Download JNTU Hyderabad (Jawaharlal Nehru Technological University Hyderabad) M Tech (Master of Engineering) II Semester May 2019 Cyber Security Question Paper
M.Tech II Semester End Examinations (Regular) ? May, 2019
Regulation: .?R18
CYBER SECURITY
Time: 3 Hours (CSE) Max Marks: 70
Answer ONE Question from each Unit
All Questions Carry Equal Marks
All parts of the question must be answered in one place only
UNIT ? I
1. (a) Explain in detail about various types of cyber crime and discuss brie?y about Web Server.[7M]
(b) Explain the n?tier web application architecture With an example. [7M]
2. (a) Explain about public key cryptography, its applications With an example. [7M]
(b) Describe the overview of cybercrime, nature and scope of cybercrime. [7M]
UNIT ? II
3. (a) Apply RSA algorithm to perform encryption and decryption for the p = 3; q = 11, e = 7;M = 5.
[7M]
(b) Describe brie?y about mail bombs and exploitation and various web attacks. [7M]
4. (a) What are digital laws and legislation. What are the roles and responses of law enforcement.
Explain. [7M]
(b) Explain security management system in online shopping and payment gateway system. [7M]
UNIT ? III
5. (a) Differentiate between symmetric and asymmetric encryptions [7M]
(b) Explain brie?y about cybercrime investigation tools. [7M]
6. (a) Explain about e?mail tracking, IP tracking and digital evidence collection? [7M]
(b) What step you Will take to conclude that a URL is malicious and steps Will you take When you
encounter a malicious URL. [7M]
UNIT ? IV
7. (a) What are the advanced tools used for forensics software and hardware analysis explain. [7M]
(b) Can a computer spoof a top connection to frame another computer in the same broadcast domain?
If so, explain in detail how? If not7 explain Why not. [7M]
8. (a) Explain brie?y the concept of digital forensics with example. [7M]
(b) Explain in detail about how forensics helps in face ,iris, ?ngerprint recognition, audio Video
analysis. [7M]
Page 1 of 2
9.
10.
(a)
(b)
(80
UNIT ? V
Explain in detail how large scale applications are protected from unauthorized users. [7M]
Explain the digital evidence handling procedure and evidence control. [7M]
List and explain all the sections of the electronic communication privacy act. Give example
situation Where a criminal is let free due to the drawbacks in electronic communication privacy
act. [7M]
Assume you are developing a website of a UNIVERSITY. List all the JDBC APIs and JDBC
drivers used to develop the software. [7M]
? o o O o o ?
Page 2 0f 2
This post was last modified on 20 January 2020