S OCT 2020
--- Content provided by FirstRanker.com ---
R15
Code No: 825AE
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABADMCA V Semester Examinations, October / November - 2020
ETHICAL HACKING
--- Content provided by FirstRanker.com ---
Time: 2 Hours
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Max. Marks: 75
--- Content provided by FirstRanker.com ---
Answer any five questions
All questions carry equal marks
--- Content provided by FirstRanker.com ---
----1.a)
--- Content provided by FirstRanker.com ---
What are the skills required to become are ethical hacker?b)
List and explain in detail about various types of attacker.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[7+8]2.
--- Content provided by FirstRanker.com ---
What is password cracking? Discuss the techniques used to perform password cracking.--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[15]
used
--- Content provided by FirstRanker.com ---
3.
Describe the various methods involved in virus detection.
--- Content provided by FirstRanker.com ---
[15]
--- Content provided by FirstRanker.com ---
4.a)
What are the various objectives involved in web application hacking?
--- Content provided by FirstRanker.com ---
b)
Explain in detail about the various countermeasures involved in password cracking.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[7+8]
--- Content provided by FirstRanker.com ---
5.a)
Describe the modules involved in installation of Linux kernel.
--- Content provided by FirstRanker.com ---
b)
Illustrate about the tools used to perform automated penetration testing.
--- Content provided by FirstRanker.com ---
[7+8]
--- Content provided by FirstRanker.com ---
6.Illustrate about different phases involved in ethical hacking.
--- Content provided by FirstRanker.com ---
[15]
--- Content provided by FirstRanker.com ---
7.
Compare and contrast between passive online attacks and active online attacks. [15]
--- Content provided by FirstRanker.com ---
8.
List and explain the steps followed in performing session hijacking.
--- Content provided by FirstRanker.com ---
[15]
--- Content provided by FirstRanker.com ---
---oo0oo---
--- Content provided by FirstRanker.com ---