Download JNTUH MCA 5th Sem R15 2019 April-May 825AE Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2019 April-May 825AE Ethical Hacking Previous Question Paper




R15

Code No: 825AE

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, April/May - 2019

ETHICAL HACKING

Time: 3 Hours













Max. Marks: 75


Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.



PART - A



















5 ? 5 marks = 25

1.a)

Give a brief note on Social-Engineering Counter measures.



[5]

b)

List and explain the Steps Involved in Performing Enumeration.





[5]

c)

Write the Steps in Performing Session Hijacking.







[5]

d)

How does a Password Cracker Work? Discuss.







[5]

e)

What type of file is used to create a Linux live CD?







[5]



PART - B

5 ? 10 marks = 50

2.a)

List and explain the types of Hacker Classes.

b)

What is Vulnerability Research? Explain.









[5+5]

OR

3.a)

With the help of neat diagram, explain the Phases of hacking.



b)

How Trace route is used in Foot printing? Explain.







[5+5]







4.

Discuss the various TCP Communication Flag Types.







[10]

OR

5.a)

Explain the different Types of Passwords Passive Online Attacks.

b)

Give a brief note on Steganography Technologies.







[5+5]









6.a)

List and explain the Types of Session Hijacking.

b)

Compare and contest the Virus and a Worm.









[5+5]

OR

7.a)

Discuss the Prevention of Session Hijacking.



b)

Explain the types of DoS Attacks.













[5+5]









8.

With the help of neat diagram, explain the stages of a web application attack.

[10]

OR

9.a)

Discuss the Stack-Based Buffer Overflows.

b)

Illustrate the Web Application Threats.











[5+5]







10.a) Why is it important to use a known good distribution of Linux?



b) Give a brief note on Linux Hardening Methods.









[5+5]

OR

11.

What GCC command is used to compile a C++ file called source into an executable file
called game? Explain in detail.













[10]




---ooOoo---



This post was last modified on 17 March 2023