Download JNTUH (Jawaharlal Nehru Technological University Hyderabad) MBA (Master of Business Administration) 2nd Semester (Second Semester) R15 2018 Jan 721CV Principles Of Information Security Previous Question Paper
Code No: 721CV
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MBA II Semester Examinations, January-2018
PRINCIPLES OF INFORMATION SECURITY
Time: 3hrs Max.Marks:75
Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A.
Part B consists of 5 Units. Answer any one full question from each unit. Each
question carries 10 marks and may have a, b, c as sub questions.
PART - A 5 ? 5 marks = 25
1.a) What are the three components of the C.I.A. triangle? What are they for? Explain.
[5]
b) How is due diligence different from due care? Why are both important? [5]
c) Describe how outsourcing can be for risk transference. [5]
d) Which kind of attack on cryptosystem involves using a collection of pre identified terms?
[5]
e) Explain the special requirements needed for the privacy of personnel data. [5]
PART ? B 5 ? 10 marks = 50
2.a) List and explain the components of information system.
b) Why is the top-down approach to information security superior to the bottom-up
approach? Explain. [5+5]
OR
3.a) Identify the six components of an information system. Which are most directly affected
by the study of computer security? Which are most commonly associated with its study?
b) Why do employees constitute one of the greatest threats to information security? Discuss.
[5+5]
4 What is intellectual property (IP)? Does it afforded the same protection in every country
of the world? What laws currently protect it in the United States and Europe? [10]
OR
5.a) What can be done to deter someone from committing a crime? Explain
b) Give a brief note on Information Security Policy, Standards, and Practices. [5+5]
6. Write the basic terminology that makes residential/SOHO firewall appliances effective in
protecting a local network. Why is this usually adequate for protection? [10]
OR
7. Explain the following terms:
a) Intrusion Detection and Prevention Systems
b) Firewalls and VPNs [5+5]
8.a) Why is it important to exchange keys ?out of band? in symmetric encryption?
b) How to implement nontechnical aspects of information security? Discuss. [5+5]
OR
9. Write the average key size of a ?strong encryption? system in use today. Explain in
detail. [10]
R15
FirstRanker.com - FirstRanker's Choice
Code No: 721CV
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MBA II Semester Examinations, January-2018
PRINCIPLES OF INFORMATION SECURITY
Time: 3hrs Max.Marks:75
Note: This question paper contains two parts A and B.
Part A is compulsory which carries 25 marks. Answer all questions in Part A.
Part B consists of 5 Units. Answer any one full question from each unit. Each
question carries 10 marks and may have a, b, c as sub questions.
PART - A 5 ? 5 marks = 25
1.a) What are the three components of the C.I.A. triangle? What are they for? Explain.
[5]
b) How is due diligence different from due care? Why are both important? [5]
c) Describe how outsourcing can be for risk transference. [5]
d) Which kind of attack on cryptosystem involves using a collection of pre identified terms?
[5]
e) Explain the special requirements needed for the privacy of personnel data. [5]
PART ? B 5 ? 10 marks = 50
2.a) List and explain the components of information system.
b) Why is the top-down approach to information security superior to the bottom-up
approach? Explain. [5+5]
OR
3.a) Identify the six components of an information system. Which are most directly affected
by the study of computer security? Which are most commonly associated with its study?
b) Why do employees constitute one of the greatest threats to information security? Discuss.
[5+5]
4 What is intellectual property (IP)? Does it afforded the same protection in every country
of the world? What laws currently protect it in the United States and Europe? [10]
OR
5.a) What can be done to deter someone from committing a crime? Explain
b) Give a brief note on Information Security Policy, Standards, and Practices. [5+5]
6. Write the basic terminology that makes residential/SOHO firewall appliances effective in
protecting a local network. Why is this usually adequate for protection? [10]
OR
7. Explain the following terms:
a) Intrusion Detection and Prevention Systems
b) Firewalls and VPNs [5+5]
8.a) Why is it important to exchange keys ?out of band? in symmetric encryption?
b) How to implement nontechnical aspects of information security? Discuss. [5+5]
OR
9. Write the average key size of a ?strong encryption? system in use today. Explain in
detail. [10]
R15
10.a) How an organization?s employment policies and practices can support the information
security effort?
b) With the help of neat diagram, explain the Vulnerability Assessment and Remediation.
[5+5]
OR
11. List and explain the Issues and concerns about staffing information security. [10]
---ooOoo---
FirstRanker.com - FirstRanker's Choice
This post was last modified on 23 October 2020