Exam Details
Subject | cyber laws and security control | |
Paper | ||
Exam / Course | b.c.a | |
Department | ||
Organization | solapur university | |
Position | ||
Exam Date | November, 2017 | |
City, State | maharashtra, solapur |
Question Paper
B.C.A. (Semester VI) (CGPA) Examination Oct/ Nov-2017
CYBER LAWS AND SECURITY CONTROL
Day Date: Monday, 13-11-2017 Max. Marks: 70
Time: 10.30 AM to 01.00 PM
Instructions: Q.1 and Q.7 are compulsory.
Attempt any two questions from Q. 3 and 4.
Attempt any one question from Q. 5 and 6.
Figures to the right indicate full marks.
Q.1 Choose correct alternatives: 14
Conversion of plain text to unreadable text is called as
Encryption Decryption
Both a b Cryptography
A digital signature is
A bit string giving identity of a correspondent
A unique identification of a sender
An authentication of an electronic record by trying it uniquely to a key
only a sender knows
An encrypted signature of a sender
Authentication is
Modification
Insertion
Hard to assure identity of user on a remote system
None of the above
The Uniform Electronic Commerce Act (UECA) was modeled after the
E-Sign Law
UNCITRAL Model Law on E-Commerce
UNCITRAL Model Law on Electronic Signatures
None of these
EDI over internet
MIME to attach EDI forms to e-mail messages
FTP to send business forms
HTTP to send business forms
SGML to send business forms
An Electronic cash payment is customer buys several electronic coins which
are digitally signed by coin issuing bank.
True False
Page 2 of 2
SLR-CD-23
The one key for encryption and another key for decryption is
cryptography.
Symmetric Asymmetric
Both a b None of these
DES stands for Digital Encoded Standard.
True False
is legal authority to issue the digital certificate.
CEO of company Government of India
Certificate Authority None of these
10) is not threats in security.
Active Passive
Digital Signature None of these
11) is the types of cybercrime.
Data Information
Both a b None of these
12) The altering of data so that it is not usable unless the changes are undone is
called encryption.
True False
13) activity is not supported by E-commerce tread cycle.
Presales After Sales
Both a b None of these
14) The Electronic Commerce means purchasing of electrical goods.
True False
Q.2 What is data protection? Why it is necessary. 05
Explain various threats of security in detail. 05
Write note on Data encryption. 04
Q.3 What is digital signature? Where is it used? 05
Write down difference between traditional commerce and E-commerce. 05
Explain the need of security and control 04
Q.4 Explain the Scope of Electronic commerce. 05
What is hardware and software security? Why it is important 05
Explain the various security aspects in cyber law. 04
Q.5 The various certifying authorities in digital signature explain in detail. 07
Explain the key elements certification and monitoring prevention of crimes in
Information Technology Act-2000 in detail.
07
Q.6 Explain various applications of UNCITRAL Model law. 07
What is Security? Explain different types of Security 07
Q.7 Write short notes on (Solve Any two) 14
Authentication and Authorization.
Ethics for computer user.
Security audit.
CYBER LAWS AND SECURITY CONTROL
Day Date: Monday, 13-11-2017 Max. Marks: 70
Time: 10.30 AM to 01.00 PM
Instructions: Q.1 and Q.7 are compulsory.
Attempt any two questions from Q. 3 and 4.
Attempt any one question from Q. 5 and 6.
Figures to the right indicate full marks.
Q.1 Choose correct alternatives: 14
Conversion of plain text to unreadable text is called as
Encryption Decryption
Both a b Cryptography
A digital signature is
A bit string giving identity of a correspondent
A unique identification of a sender
An authentication of an electronic record by trying it uniquely to a key
only a sender knows
An encrypted signature of a sender
Authentication is
Modification
Insertion
Hard to assure identity of user on a remote system
None of the above
The Uniform Electronic Commerce Act (UECA) was modeled after the
E-Sign Law
UNCITRAL Model Law on E-Commerce
UNCITRAL Model Law on Electronic Signatures
None of these
EDI over internet
MIME to attach EDI forms to e-mail messages
FTP to send business forms
HTTP to send business forms
SGML to send business forms
An Electronic cash payment is customer buys several electronic coins which
are digitally signed by coin issuing bank.
True False
Page 2 of 2
SLR-CD-23
The one key for encryption and another key for decryption is
cryptography.
Symmetric Asymmetric
Both a b None of these
DES stands for Digital Encoded Standard.
True False
is legal authority to issue the digital certificate.
CEO of company Government of India
Certificate Authority None of these
10) is not threats in security.
Active Passive
Digital Signature None of these
11) is the types of cybercrime.
Data Information
Both a b None of these
12) The altering of data so that it is not usable unless the changes are undone is
called encryption.
True False
13) activity is not supported by E-commerce tread cycle.
Presales After Sales
Both a b None of these
14) The Electronic Commerce means purchasing of electrical goods.
True False
Q.2 What is data protection? Why it is necessary. 05
Explain various threats of security in detail. 05
Write note on Data encryption. 04
Q.3 What is digital signature? Where is it used? 05
Write down difference between traditional commerce and E-commerce. 05
Explain the need of security and control 04
Q.4 Explain the Scope of Electronic commerce. 05
What is hardware and software security? Why it is important 05
Explain the various security aspects in cyber law. 04
Q.5 The various certifying authorities in digital signature explain in detail. 07
Explain the key elements certification and monitoring prevention of crimes in
Information Technology Act-2000 in detail.
07
Q.6 Explain various applications of UNCITRAL Model law. 07
What is Security? Explain different types of Security 07
Q.7 Write short notes on (Solve Any two) 14
Authentication and Authorization.
Ethics for computer user.
Security audit.
Other Question Papers
Subjects
- advance programming in c
- advanced java – i
- advanced java – ii
- advanced programming in ‘c’
- advanced web technology
- basics of ‘c’ programming
- business communication
- business statistics
- communication skills
- computer graphics
- computer oriented statistics
- core java
- cyber laws and security control
- data structure using ‘c’
- data structures using ‘c’
- data warehouse and data mining
- database management system
- dbms with oracle
- development of human skills
- digital electronics
- discrete mathematics
- e-commerce
- e-governance
- financial accounting with tally
- financial management
- fundamentals of computer
- fundamentals of financial accounting
- introduction to data mining & warehousing
- introduction to information technology
- linux and shell programming
- management information system
- networking & data communication
- networking and data communication
- object oriented programming with c++
- oop with c++
- operating system
- operations research
- operting system
- procedural programming through ‘c’
- python
- rdbms with oracle
- software engineering
- software project management
- software testing
- theory of computation
- visual programming
- web technology
- web technology – ii
- web technology – iii