FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download AKTU B-Tech 5th Sem 2018-2019 RUC 501 Cyber Security Question Paper

Download AKTU (Dr. A.P.J. Abdul Kalam Technical University (AKTU), formerly Uttar Pradesh Technical University (UPTU) B-Tech 5th Semester (Fifth Semester) 2018-2019 RUC 501 Cyber Security Question Paper

This post was last modified on 29 January 2020

AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University


Firstranker's choice

Printed Pages: 01

FirstRanker.com

--- Content provided by⁠ FirstRanker.com ---

Paper Id: 199503

Sub Code: RUC 501

FirstRanker.com

Roll No.

B TECH

--- Content provided by‌ FirstRanker.com ---

(SEM V) THEORY EXAMINATION 2018-19

CYBER SECURITY

Time: 3 Hours

Total Marks: 70

Note: 1. Attempt all Sections. If require any missing data; then choose suitably.

--- Content provided by‌ FirstRanker.com ---

SECTION A

  1. Attempt all questions in brief. 2 x 7 = 14
    1. Write a short note on the Copyright Act?
    2. What do you mean by physical Security for information Systems?
    3. Describe Intellectual Property Issues (IPR).
    4. Write short notes on "Patent Law".
    5. --- Content provided by‍ FirstRanker.com ---

    6. What do you mean by WWW policy?
    7. Give small notes on Corporate Policy.
    8. Differentiate between Cyber Security and Information Security.

SECTION B

--- Content provided by‌ FirstRanker.com ---

  1. Attempt any three of the following: 7 x 3 = 21
    1. What are the key differences between Symmetric and Asymmetric encryption?
    2. Explain Information Security Governance in detail and process involved in the Risk Management?
    3. Explain briefly about Application Development Security with guidelines.
    4. Elaborate the term Access Control. What is include in authorization process for (File, Program, Data rights) and explain the all types of controls.
    5. What do you understand by security structure (Architecture) and design?
    6. --- Content provided by​ FirstRanker.com ---

SECTION C

  1. Attempt any one part of the following: 7x1=7
    1. What do you mean by Intellectual Property? Describe various means using which Intellectual Property may be protected to an extent.
    2. Explain Confidentiality, Integrity and Availability in terms of cyber security.
  2. --- Content provided by​ FirstRanker.com ---

  3. Attempt any one part of the following: 7x1=7
    1. What are the approaches followed in developing Information System (IS)? Explain the difference between security and threats.
    2. What is the need of information Security also explain the term ISMS?
  4. Attempt any one part of the following: 7x1=7
    1. Explain the role of Security in Internet and Web Services.
    2. What is Intrusion Detection System? Explain with Block Diagram.
    3. --- Content provided by​ FirstRanker.com ---

  5. Attempt any one part of the following: 7x1=7
    1. Explain in Detail about Secure Information System Development.
    2. Describe the working principle of CCTV.
  6. Attempt any one part of the following: 7x1=7
    1. What are the Data Security Considerations? Explain in this reference Data Backup Security.
    2. --- Content provided by FirstRanker.com ---

    3. What is Public Key Cryptography? Define its Advantage and Disadvantage.


--- Content provided by FirstRanker.com ---

This download link is referred from the post: AKTU B-Tech Last 10 Years 2010-2020 Previous Question Papers || Dr. A.P.J. Abdul Kalam Technical University