0% found this document useful (0 votes)
282 views1 page

IS Model Paper

This document is a model paper for the BCA-VI Semester examination in Information Security at Bhavan's Vivekananda College, detailing the structure of the exam. It includes two parts: Part A consists of ten short answer questions worth 20 marks, while Part B contains five detailed questions worth 50 marks. Topics covered include information systems, security threats, risk assessment, software attacks, and cryptographic tools.

Uploaded by

dy25218
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
282 views1 page

IS Model Paper

This document is a model paper for the BCA-VI Semester examination in Information Security at Bhavan's Vivekananda College, detailing the structure of the exam. It includes two parts: Part A consists of ten short answer questions worth 20 marks, while Part B contains five detailed questions worth 50 marks. Topics covered include information systems, security threats, risk assessment, software attacks, and cryptographic tools.

Uploaded by

dy25218
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

​ ​ ​ ​ ​ ​ ​ ​ ​ ​ Code No: BCA 641

BHAVAN’S VIVEKANANDA COLLEGE OF SCIENCE, HUMANITIES AND


COMMERCE ​
(Accredited with ‘A’ grade by NAAC)
Autonomous College
Affiliated to Osmania University
BCA-VI Semester: Semester End Examination- 2025
Paper: INFORMATION SECURITY
Time: 3 Hours​ ​ ​ Model Paper​​ ​ Max. Marks: 70

PART A
​ Answer all of the following questions​ ​ ​ ​ ​ (10 X 2 = 20 Marks)​
1.​ Explain the Components of Information System.
2.​ Explain Security Threats.
3.​ Define major stages of Risk Assessment.
4.​ Differences between Quantitative and Qualitative Risk Control Practices.
5.​ Explain about Information Security Blueprint.
6.​ Explain Firewalls and its types.
7.​ What is Honey pots & Honey nets?
8.​ Write about Cryptography Protocols..
9.​ Explain Internal Control Strategies.
10.​Explain Digital Forensics.​​ ​ ​

PART B
Answer ALL the Questions​ ​ ​ ​ ​ ​ ​ ​ (5 X 10 = 50 Marks)
UNIT I
​ 11. Explain in detail about SDLC (System Development Life Cycle).
​ ​ ​ ​ ​ ​ ​ OR
​ 12. Explain different types of Software Attacks.

UNIT II
​ 13. Explain in detail International Laws and Legal Bodies.
​ ​ ​ ​ ​ ​ ​ OR
14. Explain Risk Identification in detail.

UNIT III
​ 15. Explain Information Security Policy, Standards and Practices (ISSP) .
​ ​ ​ ​ ​ ​ ​ OR
​ 16. How can we protect Remote Connections?

UNIT IV
​ 17. Explain Intrusion Detection and Prevention Systems.
​ ​ ​ ​ ​ ​ ​ OR
​ 18. Explain Cryptographic Tools for secure communication.

UNIT V
​ 19. Explain the technical and non-technical aspects of implementing Information Security.​
​​ ​ ​ ​ ​ OR
​ 20. Explain in detail Security Management Maintenance Models.

You might also like