV Semester Examinations, August - 2017

INFORMATION SECURITY

Time: 3 Hours Max. Marks: 60

Note: This question paper contains two parts A and B.

--- Content provided by FirstRanker.com ---

Part A is compulsory which carries 20 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 8 marks and may have a, b, c as sub questions.

PART - A 5 x 4 Marks = 20

  1. a) Define authentication, confidentiality, Non-repudiation, Availability.
  2. b) Write a short note on Deffie Hellman Key Exchange Algorithm.
  3. c) What are the properties of Hash function in cryptography?
  4. --- Content provided by​ FirstRanker.com ---

  5. d) Briefly discuss about the concept of combining security associations.
  6. e) Write short notes on Password selection strategies and their significance.

PART - B 5 x 8 Marks = 40

  1. Compare and Contrast between Symmetric and Asymmetric key cryptography. [8]
    OR

    --- Content provided by‍ FirstRanker.com ---

    With a neat sketch explain the model for inter network security. [8]
  2. With a neat diagram explain how encryption and decryption techniques works for DES. [8]
    OR
    Perform encryption and decryption using RSA Alg. for the following. P=7; q=11; e=17; M=8. [8]
  3. Give a neat sketch to explain the concept of HMAC. [8]

    --- Content provided by FirstRanker.com ---

    OR
    Client machine C wants to communicate with server S. Explain how it can be achieved through Kerberos protocol? [8]
  4. How the messages are generated and transmitted in pretty good privacy (PGP) protocol? Explain with clear diagrams. [8]
    OR
    Explain in detail about the various services provided in IPSec. [8]
  5. --- Content provided by‍ FirstRanker.com ---

  6. With a neat diagram explain in detail about Secured Electronic Transactions (SET). [8]
    OR
    List the characteristics of a good firewall implementation. How is circuit gateway different from application gateway? [8]

FirstRanker.com


--- Content provided by‌ FirstRanker.com ---


This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university