FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R15 2019 December 824BC Principles Of Information Security Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2019 December 824BC Principles Of Information Security Previous Question Paper

This post was last modified on 17 March 2023




R15

--- Content provided by FirstRanker.com ---

Code No: 824BC




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, December - 2019

--- Content provided by FirstRanker.com ---

PRINCIPLES OF INFORMATION SECURITY

Time: 3hrs


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


Max.Marks:75

S Note: This question paper contains two parts A and B.

--- Content provided by FirstRanker.com ---

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.


--- Content provided by FirstRanker.com ---


PART - A



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


5 ? 5 Marks = 25

1.a) List an explain the key characteristics of an information security.

--- Content provided by FirstRanker.com ---



[5]

b) Differentiate between laws and Ethics?

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[5]

c)

--- Content provided by FirstRanker.com ---

List the five generations of firewall technology.Which generations is still in common
use?



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[5]

d)

--- Content provided by FirstRanker.com ---

What is the fundamental difference between symmetric and asymmetric encryption. [5]

e) Describe the special requirements needed to ensure the privacy of personnel data. [5]


--- Content provided by FirstRanker.com ---


PART - B



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





5 ? 10 Marks = 50

--- Content provided by FirstRanker.com ---


2.

With a neat diagram explain the approaches used for the implementation of information
security?

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[10]

--- Content provided by FirstRanker.com ---


OR

3.

--- Content provided by FirstRanker.com ---

What are the unique steps performed in security systems development life cycle model?

[10]

4.

--- Content provided by FirstRanker.com ---


Describe the functions and relationships among laws, regulations, and professional,
organizations in information security?


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[10]

--- Content provided by FirstRanker.com ---


OR

5.

--- Content provided by FirstRanker.com ---

Identify major national laws that affect the practice of information security.

[10]


--- Content provided by FirstRanker.com ---

6.

Explain the fundamental aspects of documenting risk via the process of risk assessment?

[10]

--- Content provided by FirstRanker.com ---


OR

7.

--- Content provided by FirstRanker.com ---

Describe the technology that enables the use of virtual private networks.

[10]


--- Content provided by FirstRanker.com ---


8.

Discuss the nature and execution of the dominant methods of attack used against
cryptosystems.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[10]

OR

--- Content provided by FirstRanker.com ---


9.

Describe key physical security considerations, including fire control and surveillance
systems.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[10]

--- Content provided by FirstRanker.com ---




10.

--- Content provided by FirstRanker.com ---

Illustrate how an organization's employment policies and practices can support the
information security effort.



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[10]

OR

11.

--- Content provided by FirstRanker.com ---


Describe how planning, risk assessment, vulnerability assessment, and remediation tie
into information security maintenance.


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[10]

--- Content provided by FirstRanker.com ---




---ooOoo---

--- Content provided by FirstRanker.com ---