R09
Code No: F3504
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
--- Content provided by FirstRanker.com ---
MCA V Semester Examinations, August - 2017
ETHICAL HACKING
--- Content provided by FirstRanker.com ---
Time: 3hrs--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Max.Marks:60
--- Content provided by FirstRanker.com ---
Answer any five questions
All questions carry equal marks
--- Content provided by FirstRanker.com ---
- - -1.a)
--- Content provided by FirstRanker.com ---
What are the online scams? Explain them.b)
Discuss about creating a security evaluation plan.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[6+6]2.
--- Content provided by FirstRanker.com ---
Discuss the following:a) Types of DNS records
--- Content provided by FirstRanker.com ---
b) URL obfuscation.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[6+6]
--- Content provided by FirstRanker.com ---
3.a)Explain about Nmap command switches.
b)
--- Content provided by FirstRanker.com ---
Give an overview of war-dialing technique.
--- Content provided by FirstRanker.com ---
[6+6]
--- Content provided by FirstRanker.com ---
4.a)
Discuss about Null sessions and SNMP enumerations.
--- Content provided by FirstRanker.com ---
b)
Explain the Trojan-Evading techniques.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[6+6]
--- Content provided by FirstRanker.com ---
5.a)
Discuss about active and passive sniffing.
--- Content provided by FirstRanker.com ---
b)State and explain various sniffing counter measures.
--- Content provided by FirstRanker.com ---
[6+6]
--- Content provided by FirstRanker.com ---
6.
What are the types of DoS attacks? Discuss about DDoS attacks.
--- Content provided by FirstRanker.com ---
[12]7.a)
--- Content provided by FirstRanker.com ---
State and explain the various attacks against web servers.b)
Write brief notes on SQL injection.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[6+6]
--- Content provided by FirstRanker.com ---
8.
Write short notes on the following:
--- Content provided by FirstRanker.com ---
a) Prevention of session hijacking
--- Content provided by FirstRanker.com ---
b) Patch Management techniques
--- Content provided by FirstRanker.com ---
c) Penetration testing methodologies.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[12]
--- Content provided by FirstRanker.com ---
--ooOoo--