FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R13 2018 January 814AT Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R13 2018 January 814AT Information Security Previous Question Paper

This post was last modified on 17 March 2023

RGUHS B.Pharmacy 1st Year 2014-2024 Last 10 Years Previous Question Papers (B.Pharm Latest Papers))


FirstRanker.com

Code No: 814AT

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by⁠ FirstRanker.com ---

MCA IV Semester Examinations, January - 2018

INFORMATION SECURITY

Time: 3 Hours Max. Marks: 60

Note: This question paper contains two parts A and B. Part A is compulsory which carries 20 marks. Answer all questions in Part A. Part B consists of 5 Units. Answer any one full question from each unit. Each question carries 8 marks and may have a, b, c as sub questions.

PART - A

--- Content provided by⁠ FirstRanker.com ---

5 x 4 Marks =20

  1. What is cryptanalysis and cryptography? [4]
  2. What are roles of public and private key? Specify the applications of the public key cryptosystem. [4]
  3. What are the requirements for message authentication? [4]
  4. Why does PGP generate a signature before applying compression? [4]
  5. --- Content provided by‌ FirstRanker.com ---

  6. What is IP address spoofing? [4]

PART -B

5 x 8 Marks =40

  1. Explain Active attacks and Passive Attacks. OR Discuss the following: a) A model for internetwork security. b) Steganography. [4+4]
  2. What is mono alphabetic cipher? How it is different from Caesar cipher? [4+4] OR Explain Blowfish in detail. [8]
  3. --- Content provided by⁠ FirstRanker.com ---

  4. Discuss the following: a) Public-key Cryptography Principles b) RC4 Algorithm [4+4] OR Describe the authentication dialog used by Kerberos for obtaining services from another realm. [8]
  5. Explain the X.509 authentication service. [8] OR How can the signed data entity of S/MIME be prepared? Explain the general format of PGP message. [4+4]
  6. What do you mean by Security Association? Illustrate the parameters that identify the Security Association. OR Describe IP security Architecture. [4+4]
  7. What is the importance of web security? Explain how secure socket layer provides the reliable service. [8] OR Explain statistical anomaly detection and rule based intrusion detection system. [8]

---00000---

--- Content provided by​ FirstRanker.com ---

FirstRanker.com



This download link is referred from the post: RGUHS B.Pharmacy 1st Year 2014-2024 Last 10 Years Previous Question Papers (B.Pharm Latest Papers))

--- Content provided by‌ FirstRanker.com ---