Are you looking for important questions of IT2042 Information Security ? Get here all important questions for IT2042 Information Security to write an exam on 30-11-2015 to be conducted by the Anna University Chennai. Read more details below.
Anna University Chennai
Department of B.Tech IT/CSE
Eighth Semester
IT2042 Information Security
November / December 2015 Exam Important Questions
(Regulation 2013)
1. Explain the Critical Characteristics of Information
2. Explain SDLC in detail.
3. Explain the functions of an Information security organization
4. Explain the Components of an Information System
5. Explain the types of Attacks in detail?
6. Explain the categories of Threat in detail.
7. Explain General Computer Crime Laws
8. Explain Ethical Concepts in Information Security
9. Explain Risk Control strategies in detail
10. Explain Risk assessment in detail.
11. Explain Risk Mitigation strategy Selection
12. Explain the types of Policies in detail.
13. Explain Information Security Policy, Standards and Practices in detail.
14. Explain protocols for Secure communication in detail.
15. Explain the Major Steps in Contingency Planning.
16. Explain the design of Security Architecture in detail.
17. Explain about RSA algorithm.
18. Explain Scanning and Analysis Tools in detail
19. Explain Firewalls in detail.
20. Explain IDS in detail
Anna University Chennai
Department of B.Tech IT/CSE
Eighth Semester
IT2042 Information Security
November / December 2015 Exam Important Questions
(Regulation 2013)
Important 16 marks questions (part B questions) of IT2042 Information Security
1. Explain the Critical Characteristics of Information
2. Explain SDLC in detail.
3. Explain the functions of an Information security organization
4. Explain the Components of an Information System
5. Explain the types of Attacks in detail?
6. Explain the categories of Threat in detail.
7. Explain General Computer Crime Laws
8. Explain Ethical Concepts in Information Security
9. Explain Risk Control strategies in detail
10. Explain Risk assessment in detail.
11. Explain Risk Mitigation strategy Selection
12. Explain the types of Policies in detail.
13. Explain Information Security Policy, Standards and Practices in detail.
14. Explain protocols for Secure communication in detail.
15. Explain the Major Steps in Contingency Planning.
16. Explain the design of Security Architecture in detail.
17. Explain about RSA algorithm.
18. Explain Scanning and Analysis Tools in detail
19. Explain Firewalls in detail.
20. Explain IDS in detail
0 comments:
Pen down your valuable important comments below