FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R09 2017 August F3504 Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R09 2017 August F3504 Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023


R09

Code No: F3504

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by FirstRanker.com ---


MCA V Semester Examinations, August - 2017

ETHICAL HACKING

--- Content provided by FirstRanker.com ---

Time: 3hrs




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





Max.Marks:60

--- Content provided by FirstRanker.com ---


Answer any five questions

All questions carry equal marks

--- Content provided by FirstRanker.com ---

- - -


1.a)

--- Content provided by FirstRanker.com ---

What are the online scams? Explain them.

b)

Discuss about creating a security evaluation plan.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[6+6]


2.

--- Content provided by FirstRanker.com ---

Discuss the following:



a) Types of DNS records

--- Content provided by FirstRanker.com ---




b) URL obfuscation.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[6+6]


--- Content provided by FirstRanker.com ---

3.a)

Explain about Nmap command switches.

b)

--- Content provided by FirstRanker.com ---


Give an overview of war-dialing technique.



--- Content provided by FirstRanker.com ---





[6+6]

--- Content provided by FirstRanker.com ---



4.a)

Discuss about Null sessions and SNMP enumerations.

--- Content provided by FirstRanker.com ---


b)

Explain the Trojan-Evading techniques.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




[6+6]

--- Content provided by FirstRanker.com ---


5.a)

Discuss about active and passive sniffing.

--- Content provided by FirstRanker.com ---

b)

State and explain various sniffing counter measures.


--- Content provided by FirstRanker.com ---




[6+6]

--- Content provided by FirstRanker.com ---


6.

What are the types of DoS attacks? Discuss about DDoS attacks.

--- Content provided by FirstRanker.com ---

[12]


7.a)

--- Content provided by FirstRanker.com ---

State and explain the various attacks against web servers.

b)

Write brief notes on SQL injection.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[6+6]

--- Content provided by FirstRanker.com ---



8.

Write short notes on the following:

--- Content provided by FirstRanker.com ---




a) Prevention of session hijacking

--- Content provided by FirstRanker.com ---



b) Patch Management techniques


--- Content provided by FirstRanker.com ---


c) Penetration testing methodologies.



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[12]



--- Content provided by FirstRanker.com ---


--ooOoo--