0% found this document useful (0 votes)
79 views

Ics 405 Final

This document contains exam questions related to cyber law and information security. It asks students to answer questions in 3 sections. Section 1 asks students to choose 3 out of 4 short answer questions related to public key cryptography, firewalls, patent protection for designs, and legal dimensions of information security. Section 2 asks students to choose 2 out of 3 longer answer questions related to digital signatures/certificates under the IT Act 2000, requirements for payment systems in e-commerce including credit card transactions, and electronic data interchange systems. Section 3 asks students to choose 2 out of 3 longer answer questions related to biometric systems including their design issues, types of hacking in networks and approaches for hacking detection.

Uploaded by

arjunv_14
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views

Ics 405 Final

This document contains exam questions related to cyber law and information security. It asks students to answer questions in 3 sections. Section 1 asks students to choose 3 out of 4 short answer questions related to public key cryptography, firewalls, patent protection for designs, and legal dimensions of information security. Section 2 asks students to choose 2 out of 3 longer answer questions related to digital signatures/certificates under the IT Act 2000, requirements for payment systems in e-commerce including credit card transactions, and electronic data interchange systems. Section 3 asks students to choose 2 out of 3 longer answer questions related to biometric systems including their design issues, types of hacking in networks and approaches for hacking detection.

Uploaded by

arjunv_14
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

ICS-405 No.

of Printed Pages 2 ICS-405


(c) What is Internet Service Provider? Explain Domain and Host Roll No.
Naming and distinguish between them.

B. TECH.
4. Attempt any Two of the following questions: 10 x 2 = 20
FOURTH SEMESTER EXAMINATION, 2015-16
(a) What do you mean by software piracy? Discuss about the objectives
CYBER LAW AND INFORMATION SECURITY
and scope of the IT Act 2000.
(b) Discuss the powers and functions of controller of certifying
Time : 2 Hours Max. Marks : 75
authorities under the Information technology Act, 2000.
Note : (i) Attempt ALL questions.
(c) How the electronic Agreements can be protected? Discuss the (ii) Choices are given in each question set.
types of evidences for proving the electronic Agreements.
1. Attempt any Three of the following questions: 5 x 3 = 15
(a) Write a short note on public key cryptography.
(b) What do you understand by firewalls?
(c) Explain cyber law related to Patent protection to design.
(d) Explain legal dimensions of the Information Security.

2. Attempt any Two of the following questions: 10 x 2 = 20


(a) State and explain the digital Signature, Digital certificate under the
Information Act, 2000.
(b) What are the requirements of Payment systems in e-commerce?
Explain the working of credit card transaction in e-commerce.
(c) What is electronic Data Interchange (EDI)? How does EDI work?
Discuss the benefits of EDI.

3. Attempt any Two of the following questions: 10 x 2 = 20


(a) Define Biometric systems. Discuss design issues in biometric
systems with the help of diagrams.
(b) Discuss various types of hacking possible in a network system.
What are the approaches used for detection of the hacking.
2 1 P.T.O.

You might also like