Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2019 December 825AE Ethical Hacking Previous Question Paper
R15
Code No: 825AE
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MCA V Semester Examinations, December - 2019
ETHICAL HACKING
Time: 3 Hours
Max. Marks: 75
Note: This question paper contains two parts A and B.
S Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.
PART - A
5 ? 5 Marks = 25
1.a) What are the common types of attacks? Explain.
[5]
b) Describe Ping Sweep techniques.
[5]
c) Explain about ARP Poisoning and MAC Flooding.
[5]
d) Describe Web Server Hardening methods.
[5]
e) List the penetration testing steps.
[5]
PART - B
5 ? 10 Marks = 50
2.a)
Describe the different phases involved in ethical hacking and the five stages of ethical
Hacking.
b)
Explain about the different types of DNS Records.
[5+5]
OR
3.a)
Define the Term Foot printing. Describe the Information Gathering Methodology and
competitive intelligence.
b)
What is Hacktivism? What is Vulnerability Research? What are different types of
Hacking Technologies?
[5+5]
4.a)
List TCP communication flag types and explain.
b)
Explain about Password-Cracking techniques.
[5+5]
OR
5.a)
What are different types of passwords? Explain in detail.
b)
What is enumeration? What is meant by null sessions?
[5+5]
6.a)
What is a "Smurf" attack? What is "SYN" Flooding? Describe the DoS/DDoS
countermeasures.
b)
Differentiate between Virus and Worm.
[5+5]
OR
7.a)
How the Netcat Trojan works? What is meant by "Wrapping"?
b)
How DDoS attacks work? How BOTs/BOTNETs work?
[5+5]
8.a)
Explain about Hacking Web servers.
b)
What are the steps to conduct SQL injection? Explain.
[5+5]
OR
9.a)
Discuss in detail about buffer overflows.
b)
What is a Password Cracker? How does a Password Cracker Work?
[5+5]
10.
How to compile a Linux Kernel? Describe GCC compilation commands in detail. [10]
OR
11.
Give an overview of penetration testing methodologies. List the automated penetration
testing tools.
[10]
---ooOoo---
This post was last modified on 17 March 2023