FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R17 2021 July-August 845AF Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R17 2021 July-August 845AF Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023


R17

Code No: 845AF

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





2021

--- Content provided by FirstRanker.com ---


JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, July/August - 2021

--- Content provided by FirstRanker.com ---

ETHICAL HACKING

Time: 3 Hours


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




Max. Marks: 75

--- Content provided by FirstRanker.com ---

Answer any five questions

All questions carry equal marks

- - -

--- Content provided by FirstRanker.com ---




1.a)

--- Content provided by FirstRanker.com ---

Explain enumeration and vulnerability analysis with respect to network security attack.

b)

Explain the features of application security.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[8+7]

--- Content provided by FirstRanker.com ---




2.

--- Content provided by FirstRanker.com ---

In detail, explain the components parts of information security programs.

[15]


--- Content provided by FirstRanker.com ---


3.a)

For the overall success of a business, what are the security characteristics to be included
in the business? Explain.

--- Content provided by FirstRanker.com ---


b)

"The supporting material behind a policy statement consists of standards, guidelines,
and procedures that outline specific processes to enforce the policy". With reference to

--- Content provided by FirstRanker.com ---

security policy explain standards, policy statement, guidelines and procedure.

[7+8]


--- Content provided by FirstRanker.com ---


4.a)

Explain the inherent and imposed limitations in ethical hacking.

--- Content provided by FirstRanker.com ---

b)

Explain the criticality matrix for team communications.


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[8+7]


5.a)

--- Content provided by FirstRanker.com ---

What is an attacking system? Explain the attributes to building an attacking system.

b)

Explain the architecture of an attacking network.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[7+8]

--- Content provided by FirstRanker.com ---




6.

--- Content provided by FirstRanker.com ---

Explain:
a) Internet Reconnaissance
b) War driving and War chalking.


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[7+8]

--- Content provided by FirstRanker.com ---




7.a)

--- Content provided by FirstRanker.com ---

Explain the ways for a hacker, or tester, to be detected attacking an organization.

b)

Explain how threads and groups are used in attacks.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[7+8]


--- Content provided by FirstRanker.com ---


8.

In the format of the deliverable, explain the following:

--- Content provided by FirstRanker.com ---



a) Executive summary


--- Content provided by FirstRanker.com ---


b) Present findings.



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[7+8]


--- Content provided by FirstRanker.com ---


---oo0oo---


--- Content provided by FirstRanker.com ---