FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R15 2019 April-May 825AE Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2019 April-May 825AE Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023

--- Content provided by⁠ FirstRanker.com ---

Code No: 825AE

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, April/May - 2019

--- Content provided by‍ FirstRanker.com ---


ETHICAL HACKING

Time: 3 Hours

--- Content provided by‌ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---



Max. Marks: 75


--- Content provided by‌ FirstRanker.com ---

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.

--- Content provided by FirstRanker.com ---




PART - A

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---






--- Content provided by FirstRanker.com ---




5 ? 5 marks = 25

--- Content provided by⁠ FirstRanker.com ---

1.a)

Give a brief note on Social-Engineering Counter measures.


--- Content provided by⁠ FirstRanker.com ---


[5]

b)

--- Content provided by⁠ FirstRanker.com ---

List and explain the Steps Involved in Performing Enumeration.




--- Content provided by⁠ FirstRanker.com ---


[5]

c)

--- Content provided by‌ FirstRanker.com ---

Write the Steps in Performing Session Hijacking.




--- Content provided by​ FirstRanker.com ---




[5]

--- Content provided by FirstRanker.com ---

d)

How does a Password Cracker Work? Discuss.


--- Content provided by‌ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---

[5]

e)

What type of file is used to create a Linux live CD?

--- Content provided by‌ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---



[5]


--- Content provided by⁠ FirstRanker.com ---


PART - B

5 ? 10 marks = 50

--- Content provided by⁠ FirstRanker.com ---

2.a)

List and explain the types of Hacker Classes.

b)

--- Content provided by⁠ FirstRanker.com ---


What is Vulnerability Research? Explain.



--- Content provided by​ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---


[5+5]

OR

--- Content provided by‍ FirstRanker.com ---

3.a)

With the help of neat diagram, explain the Phases of hacking.


--- Content provided by FirstRanker.com ---


b)

How Trace route is used in Foot printing? Explain.

--- Content provided by​ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---


[5+5]



--- Content provided by FirstRanker.com ---





4.

--- Content provided by‍ FirstRanker.com ---


Discuss the various TCP Communication Flag Types.



--- Content provided by FirstRanker.com ---





[10]

--- Content provided by​ FirstRanker.com ---


OR

5.a)

--- Content provided by‌ FirstRanker.com ---

Explain the different Types of Passwords Passive Online Attacks.

b)

Give a brief note on Steganography Technologies.

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---



[5+5]


--- Content provided by‌ FirstRanker.com ---






--- Content provided by FirstRanker.com ---



6.a)

List and explain the Types of Session Hijacking.

--- Content provided by‌ FirstRanker.com ---


b)

Compare and contest the Virus and a Worm.

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---




[5+5]

--- Content provided by​ FirstRanker.com ---

OR

7.a)

Discuss the Prevention of Session Hijacking.

--- Content provided by FirstRanker.com ---




b)

--- Content provided by‌ FirstRanker.com ---

Explain the types of DoS Attacks.




--- Content provided by​ FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[5+5]

--- Content provided by FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---





8.

--- Content provided by FirstRanker.com ---


With the help of neat diagram, explain the stages of a web application attack.

[10]

--- Content provided by​ FirstRanker.com ---

OR

9.a)

Discuss the Stack-Based Buffer Overflows.

--- Content provided by‍ FirstRanker.com ---


b)

Illustrate the Web Application Threats.

--- Content provided by​ FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[5+5]




--- Content provided by‍ FirstRanker.com ---




10.a) Why is it important to use a known good distribution of Linux?

--- Content provided by⁠ FirstRanker.com ---



b) Give a brief note on Linux Hardening Methods.


--- Content provided by‍ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---



[5+5]

OR

--- Content provided by‍ FirstRanker.com ---


11.

What GCC command is used to compile a C++ file called source into an executable file
called game? Explain in detail.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---




[10]

--- Content provided by‍ FirstRanker.com ---




---ooOoo---

--- Content provided by⁠ FirstRanker.com ---