FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R15 2018 January 824BC Principles Of Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2018 January 824BC Principles Of Information Security Previous Question Paper

This post was last modified on 17 March 2023

--- Content provided by‌ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by FirstRanker.com ---





JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by⁠ FirstRanker.com ---


MCA V Semester Examinations, January - 2018

PRINCIPLES OF INFORMATION SECURITY

--- Content provided by FirstRanker.com ---

Time: 3hrs




--- Content provided by‍ FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---


Max.Marks:75


Note: This question paper contains two parts A and B.

--- Content provided by⁠ FirstRanker.com ---


Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.

--- Content provided by‍ FirstRanker.com ---



PART - A


--- Content provided by‌ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by FirstRanker.com ---



5 ? 5 Marks = 25

1.a)

--- Content provided by‍ FirstRanker.com ---


What is the need of information security explain?



--- Content provided by​ FirstRanker.com ---





[5]

--- Content provided by‍ FirstRanker.com ---


b)

Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change?

--- Content provided by‌ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---


[5]

c)

--- Content provided by‍ FirstRanker.com ---

Write a short notes on Residual Risks.




--- Content provided by​ FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[5]

d)

--- Content provided by​ FirstRanker.com ---


Establish the need for professional project management for complex projects.

[5]

--- Content provided by‍ FirstRanker.com ---

e) Explain the issues and concerns related to staffing the information security function[5]


PART - B

--- Content provided by​ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---




5 ? 10 Marks = 50

--- Content provided by‍ FirstRanker.com ---

2.

Explain in detail about the top down approach for implementing the information security?


--- Content provided by‌ FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---

[10]

OR

3.

--- Content provided by FirstRanker.com ---


Describe in detail about the concept of CNSS security model.



--- Content provided by FirstRanker.com ---



[10]


--- Content provided by‍ FirstRanker.com ---

4.

Explain in detail about Information Security Planning and Governance.


--- Content provided by‌ FirstRanker.com ---


[10]

OR

--- Content provided by​ FirstRanker.com ---

5.

Explain the role of culture as it applies to ethics in information security.

[10]

--- Content provided by​ FirstRanker.com ---



6.

Identify and describe the categories and operating models of intrusion detection and

--- Content provided by‌ FirstRanker.com ---

prevention systems.




--- Content provided by‍ FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---


[10]

OR

--- Content provided by​ FirstRanker.com ---

7.

Describe in detail about various risk control strategies.


--- Content provided by⁠ FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[10]


8.

--- Content provided by FirstRanker.com ---

How does Public-Key Infrastructure protect information assets?




--- Content provided by​ FirstRanker.com ---


[10]

OR

--- Content provided by‍ FirstRanker.com ---

9.

Compare and Contrast between Symmetric and Asymmetric key cryptography.

[10]

--- Content provided by⁠ FirstRanker.com ---



10.

List and describe the options available for the location of the information security

--- Content provided by‍ FirstRanker.com ---

functions within the organization. Discuss the advantages and disadvantages of each
option?



--- Content provided by FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---


[10]

OR

--- Content provided by⁠ FirstRanker.com ---

11.

What does CERT stand for? Is there more than one CERT? What is the purpose of a
CERT? Explain.

--- Content provided by FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---


[10]

---oo0oo---

--- Content provided by‌ FirstRanker.com ---