FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R15 2020 November 825AE Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2020 November 825AE Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023


S OCT 2020



--- Content provided by FirstRanker.com ---


R15

Code No: 825AE

--- Content provided by FirstRanker.com ---

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, October / November - 2020

ETHICAL HACKING

--- Content provided by FirstRanker.com ---




Time: 2 Hours

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



Max. Marks: 75


--- Content provided by FirstRanker.com ---


Answer any five questions

All questions carry equal marks

--- Content provided by FirstRanker.com ---

----


1.a)

--- Content provided by FirstRanker.com ---

What are the skills required to become are ethical hacker?

b)

List and explain in detail about various types of attacker.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[7+8]


2.

--- Content provided by FirstRanker.com ---

What is password cracking? Discuss the techniques used to perform password cracking.




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[15]

used

--- Content provided by FirstRanker.com ---


3.

Describe the various methods involved in virus detection.

--- Content provided by FirstRanker.com ---





[15]

--- Content provided by FirstRanker.com ---



4.a)

What are the various objectives involved in web application hacking?

--- Content provided by FirstRanker.com ---


b)

Explain in detail about the various countermeasures involved in password cracking.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[7+8]

--- Content provided by FirstRanker.com ---



5.a)

Describe the modules involved in installation of Linux kernel.

--- Content provided by FirstRanker.com ---


b)

Illustrate about the tools used to perform automated penetration testing.

--- Content provided by FirstRanker.com ---



[7+8]


--- Content provided by FirstRanker.com ---

6.

Illustrate about different phases involved in ethical hacking.


--- Content provided by FirstRanker.com ---




[15]

--- Content provided by FirstRanker.com ---



7.

Compare and contrast between passive online attacks and active online attacks. [15]

--- Content provided by FirstRanker.com ---



8.

List and explain the steps followed in performing session hijacking.

--- Content provided by FirstRanker.com ---




[15]

--- Content provided by FirstRanker.com ---





---oo0oo---

--- Content provided by FirstRanker.com ---