FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R15 2020 November 825AE Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R15 2020 November 825AE Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023

--- Content provided by​ FirstRanker.com ---


R15

Code No: 825AE

--- Content provided by‍ FirstRanker.com ---

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, October / November - 2020

ETHICAL HACKING

--- Content provided by⁠ FirstRanker.com ---




Time: 2 Hours

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---



Max. Marks: 75


--- Content provided by FirstRanker.com ---


Answer any five questions

All questions carry equal marks

--- Content provided by‌ FirstRanker.com ---

----


1.a)

--- Content provided by​ FirstRanker.com ---

What are the skills required to become are ethical hacker?

b)

List and explain in detail about various types of attacker.

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[7+8]


2.

--- Content provided by FirstRanker.com ---

What is password cracking? Discuss the techniques used to perform password cracking.




--- Content provided by‌ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---


[15]

used

--- Content provided by​ FirstRanker.com ---


3.

Describe the various methods involved in virus detection.

--- Content provided by​ FirstRanker.com ---





[15]

--- Content provided by​ FirstRanker.com ---



4.a)

What are the various objectives involved in web application hacking?

--- Content provided by⁠ FirstRanker.com ---


b)

Explain in detail about the various countermeasures involved in password cracking.

--- Content provided by‍ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[7+8]

--- Content provided by​ FirstRanker.com ---



5.a)

Describe the modules involved in installation of Linux kernel.

--- Content provided by⁠ FirstRanker.com ---


b)

Illustrate about the tools used to perform automated penetration testing.

--- Content provided by FirstRanker.com ---



[7+8]


--- Content provided by‌ FirstRanker.com ---

6.

Illustrate about different phases involved in ethical hacking.


--- Content provided by‍ FirstRanker.com ---




[15]

--- Content provided by​ FirstRanker.com ---



7.

Compare and contrast between passive online attacks and active online attacks. [15]

--- Content provided by⁠ FirstRanker.com ---



8.

List and explain the steps followed in performing session hijacking.

--- Content provided by⁠ FirstRanker.com ---




[15]

--- Content provided by FirstRanker.com ---





---oo0oo---

--- Content provided by‍ FirstRanker.com ---