R15
--- Content provided by FirstRanker.com ---
Code No: 824BC--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MCA V Semester Examinations, December - 2019
--- Content provided by FirstRanker.com ---
PRINCIPLES OF INFORMATION SECURITYTime: 3hrs
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Max.Marks:75
S Note: This question paper contains two parts A and B.
--- Content provided by FirstRanker.com ---
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part Bconsists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.
--- Content provided by FirstRanker.com ---
PART - A
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
5 ? 5 Marks = 25
1.a) List an explain the key characteristics of an information security.
--- Content provided by FirstRanker.com ---
[5]
b) Differentiate between laws and Ethics?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
c)
--- Content provided by FirstRanker.com ---
List the five generations of firewall technology.Which generations is still in commonuse?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
d)
--- Content provided by FirstRanker.com ---
What is the fundamental difference between symmetric and asymmetric encryption. [5]e) Describe the special requirements needed to ensure the privacy of personnel data. [5]
--- Content provided by FirstRanker.com ---
PART - B
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
5 ? 10 Marks = 50
--- Content provided by FirstRanker.com ---
2.
With a neat diagram explain the approaches used for the implementation of information
security?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]
--- Content provided by FirstRanker.com ---
OR
3.
--- Content provided by FirstRanker.com ---
What are the unique steps performed in security systems development life cycle model?[10]
4.
--- Content provided by FirstRanker.com ---
Describe the functions and relationships among laws, regulations, and professional,
organizations in information security?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]
--- Content provided by FirstRanker.com ---
OR
5.
--- Content provided by FirstRanker.com ---
Identify major national laws that affect the practice of information security.[10]
--- Content provided by FirstRanker.com ---
6.Explain the fundamental aspects of documenting risk via the process of risk assessment?
[10]
--- Content provided by FirstRanker.com ---
OR
7.
--- Content provided by FirstRanker.com ---
Describe the technology that enables the use of virtual private networks.[10]
--- Content provided by FirstRanker.com ---
8.
Discuss the nature and execution of the dominant methods of attack used against
cryptosystems.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]
OR
--- Content provided by FirstRanker.com ---
9.
Describe key physical security considerations, including fire control and surveillance
systems.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]
--- Content provided by FirstRanker.com ---
10.
--- Content provided by FirstRanker.com ---
Illustrate how an organization's employment policies and practices can support theinformation security effort.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]OR
11.
--- Content provided by FirstRanker.com ---
Describe how planning, risk assessment, vulnerability assessment, and remediation tie
into information security maintenance.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]
--- Content provided by FirstRanker.com ---
---ooOoo---
--- Content provided by FirstRanker.com ---