R15
--- Content provided by FirstRanker.com ---
Code No: 825AEJAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MCA V Semester Examinations, December - 2019
--- Content provided by FirstRanker.com ---
ETHICAL HACKING
Time: 3 Hours
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Max. Marks: 75
--- Content provided by FirstRanker.com ---
Note: This question paper contains two parts A and B.
S Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
--- Content provided by FirstRanker.com ---
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.
PART - A
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
5 ? 5 Marks = 25
--- Content provided by FirstRanker.com ---
1.a) What are the common types of attacks? Explain.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
b) Describe Ping Sweep techniques.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]c) Explain about ARP Poisoning and MAC Flooding.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]d) Describe Web Server Hardening methods.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
e) List the penetration testing steps.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
--- Content provided by FirstRanker.com ---
PART - B--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
5 ? 10 Marks = 50
--- Content provided by FirstRanker.com ---
2.a)Describe the different phases involved in ethical hacking and the five stages of ethical
Hacking.
--- Content provided by FirstRanker.com ---
b)Explain about the different types of DNS Records.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]OR
3.a)
--- Content provided by FirstRanker.com ---
Define the Term Foot printing. Describe the Information Gathering Methodology and
competitive intelligence.
b)
--- Content provided by FirstRanker.com ---
What is Hacktivism? What is Vulnerability Research? What are different types of
Hacking Technologies?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
4.a)
List TCP communication flag types and explain.
--- Content provided by FirstRanker.com ---
b)
Explain about Password-Cracking techniques.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
OR5.a)
What are different types of passwords? Explain in detail.
--- Content provided by FirstRanker.com ---
b)
What is enumeration? What is meant by null sessions?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
6.a)
--- Content provided by FirstRanker.com ---
What is a "Smurf" attack? What is "SYN" Flooding? Describe the DoS/DDoS
countermeasures.
b)
--- Content provided by FirstRanker.com ---
Differentiate between Virus and Worm.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
OR7.a)
How the Netcat Trojan works? What is meant by "Wrapping"?
--- Content provided by FirstRanker.com ---
b)
How DDoS attacks work? How BOTs/BOTNETs work?
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
8.a)
--- Content provided by FirstRanker.com ---
Explain about Hacking Web servers.b)
What are the steps to conduct SQL injection? Explain.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
OR
--- Content provided by FirstRanker.com ---
9.a)
Discuss in detail about buffer overflows.
--- Content provided by FirstRanker.com ---
b)What is a Password Cracker? How does a Password Cracker Work?
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
10.How to compile a Linux Kernel? Describe GCC compilation commands in detail. [10]
OR
--- Content provided by FirstRanker.com ---
11.
Give an overview of penetration testing methodologies. List the automated penetration
testing tools.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]
---ooOoo---
--- Content provided by FirstRanker.com ---