Download JNTUH MCA 5th Sem R15 2019 December 825AE Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2019 December 825AE Ethical Hacking Previous Question Paper




R15

Code No: 825AE

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, December - 2019

ETHICAL HACKING

Time: 3 Hours















Max. Marks: 75


Note: This question paper contains two parts A and B.

S Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B

consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.

PART - A



















5 ? 5 Marks = 25

1.a) What are the common types of attacks? Explain.









[5]

b) Describe Ping Sweep techniques.











[5]

c) Explain about ARP Poisoning and MAC Flooding.







[5]

d) Describe Web Server Hardening methods.









[5]

e) List the penetration testing steps.













[5]

PART - B

















5 ? 10 Marks = 50

2.a)

Describe the different phases involved in ethical hacking and the five stages of ethical
Hacking.

b)

Explain about the different types of DNS Records.







[5+5]

OR

3.a)

Define the Term Foot printing. Describe the Information Gathering Methodology and
competitive intelligence.

b)

What is Hacktivism? What is Vulnerability Research? What are different types of
Hacking Technologies?















[5+5]



4.a)

List TCP communication flag types and explain.

b)

Explain about Password-Cracking techniques.









[5+5]

OR

5.a)

What are different types of passwords? Explain in detail.

b)

What is enumeration? What is meant by null sessions?







[5+5]


6.a)

What is a "Smurf" attack? What is "SYN" Flooding? Describe the DoS/DDoS
countermeasures.

b)

Differentiate between Virus and Worm.











[5+5]

OR

7.a)

How the Netcat Trojan works? What is meant by "Wrapping"?

b)

How DDoS attacks work? How BOTs/BOTNETs work?





[5+5]



8.a)

Explain about Hacking Web servers.

b)

What are the steps to conduct SQL injection? Explain.







[5+5]

OR

9.a)

Discuss in detail about buffer overflows.

b)

What is a Password Cracker? How does a Password Cracker Work?



[5+5]



10.

How to compile a Linux Kernel? Describe GCC compilation commands in detail. [10]

OR

11.

Give an overview of penetration testing methodologies. List the automated penetration
testing tools.

















[10]

---ooOoo---

This post was last modified on 17 March 2023