FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R13 2019 April-May 814AT Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R13 2019 April-May 814AT Information Security Previous Question Paper

This post was last modified on 17 March 2023

JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university


FirstRanker.com

Code No: 814AT

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by FirstRanker.com ---

MCA IV Semester Examinations, April/May - 2019
INFORMATION SECURITY

Time: 3 Hours Max. Marks: 60

Note: This question paper contains two parts A and B.
Part A is compulsory which carries 20 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 8 marks and may have a, b, c as sub questions.

--- Content provided by‌ FirstRanker.com ---

PART - A 5 x 4 Marks = 20

  1. What are the security services? [4]
  2. Discuss the terms: Block ciphers and stream ciphers.
  3. What are the design objectives for HMAC? Compare HMAC and CMAC.
  4. Explain transport mode and tunnel mode in IPSec.
  5. --- Content provided by‌ FirstRanker.com ---

  6. Compare SSL and TLS.

PART - B 5 x 8 Marks = 40

  1. a) Discuss about active attacks and passive attacks. [8]
    OR
    b) Explain the following:

    --- Content provided by FirstRanker.com ---

    a) Steganography b) Polyalphabetic cipher [4+4]
  2. a) Explain RSA algorithm in detail with relevant diagrams. [8]
    OR
    b) Explain AES algorithm in detail. [8]
  3. a) Describe HMAC algorithm: [8]

    --- Content provided by‌ FirstRanker.com ---

    OR
    b) Explain Kerberos version 4 message exchanges for providing authentication. [8]
  4. a) Explain the following related to S/MIME messages
    a) EnvelopedData.
    b) SignedData

    --- Content provided by⁠ FirstRanker.com ---

    c) ClearSigning
    d) RegistrationRequest
    e) Certificate-only Messages. [8]
    OR
    b) Give a brief note on Encapsulating security payload.

    --- Content provided by FirstRanker.com ---

    Discuss about different combinations of security associations. [4+4]
  5. a) Discuss in detail the messages exchanged between client and server during the phase of SSL handshake protocol. [8]
    OR
    b) Discuss about virtual elections. [8]

—-00000-—-

--- Content provided by​ FirstRanker.com ---



This download link is referred from the post: JNTUH MCA 4th Sem Last 10 Years 2023-2013 Question Papers R20-R09 || Jawaharlal nehru technological university

--- Content provided by FirstRanker.com ---