Printed Pages: 3
AUC-002
(Following Paper ID and Roll No. to be filled in your Answer Books)
--- Content provided by FirstRanker.com ---
Paper ID: 2289422
Roll No.
B.TECH.
Regular Theory Examination (Odd Sem - III), 2016-17
Time: 3 Hours
--- Content provided by FirstRanker.com ---
CYBER SECURITY
Max. Marks: 100
Note: Attempt all Sections. If require any missing data; then choose suitably.
SECTION-A
- Attempt all questions in brief. (10×2=20)
- Explain Functions of Information System with suitable diagram.
- Explain the concept of EDI.
- What are WWW policies in Cyber Security?
- What are Email Security policies?
- Explain Copyright Law in Cyber Security.
- What do you mean by access control to information resources?
- How do distributed information systems help the global enterprises in today’s business world?
- What are basic elements of information system security?
- What is Development of Information Systems?
- What is digital signature?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
SECTION - B
2. Attempt any three of the following : (3×10=30)
--- Content provided by FirstRanker.com ---
- What is Intellectual Property Law?
- What are the fingerprints? Briefly describe the use of the finger print in current scenario.
- Explain Legal issues in Data mining Security.
- Explain the concept of payment in E-commerce.
- What are the security threats in mobile computing?
--- Content provided by FirstRanker.com ---
SECTION-C
3. Attempt any one part of the following (1×10=10)
- What is Security Threats to E Commerce?
- What is Cyber Security? How to Secure your information explain in detail?
4. Attempt any one part of the following (1×10=10)
- What are decision support systems? Discuss major functional requirement of a decision support system.
- What is Virtual Private Network? FirstRanker.com
--- Content provided by FirstRanker.com ---
5. Attempt any one part of the following (1×10=10)
- Discuss the advantages of Biometrics over traditional authentication method. FirstRanker.com
- Explain the Payment System in E-Commerce.
6. Attempt any one part of the following (1×10=10)
--- Content provided by FirstRanker.com ---
- What is different type of Network Security?
- Explain the different types of firewall with limitations. FirstRanker.com
7. Attempt any one part of the following (1×10=10)
- What are decision support systems? Discuss major functional requirement of a decision support system.
- What is Face Recognisation in Cyber Security?
--- Content provided by FirstRanker.com ---
This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University
--- Content provided by FirstRanker.com ---