Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R17 2021 July-August 845AF Ethical Hacking Previous Question Paper
R17
Code No: 845AF
2021
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MCA V Semester Examinations, July/August - 2021
ETHICAL HACKING
Time: 3 Hours
Max. Marks: 75
Answer any five questions
All questions carry equal marks
- - -
1.a)
Explain enumeration and vulnerability analysis with respect to network security attack.
b)
Explain the features of application security.
[8+7]
2.
In detail, explain the components parts of information security programs.
[15]
3.a)
For the overall success of a business, what are the security characteristics to be included
in the business? Explain.
b)
"The supporting material behind a policy statement consists of standards, guidelines,
and procedures that outline specific processes to enforce the policy". With reference to
security policy explain standards, policy statement, guidelines and procedure.
[7+8]
4.a)
Explain the inherent and imposed limitations in ethical hacking.
b)
Explain the criticality matrix for team communications.
[8+7]
5.a)
What is an attacking system? Explain the attributes to building an attacking system.
b)
Explain the architecture of an attacking network.
[7+8]
6.
Explain:
a) Internet Reconnaissance
b) War driving and War chalking.
[7+8]
7.a)
Explain the ways for a hacker, or tester, to be detected attacking an organization.
b)
Explain how threads and groups are used in attacks.
[7+8]
8.
In the format of the deliverable, explain the following:
a) Executive summary
b) Present findings.
[7+8]
---oo0oo---
This post was last modified on 17 March 2023