FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R15 2019 December 825AE Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2019 December 825AE Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023

--- Content provided by⁠ FirstRanker.com ---

Code No: 825AE

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, December - 2019

--- Content provided by‍ FirstRanker.com ---


ETHICAL HACKING

Time: 3 Hours

--- Content provided by​ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---





Max. Marks: 75

--- Content provided by‌ FirstRanker.com ---



Note: This question paper contains two parts A and B.

S Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B

--- Content provided by​ FirstRanker.com ---


consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.

PART - A

--- Content provided by‌ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---





5 ? 5 Marks = 25

--- Content provided by FirstRanker.com ---


1.a) What are the common types of attacks? Explain.



--- Content provided by FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---


[5]

b) Describe Ping Sweep techniques.

--- Content provided by​ FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---

[5]

c) Explain about ARP Poisoning and MAC Flooding.


--- Content provided by FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---

[5]

d) Describe Web Server Hardening methods.


--- Content provided by‌ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---



[5]

e) List the penetration testing steps.

--- Content provided by FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---




[5]

--- Content provided by​ FirstRanker.com ---

PART - B




--- Content provided by‌ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---




5 ? 10 Marks = 50

--- Content provided by​ FirstRanker.com ---

2.a)

Describe the different phases involved in ethical hacking and the five stages of ethical
Hacking.

--- Content provided by FirstRanker.com ---

b)

Explain about the different types of DNS Records.


--- Content provided by‌ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---

[5+5]

OR

3.a)

--- Content provided by FirstRanker.com ---


Define the Term Foot printing. Describe the Information Gathering Methodology and
competitive intelligence.

b)

--- Content provided by FirstRanker.com ---


What is Hacktivism? What is Vulnerability Research? What are different types of
Hacking Technologies?


--- Content provided by‌ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---




[5+5]

--- Content provided by‌ FirstRanker.com ---



4.a)

List TCP communication flag types and explain.

--- Content provided by‌ FirstRanker.com ---


b)

Explain about Password-Cracking techniques.

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by FirstRanker.com ---




[5+5]

--- Content provided by⁠ FirstRanker.com ---

OR

5.a)

What are different types of passwords? Explain in detail.

--- Content provided by‌ FirstRanker.com ---


b)

What is enumeration? What is meant by null sessions?

--- Content provided by‍ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---


[5+5]


6.a)

--- Content provided by‍ FirstRanker.com ---


What is a "Smurf" attack? What is "SYN" Flooding? Describe the DoS/DDoS
countermeasures.

b)

--- Content provided by FirstRanker.com ---


Differentiate between Virus and Worm.



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




[5+5]

--- Content provided by‍ FirstRanker.com ---

OR

7.a)

How the Netcat Trojan works? What is meant by "Wrapping"?

--- Content provided by‌ FirstRanker.com ---


b)

How DDoS attacks work? How BOTs/BOTNETs work?

--- Content provided by​ FirstRanker.com ---





[5+5]

--- Content provided by​ FirstRanker.com ---




8.a)

--- Content provided by‍ FirstRanker.com ---

Explain about Hacking Web servers.

b)

What are the steps to conduct SQL injection? Explain.

--- Content provided by‍ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---



[5+5]

OR

--- Content provided by‌ FirstRanker.com ---


9.a)

Discuss in detail about buffer overflows.

--- Content provided by‍ FirstRanker.com ---

b)

What is a Password Cracker? How does a Password Cracker Work?


--- Content provided by FirstRanker.com ---


[5+5]



--- Content provided by‍ FirstRanker.com ---

10.

How to compile a Linux Kernel? Describe GCC compilation commands in detail. [10]

OR

--- Content provided by​ FirstRanker.com ---


11.

Give an overview of penetration testing methodologies. List the automated penetration
testing tools.

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[10]

---ooOoo---

--- Content provided by⁠ FirstRanker.com ---