FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

PTU B.Tech CSE 6th Semester May 2019 71112 ETHICAL HACKING Question Papers

PTU Punjab Technical University B-Tech May 2019 Question Papers 6th Semester Computer Science Engineering (CSE)

This post was last modified on 04 November 2019

PTU B.Tech 6th Semester Last 10 Years 2009-2019 Previous Question Papers|| Punjab Technical University


Firstranker's choice

FirstRanker.com

Roll No.

--- Content provided by‌ FirstRanker.com ---

Total No. of Pages : 02

Total No. of Questions: 18

B.Tech.(CSE) (2011 Onwards E-I) (Sem.-6)

ETHICAL HACKING

Subject Code : BTCS-903

--- Content provided by‌ FirstRanker.com ---

M.Code: 71112

Time: 3 Hrs. Max. Marks : 60

INSTRUCTIONS TO CANDIDATES :

  1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks each.
  2. SECTION-B contains FIVE questions carrying FIVE marks each and students have to attempt any FOUR questions.
  3. --- Content provided by⁠ FirstRanker.com ---

  4. SECTION-C contains THREE questions carrying TEN marks each and students have to attempt any TWO questions.

SECTION-A

  1. What are message digest functions?
  2. Explain MD5.
  3. Explain the two types of sniffing.
  4. --- Content provided by‍ FirstRanker.com ---

  5. Explain the difference between Active and Passive Sniffing.
  6. What are keystroke loggers?
  7. What is ping sweep?
  8. What is ICMP scanning? How is it carried out?
  9. What is WEP protocol?
  10. --- Content provided by​ FirstRanker.com ---

  11. What is the use of PKI?
  12. What is the difference between HTTP and HTTPS?

SECTION-B

  1. What are different types of sniffing attacks? Explain each in brief.
  2. Describe how a man-in-the-middle attack may be performed on a Wi-Fi network and the consequences of such an attack.
  3. --- Content provided by⁠ FirstRanker.com ---

  4. An ideal password authentication scheme has to withstand a number of attacks. Describe five of these attacks.
  5. Explain briefly the concepts: one-way function, one-way hash function, trapdoor one-way function.
  6. While preparing to hack a targeted network, you would like to check the configuration of the DNS server. What port should you look for to attempt a zone transfer?

SECTION-C

  1. What are the different types of attack on a system? Explain each in detail. Why is ethical hacking necessary? Explain the scope and limitation of ethical hacking. What are the skills that an ethical hacker should possess?
  2. --- Content provided by‍ FirstRanker.com ---

  3. What is vulnerability research? What is penetration testing? Explain. Why is it required? Explain the penetration testing methodology.
  4. What is ARP spoofing attack? How does ARP spoofing work? What is ARP poisoning? What are the threats due to ARP poisoning? How can we defend against ARP poisoning?

NOTE : Disclosure of identity by writing mobile number or making passing request on any page of Answer sheet will lead to UMC case against the Student.


--- Content provided by​ FirstRanker.com ---

This download link is referred from the post: PTU B.Tech 6th Semester Last 10 Years 2009-2019 Previous Question Papers|| Punjab Technical University