FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download PTU B.Tech 2020 March CSE-IT 6th Sem BTCS 903 Ethical Hacking Question Paper

Download PTU (I.K. Gujral Punjab Technical University Jalandhar (IKGPTU) ) BE/BTech CSE/IT (Computer Science And Engineering/ Information Technology) 2020 March 6th Sem BTCS 903 Ethical Hacking Previous Question Paper

This post was last modified on 21 March 2020

PTU B.Tech Question Papers 2020 March (All Branches)


FirstRanker.com

Roll No. [T | Total No. of Pages : 02

Total No. of Questions : 18

--- Content provided by FirstRanker.com ---

B.Tech.(CSE) (2012 to 2017 E-l) (Sem.-6)

ETHICAL HACKING

Subject Code : BTCS-903

M.Code : 71112

Time : 3 Hrs. Max. Marks : 60

--- Content provided by⁠ FirstRanker.com ---

INSTRUCTIONS TO CANDIDATES :

  1. SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks each.
  2. SECTION-B contains FIVE questions carrying FIVE marks each and students have to attempt any FOUR questions.
  3. SECTION-C contains THREE questions carrying TEN marks each and students have to attempt any TWO questions.

SECTION-A

--- Content provided by FirstRanker.com ---

Answer briefly :

  1. What is vulnerabilities?
  2. Define DNS.
  3. What is fingerprinting?
  4. What is role of 802.11?
  5. --- Content provided by​ FirstRanker.com ---

  6. Write a short note on eavesdropping.
  7. Discuss sniffing attack.
  8. Write about ARP spoofing.
  9. What is text clipping?
  10. Discuss WEP keys.
  11. --- Content provided by‍ FirstRanker.com ---

  12. Write a short note on Hash Algorithm.

SECTION-B

  1. Discuss the essential terminology and elements of Security.
  2. What are the tools used for the reconnaissance phase.
  3. Define Scanning. Write the phases of scanning.
  4. --- Content provided by FirstRanker.com ---

  5. Identify the TCP and UDP services running on the target network.
  6. Give the overview of Wireless DOS attacks.

SECTION-C

  1. Explain the information gathering methodology of the Hackers.
  2. How active and passive reconnaissance is used in foot printing technique for gathering information about computer system?
  3. --- Content provided by‌ FirstRanker.com ---

  4. Define the functioning of following :
    1. RSA
    2. Hash Algorithm

NOTE : Disclosure of identity by writing mobile number or making passing request on any page of Answer sheet will lead to UMC case against the Student.


--- Content provided by‌ FirstRanker.com ---


This download link is referred from the post: PTU B.Tech Question Papers 2020 March (All Branches)