Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 2

MCA Vth Sem

Information Security and Cyber law


Test -1
Q1. What is the need of distributed information System.
Q2. What are the threats and attacks available to information security.? Classify.
Q3. Compare and contrast IPv4 and IPv6., also explain security features of them.
Q4. Explain any four networking componants.
Q5. Explain History and Importance of Inforamtion System.
Q6. Explain the crucial role of internet and web services? What are the elements of web
services

MCA Vth Sem


Information Security and Cyber law
Test -2
Q1. Explain the role of firewalls in computer network. What are various fire walls tupes
or techniques. What is the need of fire walls.
Q2. Explian physical security counter measures and RFID.
Q3. Explain TCP and IP and its security features.
Q4. Explain operating guidelines for implementing mobile devices security policies..
Q5. Explin different type of mobility and its implications.
Q6. What are the main security challenges Posed by mobile devices.
Ist Sessional

1x6
1. Explain use of RFID.
2. What is triad of InfoSec.
3. Explain security classification of data.
4. What is EDI explain in brief.
5. What are basic Tenets of physical security?
6. What are security patches?

3x3

1. What is Access control, User identification and Authentication in Biometric system.


2. What are measurement and metrics? Write some possible areas of measurement.
3. What is cryptography? Differentiate between symmetric and asymmetric cryptography
by giving some examples.

3x5

1. Explain SSE – CMM. What are the maturity levels of SSE- CMM?
2. Discuss frame works / standards of IS.
3. Explain Role of Firewalls in computer network. What are various firewalls types or
techniques? What is need of firewall?

You might also like