R15
Code No: 824BC
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
--- Content provided by FirstRanker.com ---
MCA V Semester Examinations, January - 2018
PRINCIPLES OF INFORMATION SECURITY
--- Content provided by FirstRanker.com ---
Time: 3hrs--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Max.Marks:75
Note: This question paper contains two parts A and B.
--- Content provided by FirstRanker.com ---
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.
--- Content provided by FirstRanker.com ---
PART - A
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
5 ? 5 Marks = 25
1.a)
--- Content provided by FirstRanker.com ---
What is the need of information security explain?
--- Content provided by FirstRanker.com ---
[5]
--- Content provided by FirstRanker.com ---
b)
Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
c)
--- Content provided by FirstRanker.com ---
Write a short notes on Residual Risks.--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
d)
--- Content provided by FirstRanker.com ---
Establish the need for professional project management for complex projects.
[5]
--- Content provided by FirstRanker.com ---
e) Explain the issues and concerns related to staffing the information security function[5]PART - B
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
5 ? 10 Marks = 50
--- Content provided by FirstRanker.com ---
2.Explain in detail about the top down approach for implementing the information security?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]OR
3.
--- Content provided by FirstRanker.com ---
Describe in detail about the concept of CNSS security model.
--- Content provided by FirstRanker.com ---
[10]
--- Content provided by FirstRanker.com ---
4.Explain in detail about Information Security Planning and Governance.
--- Content provided by FirstRanker.com ---
[10]
OR
--- Content provided by FirstRanker.com ---
5.Explain the role of culture as it applies to ethics in information security.
[10]
--- Content provided by FirstRanker.com ---
6.
Identify and describe the categories and operating models of intrusion detection and
--- Content provided by FirstRanker.com ---
prevention systems.--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]
OR
--- Content provided by FirstRanker.com ---
7.Describe in detail about various risk control strategies.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]8.
--- Content provided by FirstRanker.com ---
How does Public-Key Infrastructure protect information assets?--- Content provided by FirstRanker.com ---
[10]
OR
--- Content provided by FirstRanker.com ---
9.Compare and Contrast between Symmetric and Asymmetric key cryptography.
[10]
--- Content provided by FirstRanker.com ---
10.
List and describe the options available for the location of the information security
--- Content provided by FirstRanker.com ---
functions within the organization. Discuss the advantages and disadvantages of eachoption?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]
OR
--- Content provided by FirstRanker.com ---
11.What does CERT stand for? Is there more than one CERT? What is the purpose of a
CERT? Explain.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]
---oo0oo---
--- Content provided by FirstRanker.com ---