Download JNTUH MCA 5th Sem R15 2018 January 824BC Principles Of Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2018 January 824BC Principles Of Information Security Previous Question Paper


R15

Code No: 824BC















JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, January - 2018

PRINCIPLES OF INFORMATION SECURITY

Time: 3hrs















Max.Marks:75


Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.



PART - A



















5 ? 5 Marks = 25

1.a)

What is the need of information security explain?







[5]

b)

Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change?






















[5]

c)

Write a short notes on Residual Risks.











[5]

d)

Establish the need for professional project management for complex projects.

[5]

e) Explain the issues and concerns related to staffing the information security function[5]


PART - B



















5 ? 10 Marks = 50

2.

Explain in detail about the top down approach for implementing the information security?






















[10]

OR

3.

Describe in detail about the concept of CNSS security model.





[10]


4.

Explain in detail about Information Security Planning and Governance.



[10]

OR

5.

Explain the role of culture as it applies to ethics in information security.

[10]


6.

Identify and describe the categories and operating models of intrusion detection and
prevention systems.















[10]

OR

7.

Describe in detail about various risk control strategies.







[10]


8.

How does Public-Key Infrastructure protect information assets?





[10]

OR

9.

Compare and Contrast between Symmetric and Asymmetric key cryptography.

[10]


10.

List and describe the options available for the location of the information security
functions within the organization. Discuss the advantages and disadvantages of each
option?



















[10]

OR

11.

What does CERT stand for? Is there more than one CERT? What is the purpose of a
CERT? Explain.

















[10]

---oo0oo---


This post was last modified on 17 March 2023