Previous Year Very Short Questions of IS (MCA 3rd)

INFORMATION SECURITY

Previous year question paper with solutions for INFORMATION SECURITY

Our website provides solved previous year question paper for INFORMATION SECURITY . Doing preparation from the previous year question paper helps you to get good marks in exams. From our IS question paper bank, students can download solved previous year question paper. The solutions to these previous year question paper are very easy to understand.

These Questions are downloaded from www.brpaper.com You can also download previous years question papers of 10th and 12th (PSEB & CBSE), B-Tech, Diploma, BBA, BCA, MBA, MCA, M-Tech, PGDCA, B-Com, BSc-IT, MSC-IT.

Print this page
  1. What are threats? Explain the different categories of Threats.
  2. Explain in detail about designing of security architecture with diagrams.
  3. What are the different means of User Authentication? How is it different from Authorization?
  4. What is need for Database Security in Database Management Systems?
  5. What are the Principles for Access Control? Explain the Role - Based Access Control with example.
  6. Discuss Software Security in detail and the various software security issues.
  7. Differentiate between Viruses and Worms.
  8. Differentiate between Payload - Attack agents and Payload - Information Theft.
  9. Briefly describe the Shift Rows and Byte Substitution layers of Rijndael. Explain why we can apply them in either order with the same result
  10. What is the purpose of a nonce in an end-point authentication protocol?
  11. What is meant by IP spoofing? How can a router be used to prevent IP spoofing?
  12. What is the main drawback of the one time pad cryptosystem?
  13. What are the differences between message confidentiality and message integrity? Can you have one without the other? Justify your answer
  14. What is the need of database security? Explain various methods using which a database can be secured in terms of Encryption, Access Control and Authenticates Access
  15. What are different kinds of malware?