FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 4th Sem R09 2017 August F3403 Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 4th Sem (Fourth Semester) Regulation-R09 2017 August F3403 Information Security Previous Question Paper

This post was last modified on 17 March 2023

RGUHS B.Pharmacy 1st Year 2014-2024 Last 10 Years Previous Question Papers (B.Pharm Latest Papers))


Code No: F3403 R09

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

FirstRanker.com

--- Content provided by⁠ FirstRanker.com ---

MCA IV Semester Examinations, August - 2017

INFORMATION SECURITY

Time: 3hrs Max.Marks:60

Answer any five questions

All questions carry equal marks

--- Content provided by⁠ FirstRanker.com ---

  1. a) List various security attacks and consequences of each attack.
    b) Explain Block Cipher modes of operation. [6+6]
  2. a) Define principle of public key cryptography.
    b) Explain Kerberos authentication in detail. [6+6]
  3. a) Discuss the principles of PGP security.

    --- Content provided by⁠ FirstRanker.com ---

    b) What is meant by Authentication Header and Encapsulated Security Payload? [6+6]
  4. Demonstrate the procedure followed in SET(Secure Electronic Transaction) with a neat sketch. [12]
  5. What is a Firewall? Discuss various types of Firewalls. [12]
  6. a) Explain Man in Middle Attack.
    b) What is Flooding? Discuss types of Flooding attacks. [6+6]
  7. --- Content provided by⁠ FirstRanker.com ---

  8. Discuss the following:
    i) Relatively Prime numbers
    ii) Message Digest
    Explain the Euclid’s algorithm to compute multiplicative inverse of a given Number.[6+6]
  9. What is a security association and how security associations are combined with key management to ensure better email security?

    --- Content provided by⁠ FirstRanker.com ---

    Explain about trusted systems. [6+6]

FirstRanker.com



--- Content provided by‌ FirstRanker.com ---

This download link is referred from the post: RGUHS B.Pharmacy 1st Year 2014-2024 Last 10 Years Previous Question Papers (B.Pharm Latest Papers))