FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R17 2022 February 845AF Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R17 2022 February 845AF Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023

--- Content provided by‌ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---



JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, February - 2022

--- Content provided by‌ FirstRanker.com ---


ETHICAL HACKING

Time: 3 Hours

--- Content provided by​ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---



Max.Marks:75

Answer any five questions

--- Content provided by‍ FirstRanker.com ---


All questions carry equal marks

- - -

--- Content provided by FirstRanker.com ---


1.a)

Explain the Passive and Active Reconnaissance.

--- Content provided by‍ FirstRanker.com ---



b)

List and explain the different types of DNS Records.

--- Content provided by‌ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---



[7+8]


--- Content provided by​ FirstRanker.com ---


2.a)

Discuss four methods to eliminate or reduce the level of risk associated with the
vulnerabilities and asset valuation.

--- Content provided by‌ FirstRanker.com ---


b)

List and explain various characteristics of network security.

--- Content provided by‍ FirstRanker.com ---





[7+8]

--- Content provided by FirstRanker.com ---



3.

What is Source Point? Explain any six major areas where the attack is launched. [15]

--- Content provided by FirstRanker.com ---




4.a)

--- Content provided by‍ FirstRanker.com ---

List and explain any four security drivers and security characteristics in Business
Challenges.

b)

--- Content provided by​ FirstRanker.com ---

Discuss the policy structure with an example .




--- Content provided by⁠ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---

[7+8]


5.a)

--- Content provided by‌ FirstRanker.com ---

What is reconnaissance in ethical hacking? Explain.

b)

Why do hackers do reconnaissance? Explain with your answer.

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---

[7+8]



6.

--- Content provided by‌ FirstRanker.com ---


Explain the terms Social Engineering and Physical Security.



--- Content provided by FirstRanker.com ---



[15]


--- Content provided by​ FirstRanker.com ---

7.

List and explain the different types of security attacks in OS.


--- Content provided by‌ FirstRanker.com ---




[15]

--- Content provided by FirstRanker.com ---


8.

List and explain the steps of incident management in ethical hacking.

--- Content provided by FirstRanker.com ---



[15]


--- Content provided by⁠ FirstRanker.com ---



---oo0oo---


--- Content provided by FirstRanker.com ---