0% found this document useful (0 votes)
63 views2 pages

Mobile Security Exam Questions

Uploaded by

vikesh.g0102
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views2 pages

Mobile Security Exam Questions

Uploaded by

vikesh.g0102
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Code No.

: 2460
MOBILE CONCEPTS AND SECURITY
Time : 2.30 Hours] [Maximum Marks : 50
[Minimum Marks : 17
NOTES :
i) Attempt all questions.
ii) Students are advised to specially check the Numerical Data of question paper in both versions. If there is any
difference in Hindi Translation of any question, the students should answer the question according to the English
version.
iii) Use of Pager and Mobile Phone by the students is not allowed.

Q1) Attempt any two questions from following : [2 × 5 = 10]

a) Explain Mobile Security Model.

b) What is Enterprise Mobile Environment? Write.

c) What is Mobile Crypto Algorithm? Write.

Q2) Attempt any two questions from following : [2 × 5 = 10]

a) What are the Applications of Mobile devices?

b) Explain testing and delivering of mobile devices.

c) What are the features and security concerns of mobile?

Q3) Attempt any two questions from following : [2 × 5 = 10]

a) Explain VOLTE and its working.

b) Explain WIFI Networks.

c) Explain Cellular Network.

Q4) Attempt any two questions from following : [2 × 5 = 10]

a) Explain Enterprise Mobility Program.

b) What is transactions security?

c) Explain BYOD Device Backup.

Q5) Attempt any two questions from following : [2 × 5 = 10]

a) What is cellular attacks?

b) Explain attacking web interface.

c) Explain SSL Attacks.

F - 3743 1 (P.T.O.)
2460
({hÝXr AZw d mX)

Zmo Q > : g^r àíZm| Ho$ CÎma Xr{OE &

à.1) {ZåZ _| go {H$Ýht Xmo H$m CÎma Xr{OE & [2 × 5 = 10]

H$) Mobile Security Model H$s ì`m»`m H$a| &

I) Enterprise Mobile à`m©daU Š`m h¡? {b{IE &

J) _mo~mBb Crypto Algorithm Š`m h¡? {b{IE &

à.2) {ZåZ _| go {H$Ýht Xmo H$m CÎma Xr{OE & [2 × 5 = 10]

H$) _mo~mBb `§Ì H$s Š`m Cn`mo{JVmE§ h¡ &

I) _mo~mBb `§Ì Ho$ narjU Am¡a {dVaU H$s ì`m»`m H$a§o &

J) _mo~mBb H$s {deofVmE§ Am¡a Security Concerns Š`m h¡ &

à.3) {ZåZ _| go {H$Ýht Xmo H$m CÎma Xr{OE & [2 × 5 = 10]

H$) VOLTE Am¡a BgH$s H$m`© àUmbr H$s ì`m»`m H$a| &

I) WIFI Networks H$s ì`m»`m H$a| &

J) Cellular Network H$s ì`m»`m H$a| &

à.4) {ZåZ _| go {H$Ýht Xmo H$m CÎma Xr{OE & [2 × 5 = 10]

H$) Enterprise Mobility àmoJ«m_ H$s ì`m»`m H$a| &

I) Transactions Security Š`m h¡? {b{IE &

J) BYOD `§Ì Backup H$s ì`m»`m H$[aE &

à.5) {ZåZ _| go {H$Ýht Xmo H$m CÎma Xr{OE & [2 × 5 = 10]

H$) Cellular attacks Š`m h¡?

I) Attacking web interface H$s ì`m»`m H$a| &

J) SSL Attacks H$s ì`m»`m H$a| &



F - 3743 2

You might also like