FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R15 2018 January 824BC Principles Of Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2018 January 824BC Principles Of Information Security Previous Question Paper

This post was last modified on 17 March 2023


R15

Code No: 824BC

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by FirstRanker.com ---


MCA V Semester Examinations, January - 2018

PRINCIPLES OF INFORMATION SECURITY

--- Content provided by FirstRanker.com ---

Time: 3hrs




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


Max.Marks:75


Note: This question paper contains two parts A and B.

--- Content provided by FirstRanker.com ---


Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.

--- Content provided by FirstRanker.com ---



PART - A


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



5 ? 5 Marks = 25

1.a)

--- Content provided by FirstRanker.com ---


What is the need of information security explain?



--- Content provided by FirstRanker.com ---





[5]

--- Content provided by FirstRanker.com ---


b)

Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change?

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[5]

c)

--- Content provided by FirstRanker.com ---

Write a short notes on Residual Risks.




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[5]

d)

--- Content provided by FirstRanker.com ---


Establish the need for professional project management for complex projects.

[5]

--- Content provided by FirstRanker.com ---

e) Explain the issues and concerns related to staffing the information security function[5]


PART - B

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




5 ? 10 Marks = 50

--- Content provided by FirstRanker.com ---

2.

Explain in detail about the top down approach for implementing the information security?


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[10]

OR

3.

--- Content provided by FirstRanker.com ---


Describe in detail about the concept of CNSS security model.



--- Content provided by FirstRanker.com ---



[10]


--- Content provided by FirstRanker.com ---

4.

Explain in detail about Information Security Planning and Governance.


--- Content provided by FirstRanker.com ---


[10]

OR

--- Content provided by FirstRanker.com ---

5.

Explain the role of culture as it applies to ethics in information security.

[10]

--- Content provided by FirstRanker.com ---



6.

Identify and describe the categories and operating models of intrusion detection and

--- Content provided by FirstRanker.com ---

prevention systems.




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[10]

OR

--- Content provided by FirstRanker.com ---

7.

Describe in detail about various risk control strategies.


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[10]


8.

--- Content provided by FirstRanker.com ---

How does Public-Key Infrastructure protect information assets?




--- Content provided by FirstRanker.com ---


[10]

OR

--- Content provided by FirstRanker.com ---

9.

Compare and Contrast between Symmetric and Asymmetric key cryptography.

[10]

--- Content provided by FirstRanker.com ---



10.

List and describe the options available for the location of the information security

--- Content provided by FirstRanker.com ---

functions within the organization. Discuss the advantages and disadvantages of each
option?



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[10]

OR

--- Content provided by FirstRanker.com ---

11.

What does CERT stand for? Is there more than one CERT? What is the purpose of a
CERT? Explain.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[10]

---oo0oo---

--- Content provided by FirstRanker.com ---