FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R15 2019 December 825AE Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2019 December 825AE Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023




R15

--- Content provided by FirstRanker.com ---

Code No: 825AE

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, December - 2019

--- Content provided by FirstRanker.com ---


ETHICAL HACKING

Time: 3 Hours

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





Max. Marks: 75

--- Content provided by FirstRanker.com ---



Note: This question paper contains two parts A and B.

S Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B

--- Content provided by FirstRanker.com ---


consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.

PART - A

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





5 ? 5 Marks = 25

--- Content provided by FirstRanker.com ---


1.a) What are the common types of attacks? Explain.



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[5]

b) Describe Ping Sweep techniques.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[5]

c) Explain about ARP Poisoning and MAC Flooding.


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[5]

d) Describe Web Server Hardening methods.


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[5]

e) List the penetration testing steps.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




[5]

--- Content provided by FirstRanker.com ---

PART - B




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




5 ? 10 Marks = 50

--- Content provided by FirstRanker.com ---

2.a)

Describe the different phases involved in ethical hacking and the five stages of ethical
Hacking.

--- Content provided by FirstRanker.com ---

b)

Explain about the different types of DNS Records.


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[5+5]

OR

3.a)

--- Content provided by FirstRanker.com ---


Define the Term Foot printing. Describe the Information Gathering Methodology and
competitive intelligence.

b)

--- Content provided by FirstRanker.com ---


What is Hacktivism? What is Vulnerability Research? What are different types of
Hacking Technologies?


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




[5+5]

--- Content provided by FirstRanker.com ---



4.a)

List TCP communication flag types and explain.

--- Content provided by FirstRanker.com ---


b)

Explain about Password-Cracking techniques.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




[5+5]

--- Content provided by FirstRanker.com ---

OR

5.a)

What are different types of passwords? Explain in detail.

--- Content provided by FirstRanker.com ---


b)

What is enumeration? What is meant by null sessions?

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[5+5]


6.a)

--- Content provided by FirstRanker.com ---


What is a "Smurf" attack? What is "SYN" Flooding? Describe the DoS/DDoS
countermeasures.

b)

--- Content provided by FirstRanker.com ---


Differentiate between Virus and Worm.



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




[5+5]

--- Content provided by FirstRanker.com ---

OR

7.a)

How the Netcat Trojan works? What is meant by "Wrapping"?

--- Content provided by FirstRanker.com ---


b)

How DDoS attacks work? How BOTs/BOTNETs work?

--- Content provided by FirstRanker.com ---





[5+5]

--- Content provided by FirstRanker.com ---




8.a)

--- Content provided by FirstRanker.com ---

Explain about Hacking Web servers.

b)

What are the steps to conduct SQL injection? Explain.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[5+5]

OR

--- Content provided by FirstRanker.com ---


9.a)

Discuss in detail about buffer overflows.

--- Content provided by FirstRanker.com ---

b)

What is a Password Cracker? How does a Password Cracker Work?


--- Content provided by FirstRanker.com ---


[5+5]



--- Content provided by FirstRanker.com ---

10.

How to compile a Linux Kernel? Describe GCC compilation commands in detail. [10]

OR

--- Content provided by FirstRanker.com ---


11.

Give an overview of penetration testing methodologies. List the automated penetration
testing tools.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[10]

---ooOoo---

--- Content provided by FirstRanker.com ---