FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R13 2018 June-July 814AT Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R13 2018 June-July 814AT Information Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

Code No: 814AT

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by FirstRanker.com ---

MCA IV Semester Examinations, June/July - 2018

INFORMATION SECURITY

Time: 3 Hours Max. Marks: 60

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 20 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 8 marks and may have a, b as sub questions.

--- Content provided by‌ FirstRanker.com ---

PART - A 5 x 4 Marks = 20

  1. What is the need for information security?
  2. Differentiate between block and stream ciphering scheme.
  3. Explain about hash functions.
  4. Define the services provided by PGP.
  5. --- Content provided by⁠ FirstRanker.com ---

  6. State and explain about Intruders.

PART -B 5 x 8 Marks =40

  1. List and explain in detail about various types of security services. [8]
    OR
    With an example explain in detail about mono-alphabetic substitution technique. [8]
  2. --- Content provided by‍ FirstRanker.com ---

  3. Draw a neat diagram, explain the DES algorithm for 64 bit data and 64 bit key size.[8]
    OR
    Explain the encryption and decryption performed using RSA algorithm. Using RSA algorithm generate the cipher text with given data: p=11, q=5,e=3, PT=9. [8]
  4. Describe in detail about secure hash algorithm (SHA) in detail. [8]
    OR

    --- Content provided by FirstRanker.com ---

    Illustrate in detail about X.509 authentication service with a neat diagram. [8]
  5. With a neat diagram explain the architecture of IP Security. [8]
    OR
    Describe in detail about various techniques used for key management. [8]
  6. Explain the different types of firewall and its configurations in detail. [8]

    --- Content provided by⁠ FirstRanker.com ---

    OR
    Explain in detail about Secure Inter-branch Payment Transactions. [8]

---00000---


--- Content provided by‌ FirstRanker.com ---


This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university