Download JNTUH MCA 5th Sem R17 2019 December 845AF Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R17 2019 December 845AF Ethical Hacking Previous Question Paper




R17

Code No: 845AF















JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, December - 2019

ETHICAL HACKING

Time: 3hrs













Max.Marks:75

S Note: This question paper contains two parts A and B.

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.



PART - A



















5 ? 5 Marks = 25

1.a) Explain the fundamental drivers for hackers.









[5]

b) Explain the need of a security policy.











[5]

c) Explain internet reconnaissance.













[5]

d) Explain UDP and TCP scanning.













[5]

e) What are aligning findings?













[5]

PART - B

















5 ? 10 Marks = 50

2.

Explain the Defense-in-Depth within Security Architecture.





[10]

OR

3.

Describe the component parts of information security programs.



[10]



4.a)

Explain the security policy structure.

b)

Explain the various security threats and challenges faced by companies/Businesses.



[5+5]

OR

5.a)

Explain the various imposed limitations imposed on a security consultant.

b)

Explain the Pros and Cons of Multi-Phased Attacks (parallel).





[5+5]


6.a)

Explain the attributes to building an attacking system.

b)

Explain the managing the engagement with respect to ethical hacking.



[5+5]

OR

7.

Give a short note on a) Social Engineering

b) Physical security.

[5+5]


8.a)

Explain the different enumeration techniques.

b)

Describe how enumeration is used to perform vulnerability analysis.



[5+5]

OR

9.

Explain the following with respect to exploitation



a) Threads and Groups



b) Password Crackers.





[5+5]


10.a) Explain the overall structure of a deliverable in ethical hacking.

b) How are the deliverables that provides information detailing the security issues are

presented to the company?













[5+5]

OR

11.a) What is CERT? Explain the CERT Services.
b) Explain how incident management is done in ethical hacking?





[5+5]



---ooOoo---

This post was last modified on 17 March 2023