R17
Code No: 845AF
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MCA V Semester Examinations, February - 2022
--- Content provided by FirstRanker.com ---
ETHICAL HACKING
Time: 3 Hours
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Max.Marks:75
Answer any five questions
--- Content provided by FirstRanker.com ---
All questions carry equal marks
- - -
--- Content provided by FirstRanker.com ---
1.a)
Explain the Passive and Active Reconnaissance.
--- Content provided by FirstRanker.com ---
b)
List and explain the different types of DNS Records.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[7+8]
--- Content provided by FirstRanker.com ---
2.a)
Discuss four methods to eliminate or reduce the level of risk associated with the
vulnerabilities and asset valuation.
--- Content provided by FirstRanker.com ---
b)
List and explain various characteristics of network security.
--- Content provided by FirstRanker.com ---
[7+8]
--- Content provided by FirstRanker.com ---
3.
What is Source Point? Explain any six major areas where the attack is launched. [15]
--- Content provided by FirstRanker.com ---
4.a)
--- Content provided by FirstRanker.com ---
List and explain any four security drivers and security characteristics in BusinessChallenges.
b)
--- Content provided by FirstRanker.com ---
Discuss the policy structure with an example .--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[7+8]5.a)
--- Content provided by FirstRanker.com ---
What is reconnaissance in ethical hacking? Explain.b)
Why do hackers do reconnaissance? Explain with your answer.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[7+8]6.
--- Content provided by FirstRanker.com ---
Explain the terms Social Engineering and Physical Security.
--- Content provided by FirstRanker.com ---
[15]
--- Content provided by FirstRanker.com ---
7.List and explain the different types of security attacks in OS.
--- Content provided by FirstRanker.com ---
[15]
--- Content provided by FirstRanker.com ---
8.
List and explain the steps of incident management in ethical hacking.
--- Content provided by FirstRanker.com ---
[15]
--- Content provided by FirstRanker.com ---
---oo0oo---
--- Content provided by FirstRanker.com ---