R15
--- Content provided by FirstRanker.com ---
Code No: 825AEJAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MCA V Semester Examinations, April/May - 2019
--- Content provided by FirstRanker.com ---
ETHICAL HACKING
Time: 3 Hours
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Max. Marks: 75
--- Content provided by FirstRanker.com ---
Note: This question paper contains two parts A and B.Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.
--- Content provided by FirstRanker.com ---
PART - A
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
5 ? 5 marks = 25
--- Content provided by FirstRanker.com ---
1.a)Give a brief note on Social-Engineering Counter measures.
--- Content provided by FirstRanker.com ---
[5]
b)
--- Content provided by FirstRanker.com ---
List and explain the Steps Involved in Performing Enumeration.--- Content provided by FirstRanker.com ---
[5]
c)
--- Content provided by FirstRanker.com ---
Write the Steps in Performing Session Hijacking.--- Content provided by FirstRanker.com ---
[5]
--- Content provided by FirstRanker.com ---
d)How does a Password Cracker Work? Discuss.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]e)
What type of file is used to create a Linux live CD?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
--- Content provided by FirstRanker.com ---
PART - B
5 ? 10 marks = 50
--- Content provided by FirstRanker.com ---
2.a)List and explain the types of Hacker Classes.
b)
--- Content provided by FirstRanker.com ---
What is Vulnerability Research? Explain.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
OR
--- Content provided by FirstRanker.com ---
3.a)With the help of neat diagram, explain the Phases of hacking.
--- Content provided by FirstRanker.com ---
b)
How Trace route is used in Foot printing? Explain.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
4.
--- Content provided by FirstRanker.com ---
Discuss the various TCP Communication Flag Types.
--- Content provided by FirstRanker.com ---
[10]
--- Content provided by FirstRanker.com ---
OR
5.a)
--- Content provided by FirstRanker.com ---
Explain the different Types of Passwords Passive Online Attacks.b)
Give a brief note on Steganography Technologies.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
6.a)
List and explain the Types of Session Hijacking.
--- Content provided by FirstRanker.com ---
b)
Compare and contest the Virus and a Worm.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
OR7.a)
Discuss the Prevention of Session Hijacking.
--- Content provided by FirstRanker.com ---
b)
--- Content provided by FirstRanker.com ---
Explain the types of DoS Attacks.--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
8.
--- Content provided by FirstRanker.com ---
With the help of neat diagram, explain the stages of a web application attack.
[10]
--- Content provided by FirstRanker.com ---
OR9.a)
Discuss the Stack-Based Buffer Overflows.
--- Content provided by FirstRanker.com ---
b)
Illustrate the Web Application Threats.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]--- Content provided by FirstRanker.com ---
10.a) Why is it important to use a known good distribution of Linux?
--- Content provided by FirstRanker.com ---
b) Give a brief note on Linux Hardening Methods.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
OR
--- Content provided by FirstRanker.com ---
11.
What GCC command is used to compile a C++ file called source into an executable file
called game? Explain in detail.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]
--- Content provided by FirstRanker.com ---
---ooOoo---
--- Content provided by FirstRanker.com ---