Download PTU (I.K. Gujral Punjab Technical University Jalandhar (IKGPTU) ) BE/BTech CSE/IT (Computer Science And Engineering/ Information Technology) 2020 March 6th Sem BTCS 903 Ethical Hacking Previous Question Paper
Roll No. Total No. of Pages : 02
Total No. of Questions : 18
B.Tech.(CSE) (2012 to 2017 E-I) (Sem.?6)
ETHICAL HACKING
Subject Code : BTCS-903
M.Code : 71112
Time : 3 Hrs. Max. Marks : 60
INSTRUCTIONS TO CANDIDATES :
1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks
each.
2. SECTION-B contains FIVE questions carrying FIVE marks each and students
have to attempt any FOUR questions.
3. SECTION-C contains THREE questions carrying TEN marks each and students
have to attempt any TWO questions.
SECTION-A
Answer briefly :
1) What is vulnerabilities?
2) Define DNS.
3) What is fingerprinting?
4) What is role of 802.11?
5) Write a short note on eavesdropping.
6) Discuss sniffing attack.
7) Write about ARP spoofing.
8) What is text clipping?
9) Discuss WEP keys.
10) Write a short note on Hash Algorithm.
FirstRanker.com - FirstRanker's Choice
1 | M-71112 (S2)-1963
Roll No. Total No. of Pages : 02
Total No. of Questions : 18
B.Tech.(CSE) (2012 to 2017 E-I) (Sem.?6)
ETHICAL HACKING
Subject Code : BTCS-903
M.Code : 71112
Time : 3 Hrs. Max. Marks : 60
INSTRUCTIONS TO CANDIDATES :
1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks
each.
2. SECTION-B contains FIVE questions carrying FIVE marks each and students
have to attempt any FOUR questions.
3. SECTION-C contains THREE questions carrying TEN marks each and students
have to attempt any TWO questions.
SECTION-A
Answer briefly :
1) What is vulnerabilities?
2) Define DNS.
3) What is fingerprinting?
4) What is role of 802.11?
5) Write a short note on eavesdropping.
6) Discuss sniffing attack.
7) Write about ARP spoofing.
8) What is text clipping?
9) Discuss WEP keys.
10) Write a short note on Hash Algorithm.
2 | M-71112 (S2)-1963
SECTION-B
11) Discuss the essential terminology and elements of Security.
12) What are the tools used for the reconnaissance phase.
13) Define Scanning. Write the phases of scanning.
14) Identify the TCP and UDP services running on the target network.
15) Give the overview of Wireless DOS attacks.
SECTION-C
16) Explain the information gathering methodology of the Hackers.
17) How active and passive reconnaissance is used in foot printing technique for gathering
information about computer system?
18) Define the functioning of following :
a) RSA
b) Hash Algorithm
NOTE : Disclosure of identity by writing mobile number or making passing request on any
page of Answer sheet will lead to UMC case against the Student.
FirstRanker.com - FirstRanker's Choice
This post was last modified on 21 March 2020