FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R09 2017 August F3504 Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R09 2017 August F3504 Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023

--- Content provided by‍ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---





JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by‍ FirstRanker.com ---


MCA V Semester Examinations, August - 2017

ETHICAL HACKING

--- Content provided by FirstRanker.com ---

Time: 3hrs




--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---





Max.Marks:60

--- Content provided by‍ FirstRanker.com ---


Answer any five questions

All questions carry equal marks

--- Content provided by FirstRanker.com ---

- - -


1.a)

--- Content provided by‌ FirstRanker.com ---

What are the online scams? Explain them.

b)

Discuss about creating a security evaluation plan.

--- Content provided by FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---

[6+6]


2.

--- Content provided by‍ FirstRanker.com ---

Discuss the following:



a) Types of DNS records

--- Content provided by‍ FirstRanker.com ---




b) URL obfuscation.

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---



[6+6]


--- Content provided by⁠ FirstRanker.com ---

3.a)

Explain about Nmap command switches.

b)

--- Content provided by‍ FirstRanker.com ---


Give an overview of war-dialing technique.



--- Content provided by⁠ FirstRanker.com ---





[6+6]

--- Content provided by⁠ FirstRanker.com ---



4.a)

Discuss about Null sessions and SNMP enumerations.

--- Content provided by⁠ FirstRanker.com ---


b)

Explain the Trojan-Evading techniques.

--- Content provided by​ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---




[6+6]

--- Content provided by​ FirstRanker.com ---


5.a)

Discuss about active and passive sniffing.

--- Content provided by FirstRanker.com ---

b)

State and explain various sniffing counter measures.


--- Content provided by​ FirstRanker.com ---




[6+6]

--- Content provided by‍ FirstRanker.com ---


6.

What are the types of DoS attacks? Discuss about DDoS attacks.

--- Content provided by‍ FirstRanker.com ---

[12]


7.a)

--- Content provided by​ FirstRanker.com ---

State and explain the various attacks against web servers.

b)

Write brief notes on SQL injection.

--- Content provided by‍ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---





[6+6]

--- Content provided by​ FirstRanker.com ---



8.

Write short notes on the following:

--- Content provided by⁠ FirstRanker.com ---




a) Prevention of session hijacking

--- Content provided by‌ FirstRanker.com ---



b) Patch Management techniques


--- Content provided by FirstRanker.com ---


c) Penetration testing methodologies.



--- Content provided by‍ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---


[12]



--- Content provided by FirstRanker.com ---


--ooOoo--