FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R15 2018 June-July 824BC Principles Of Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2018 June-July 824BC Principles Of Information Security Previous Question Paper

This post was last modified on 17 March 2023


R15

Code No: 824BC

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by FirstRanker.com ---


MCA V Semester Examinations, June/July - 2018

PRINCIPLES OF INFORMATION SECURITY

--- Content provided by FirstRanker.com ---

Time: 3hrs




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


Max.Marks:75


Note: This question paper contains two parts A and B.

--- Content provided by FirstRanker.com ---


Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.

--- Content provided by FirstRanker.com ---



PART - A


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



5 ? 5 Marks = 25


--- Content provided by FirstRanker.com ---


1.a) What are the components of information security? Explain briefly.



--- Content provided by FirstRanker.com ---

[5]

b) Describe digital millennium copy right act.


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[5]

c) Explain the mechanisms of access control.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[5]

--- Content provided by FirstRanker.com ---


d) Describe Vernam and Ex-or ciphers with an example.



--- Content provided by FirstRanker.com ---





[5]

--- Content provided by FirstRanker.com ---


e) Describe the goals and team of digital forensic.



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[5]



--- Content provided by FirstRanker.com ---

PART - B




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




5 ? 10 Marks = 50

--- Content provided by FirstRanker.com ---

2.a)

Describe the various phases of information security.

b)

--- Content provided by FirstRanker.com ---


Explain information extortion? Describe how such an attack can cause losses.

[5+5]

--- Content provided by FirstRanker.com ---

OR

3.a)

Explain, the problem arises in software development security.

--- Content provided by FirstRanker.com ---


b)

What is information system? Explain its components.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[5+5]



--- Content provided by FirstRanker.com ---

4.

What is Enterprise information security policy? Explain in detail its components. [10]

OR

--- Content provided by FirstRanker.com ---


5.

Discuss about five elements of business impact analysis for information security. [10]

--- Content provided by FirstRanker.com ---


6.

Give a detailed note on components of risk identification in information security. [10]

--- Content provided by FirstRanker.com ---

OR

7.a)

Describe virtual private networks.

--- Content provided by FirstRanker.com ---


b) Explain network intrusion detection and prevention system.



--- Content provided by FirstRanker.com ---



[5+5]


--- Content provided by FirstRanker.com ---

8.

Explain RSA algorithm and write its strengths and weaknesses.


--- Content provided by FirstRanker.com ---




[10]

--- Content provided by FirstRanker.com ---

OR

9.

Explain components of public key infrastructure.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[10]

--- Content provided by FirstRanker.com ---




10.

--- Content provided by FirstRanker.com ---

Describe the life cycle of information security services.




--- Content provided by FirstRanker.com ---




[10]

--- Content provided by FirstRanker.com ---

OR

11.a) Explain various method to acquire forensic data.
b) Explain vulnerability assessment of security maintenance model.

--- Content provided by FirstRanker.com ---



[5+5]


--- Content provided by FirstRanker.com ---



---oo0oo---