Firstranker's choice
Roll No.
--- Content provided by FirstRanker.com ---
Total No. of Pages : 02
Total No. of Questions: 18
B.Tech.(CSE) (2011 Onwards E-I) (Sem.-6)
ETHICAL HACKING
Subject Code : BTCS-903
--- Content provided by FirstRanker.com ---
M.Code: 71112
Time: 3 Hrs. Max. Marks : 60
INSTRUCTIONS TO CANDIDATES :
- SECTION-A is COMPULSORY consisting of TEN questions carrying TWO marks each.
- SECTION-B contains FIVE questions carrying FIVE marks each and students have to attempt any FOUR questions.
- SECTION-C contains THREE questions carrying TEN marks each and students have to attempt any TWO questions.
--- Content provided by FirstRanker.com ---
SECTION-A
- What are message digest functions?
- Explain MD5.
- Explain the two types of sniffing.
- Explain the difference between Active and Passive Sniffing.
- What are keystroke loggers?
- What is ping sweep?
- What is ICMP scanning? How is it carried out?
- What is WEP protocol?
- What is the use of PKI?
- What is the difference between HTTP and HTTPS?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
SECTION-B
- What are different types of sniffing attacks? Explain each in brief.
- Describe how a man-in-the-middle attack may be performed on a Wi-Fi network and the consequences of such an attack.
- An ideal password authentication scheme has to withstand a number of attacks. Describe five of these attacks.
- Explain briefly the concepts: one-way function, one-way hash function, trapdoor one-way function.
- While preparing to hack a targeted network, you would like to check the configuration of the DNS server. What port should you look for to attempt a zone transfer?
--- Content provided by FirstRanker.com ---
SECTION-C
- What are the different types of attack on a system? Explain each in detail. Why is ethical hacking necessary? Explain the scope and limitation of ethical hacking. What are the skills that an ethical hacker should possess?
- What is vulnerability research? What is penetration testing? Explain. Why is it required? Explain the penetration testing methodology.
- What is ARP spoofing attack? How does ARP spoofing work? What is ARP poisoning? What are the threats due to ARP poisoning? How can we defend against ARP poisoning?
--- Content provided by FirstRanker.com ---
NOTE : Disclosure of identity by writing mobile number or making passing request on any page of Answer sheet will lead to UMC case against the Student.
--- Content provided by FirstRanker.com ---
This download link is referred from the post: PTU B.Tech 6th Semester Last 10 Years 2009-2019 Previous Question Papers|| Punjab Technical University