R17
--- Content provided by FirstRanker.com ---
Code No: 845AF--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MCA V Semester Examinations, December - 2019
--- Content provided by FirstRanker.com ---
ETHICAL HACKINGTime: 3hrs
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
Max.Marks:75
S Note: This question paper contains two parts A and B.
--- Content provided by FirstRanker.com ---
Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part Bconsists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.
--- Content provided by FirstRanker.com ---
PART - A
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
5 ? 5 Marks = 25
1.a) Explain the fundamental drivers for hackers.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
--- Content provided by FirstRanker.com ---
b) Explain the need of a security policy.--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
c) Explain internet reconnaissance.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
--- Content provided by FirstRanker.com ---
d) Explain UDP and TCP scanning.--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]
--- Content provided by FirstRanker.com ---
e) What are aligning findings?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5]PART - B
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
5 ? 10 Marks = 502.
Explain the Defense-in-Depth within Security Architecture.
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[10]OR
3.
--- Content provided by FirstRanker.com ---
Describe the component parts of information security programs.
--- Content provided by FirstRanker.com ---
[10]4.a)
--- Content provided by FirstRanker.com ---
Explain the security policy structure.
b)
--- Content provided by FirstRanker.com ---
Explain the various security threats and challenges faced by companies/Businesses.[5+5]
--- Content provided by FirstRanker.com ---
OR
5.a)
--- Content provided by FirstRanker.com ---
Explain the various imposed limitations imposed on a security consultant.b)
Explain the Pros and Cons of Multi-Phased Attacks (parallel).
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]6.a)
--- Content provided by FirstRanker.com ---
Explain the attributes to building an attacking system.b)
Explain the managing the engagement with respect to ethical hacking.
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
OR7.
Give a short note on a) Social Engineering
--- Content provided by FirstRanker.com ---
b) Physical security.
[5+5]
--- Content provided by FirstRanker.com ---
8.a)
Explain the different enumeration techniques.
--- Content provided by FirstRanker.com ---
b)Describe how enumeration is used to perform vulnerability analysis.
--- Content provided by FirstRanker.com ---
[5+5]
OR
--- Content provided by FirstRanker.com ---
9.Explain the following with respect to exploitation
--- Content provided by FirstRanker.com ---
a) Threads and Groups
--- Content provided by FirstRanker.com ---
b) Password Crackers.--- Content provided by FirstRanker.com ---
[5+5]
10.a) Explain the overall structure of a deliverable in ethical hacking.
--- Content provided by FirstRanker.com ---
b) How are the deliverables that provides information detailing the security issues are
presented to the company?
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
[5+5]
OR
--- Content provided by FirstRanker.com ---
11.a) What is CERT? Explain the CERT Services.
b) Explain how incident management is done in ethical hacking?
--- Content provided by FirstRanker.com ---
[5+5]
--- Content provided by FirstRanker.com ---
---ooOoo---