R17
Code No: 845AF
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
2021
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MCA V Semester Examinations, July/August - 2021
--- Content provided by FirstRanker.com ---
ETHICAL HACKINGTime: 3 Hours
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Max. Marks: 75
--- Content provided by FirstRanker.com ---
Answer any five questionsAll questions carry equal marks
- - -
--- Content provided by FirstRanker.com ---
1.a)
--- Content provided by FirstRanker.com ---
Explain enumeration and vulnerability analysis with respect to network security attack.b)
Explain the features of application security.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[8+7]
--- Content provided by FirstRanker.com ---
2.
--- Content provided by FirstRanker.com ---
In detail, explain the components parts of information security programs.[15]
--- Content provided by FirstRanker.com ---
3.a)
For the overall success of a business, what are the security characteristics to be included
in the business? Explain.
--- Content provided by FirstRanker.com ---
b)
"The supporting material behind a policy statement consists of standards, guidelines,
and procedures that outline specific processes to enforce the policy". With reference to
--- Content provided by FirstRanker.com ---
security policy explain standards, policy statement, guidelines and procedure.[7+8]
--- Content provided by FirstRanker.com ---
4.a)
Explain the inherent and imposed limitations in ethical hacking.
--- Content provided by FirstRanker.com ---
b)Explain the criticality matrix for team communications.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[8+7]5.a)
--- Content provided by FirstRanker.com ---
What is an attacking system? Explain the attributes to building an attacking system.b)
Explain the architecture of an attacking network.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[7+8]
--- Content provided by FirstRanker.com ---
6.
--- Content provided by FirstRanker.com ---
Explain:a) Internet Reconnaissance
b) War driving and War chalking.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[7+8]
--- Content provided by FirstRanker.com ---
7.a)
--- Content provided by FirstRanker.com ---
Explain the ways for a hacker, or tester, to be detected attacking an organization.b)
Explain how threads and groups are used in attacks.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[7+8]
--- Content provided by FirstRanker.com ---
8.
In the format of the deliverable, explain the following:
--- Content provided by FirstRanker.com ---
a) Executive summary
--- Content provided by FirstRanker.com ---
b) Present findings.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[7+8]
--- Content provided by FirstRanker.com ---
---oo0oo---
--- Content provided by FirstRanker.com ---