FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R17 2021 July-August 845AF Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R17 2021 July-August 845AF Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---





2021

--- Content provided by​ FirstRanker.com ---


JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, July/August - 2021

--- Content provided by‌ FirstRanker.com ---

ETHICAL HACKING

Time: 3 Hours


--- Content provided by​ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by FirstRanker.com ---




Max. Marks: 75

--- Content provided by FirstRanker.com ---

Answer any five questions

All questions carry equal marks

- - -

--- Content provided by‍ FirstRanker.com ---




1.a)

--- Content provided by⁠ FirstRanker.com ---

Explain enumeration and vulnerability analysis with respect to network security attack.

b)

Explain the features of application security.

--- Content provided by FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---





[8+7]

--- Content provided by FirstRanker.com ---




2.

--- Content provided by‌ FirstRanker.com ---

In detail, explain the components parts of information security programs.

[15]


--- Content provided by‍ FirstRanker.com ---


3.a)

For the overall success of a business, what are the security characteristics to be included
in the business? Explain.

--- Content provided by‍ FirstRanker.com ---


b)

"The supporting material behind a policy statement consists of standards, guidelines,
and procedures that outline specific processes to enforce the policy". With reference to

--- Content provided by‌ FirstRanker.com ---

security policy explain standards, policy statement, guidelines and procedure.

[7+8]


--- Content provided by FirstRanker.com ---


4.a)

Explain the inherent and imposed limitations in ethical hacking.

--- Content provided by‌ FirstRanker.com ---

b)

Explain the criticality matrix for team communications.


--- Content provided by FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---

[8+7]


5.a)

--- Content provided by FirstRanker.com ---

What is an attacking system? Explain the attributes to building an attacking system.

b)

Explain the architecture of an attacking network.

--- Content provided by FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---





[7+8]

--- Content provided by FirstRanker.com ---




6.

--- Content provided by‌ FirstRanker.com ---

Explain:
a) Internet Reconnaissance
b) War driving and War chalking.


--- Content provided by‌ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---





[7+8]

--- Content provided by FirstRanker.com ---




7.a)

--- Content provided by​ FirstRanker.com ---

Explain the ways for a hacker, or tester, to be detected attacking an organization.

b)

Explain how threads and groups are used in attacks.

--- Content provided by FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---



[7+8]


--- Content provided by‌ FirstRanker.com ---


8.

In the format of the deliverable, explain the following:

--- Content provided by‌ FirstRanker.com ---



a) Executive summary


--- Content provided by‌ FirstRanker.com ---


b) Present findings.



--- Content provided by⁠ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---



[7+8]


--- Content provided by FirstRanker.com ---


---oo0oo---


--- Content provided by‍ FirstRanker.com ---