FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R15 2018 June-July 824BC Principles Of Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2018 June-July 824BC Principles Of Information Security Previous Question Paper

This post was last modified on 17 March 2023

--- Content provided by‍ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by FirstRanker.com ---





JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by‍ FirstRanker.com ---


MCA V Semester Examinations, June/July - 2018

PRINCIPLES OF INFORMATION SECURITY

--- Content provided by‌ FirstRanker.com ---

Time: 3hrs




--- Content provided by⁠ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---


Max.Marks:75


Note: This question paper contains two parts A and B.

--- Content provided by FirstRanker.com ---


Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.

--- Content provided by‍ FirstRanker.com ---



PART - A


--- Content provided by⁠ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by FirstRanker.com ---



5 ? 5 Marks = 25


--- Content provided by FirstRanker.com ---


1.a) What are the components of information security? Explain briefly.



--- Content provided by FirstRanker.com ---

[5]

b) Describe digital millennium copy right act.


--- Content provided by‌ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---



[5]

c) Explain the mechanisms of access control.

--- Content provided by‌ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---





[5]

--- Content provided by‌ FirstRanker.com ---


d) Describe Vernam and Ex-or ciphers with an example.



--- Content provided by⁠ FirstRanker.com ---





[5]

--- Content provided by‌ FirstRanker.com ---


e) Describe the goals and team of digital forensic.



--- Content provided by FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---


[5]



--- Content provided by‌ FirstRanker.com ---

PART - B




--- Content provided by⁠ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---




5 ? 10 Marks = 50

--- Content provided by‍ FirstRanker.com ---

2.a)

Describe the various phases of information security.

b)

--- Content provided by⁠ FirstRanker.com ---


Explain information extortion? Describe how such an attack can cause losses.

[5+5]

--- Content provided by‌ FirstRanker.com ---

OR

3.a)

Explain, the problem arises in software development security.

--- Content provided by‌ FirstRanker.com ---


b)

What is information system? Explain its components.

--- Content provided by FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---


[5+5]



--- Content provided by FirstRanker.com ---

4.

What is Enterprise information security policy? Explain in detail its components. [10]

OR

--- Content provided by⁠ FirstRanker.com ---


5.

Discuss about five elements of business impact analysis for information security. [10]

--- Content provided by​ FirstRanker.com ---


6.

Give a detailed note on components of risk identification in information security. [10]

--- Content provided by​ FirstRanker.com ---

OR

7.a)

Describe virtual private networks.

--- Content provided by​ FirstRanker.com ---


b) Explain network intrusion detection and prevention system.



--- Content provided by‌ FirstRanker.com ---



[5+5]


--- Content provided by‌ FirstRanker.com ---

8.

Explain RSA algorithm and write its strengths and weaknesses.


--- Content provided by‍ FirstRanker.com ---




[10]

--- Content provided by‍ FirstRanker.com ---

OR

9.

Explain components of public key infrastructure.

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[10]

--- Content provided by⁠ FirstRanker.com ---




10.

--- Content provided by‌ FirstRanker.com ---

Describe the life cycle of information security services.




--- Content provided by​ FirstRanker.com ---




[10]

--- Content provided by FirstRanker.com ---

OR

11.a) Explain various method to acquire forensic data.
b) Explain vulnerability assessment of security maintenance model.

--- Content provided by​ FirstRanker.com ---



[5+5]


--- Content provided by‌ FirstRanker.com ---



---oo0oo---