FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R15 2019 April-May 825AE Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2019 April-May 825AE Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023




R15

--- Content provided by FirstRanker.com ---

Code No: 825AE

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, April/May - 2019

--- Content provided by FirstRanker.com ---


ETHICAL HACKING

Time: 3 Hours

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



Max. Marks: 75


--- Content provided by FirstRanker.com ---

Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.

--- Content provided by FirstRanker.com ---




PART - A

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




5 ? 5 marks = 25

--- Content provided by FirstRanker.com ---

1.a)

Give a brief note on Social-Engineering Counter measures.


--- Content provided by FirstRanker.com ---


[5]

b)

--- Content provided by FirstRanker.com ---

List and explain the Steps Involved in Performing Enumeration.




--- Content provided by FirstRanker.com ---


[5]

c)

--- Content provided by FirstRanker.com ---

Write the Steps in Performing Session Hijacking.




--- Content provided by FirstRanker.com ---




[5]

--- Content provided by FirstRanker.com ---

d)

How does a Password Cracker Work? Discuss.


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[5]

e)

What type of file is used to create a Linux live CD?

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[5]


--- Content provided by FirstRanker.com ---


PART - B

5 ? 10 marks = 50

--- Content provided by FirstRanker.com ---

2.a)

List and explain the types of Hacker Classes.

b)

--- Content provided by FirstRanker.com ---


What is Vulnerability Research? Explain.



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[5+5]

OR

--- Content provided by FirstRanker.com ---

3.a)

With the help of neat diagram, explain the Phases of hacking.


--- Content provided by FirstRanker.com ---


b)

How Trace route is used in Foot printing? Explain.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[5+5]



--- Content provided by FirstRanker.com ---





4.

--- Content provided by FirstRanker.com ---


Discuss the various TCP Communication Flag Types.



--- Content provided by FirstRanker.com ---





[10]

--- Content provided by FirstRanker.com ---


OR

5.a)

--- Content provided by FirstRanker.com ---

Explain the different Types of Passwords Passive Online Attacks.

b)

Give a brief note on Steganography Technologies.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[5+5]


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



6.a)

List and explain the Types of Session Hijacking.

--- Content provided by FirstRanker.com ---


b)

Compare and contest the Virus and a Worm.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




[5+5]

--- Content provided by FirstRanker.com ---

OR

7.a)

Discuss the Prevention of Session Hijacking.

--- Content provided by FirstRanker.com ---




b)

--- Content provided by FirstRanker.com ---

Explain the types of DoS Attacks.




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[5+5]

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





8.

--- Content provided by FirstRanker.com ---


With the help of neat diagram, explain the stages of a web application attack.

[10]

--- Content provided by FirstRanker.com ---

OR

9.a)

Discuss the Stack-Based Buffer Overflows.

--- Content provided by FirstRanker.com ---


b)

Illustrate the Web Application Threats.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[5+5]




--- Content provided by FirstRanker.com ---




10.a) Why is it important to use a known good distribution of Linux?

--- Content provided by FirstRanker.com ---



b) Give a brief note on Linux Hardening Methods.


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[5+5]

OR

--- Content provided by FirstRanker.com ---


11.

What GCC command is used to compile a C++ file called source into an executable file
called game? Explain in detail.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




[10]

--- Content provided by FirstRanker.com ---




---ooOoo---

--- Content provided by FirstRanker.com ---