Code: 9F00404a
MCA IV Semester Regular & Supplementary Examinations July 2015
INFORMATION SECURITY
--- Content provided by FirstRanker.com ---
(For students admitted in 2009, 2010, 2011, 2012 and 2013 only)
Time: 3 hours Max Marks: 60
Answer any FIVE questions
All questions carry equal marks
- Discuss the general model that reflects a concern for protecting an information system from unwanted access.
- What criteria are to be met for a specification to become a standard?
- Draw the overall structure of AES and explain.
- List key distribution using public key cryptography.
- List the design objectives of HMAC.
- Explain PGP trust model with an example.
- What is the difference between signed data and clear signed data?
- Explain about the routing applications of IPSec.
- Explain encapsulating security payload protocol in detail.
- What services SSL record protocol provides for SSL connections?
- Explain how a dual signature is constructed.
- Under what circumstances a decentralized distributed approach works best. Discuss.
- Who is an intruder? Discuss about the intrusion techniques.
- Explain the general model of access control as exercised by DBMS.
- Discuss in detail, two types of proxy based firewalls.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
More resources available at: FirstRanker.com
--- Content provided by FirstRanker.com ---
This download link is referred from the post: JNTUA MCA 4th Sem last 10 year 2010-2020 Previous Question Papers (JNTU Anantapur)
--- Content provided by FirstRanker.com ---