FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download AKTU B-Tech 4th Sem 2015-16 AUC 002 Cyber Security Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 4th Semester (Fourth Semester) 2015-16 AUC 002 Cyber Security Question Paper

This post was last modified on 29 January 2020

AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University


FirstRanker.com

AUC-002

(Following Paper ID and Roll No. to be filled in your Answer Books)

--- Content provided by⁠ FirstRanker.com ---

Paper ID : 199992

Roll No. ...................

Theory Examination (Semester-IV) 2015-16

CYBER SECURITY

Time: 2 Hours

--- Content provided by​ FirstRanker.com ---

Max. Marks: 50

Section-A

Note: Attempt all the parts. All parts carry equal marks. Write answer of each part in short.

Q1. Attempt any five parts : (2×5=10)

  1. (a) What are the security threats? Discuss.
  2. --- Content provided by‍ FirstRanker.com ---

  3. (b) What do you understand by security structure and design?
  4. (c) Describe the Intellectual Property Issues (IPR).
  5. (d) Discuss the difference between Malware and spyware.
  6. (e) What is a virus? Explain.
  7. (g) What is security SDLC? Explain its different phases.
  8. --- Content provided by⁠ FirstRanker.com ---

  9. (h) Explain and differentiate between integrating security at the implementation phase and the developing phase.

Section-B

Q2. Attempt any four questions from this section. (4×5=20)

  1. (a) What are the key technological components used for security implementation?
  2. (b) What is the information security? Explain cyber-crime and cyber security in this reference.
  3. --- Content provided by FirstRanker.com ---

  4. (c) Draw the diagrammatical approach to make difference between symmetric and asymmetric cryptography.
  5. (d) How can you say that intrusion detection system is the backbone of information system? Justify along with its categories.

Section-C

Note: Attempt any two questions from this section. (2×10=20)

Q3. Elaborate the term access control. What is included in authorization process for (File, Program, Data rights) and explain the all types of controls. [5+5]

--- Content provided by‍ FirstRanker.com ---

Q4. What are the data security considerations? Explain in this reference Data backup security, data archival security and data disposal considerations. [5+5]

Q5. Write short notes on the follows:

  1. (i) Intellectual Property Law
  2. (ii) Copyright Act
  3. (iii) Cyber Laws in India.
  4. --- Content provided by‌ FirstRanker.com ---

FirstRanker.com



This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University

--- Content provided by⁠ FirstRanker.com ---