FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R17 2019 December 845AF Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R17 2019 December 845AF Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023

--- Content provided by FirstRanker.com ---

Code No: 845AF




--- Content provided by FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---


JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, December - 2019

--- Content provided by‍ FirstRanker.com ---

ETHICAL HACKING

Time: 3hrs


--- Content provided by​ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---


Max.Marks:75

S Note: This question paper contains two parts A and B.

--- Content provided by FirstRanker.com ---

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.


--- Content provided by‍ FirstRanker.com ---


PART - A



--- Content provided by‌ FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---


5 ? 5 Marks = 25

1.a) Explain the fundamental drivers for hackers.

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by FirstRanker.com ---




[5]

--- Content provided by⁠ FirstRanker.com ---

b) Explain the need of a security policy.




--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---



[5]

c) Explain internet reconnaissance.

--- Content provided by‌ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---




[5]

--- Content provided by FirstRanker.com ---

d) Explain UDP and TCP scanning.




--- Content provided by‍ FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[5]

--- Content provided by⁠ FirstRanker.com ---


e) What are aligning findings?



--- Content provided by‍ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---

[5]

PART - B


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---

5 ? 10 Marks = 50

2.

Explain the Defense-in-Depth within Security Architecture.

--- Content provided by​ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---

[10]

OR

3.

--- Content provided by​ FirstRanker.com ---


Describe the component parts of information security programs.



--- Content provided by‍ FirstRanker.com ---

[10]



4.a)

--- Content provided by‌ FirstRanker.com ---


Explain the security policy structure.

b)

--- Content provided by⁠ FirstRanker.com ---

Explain the various security threats and challenges faced by companies/Businesses.



[5+5]

--- Content provided by​ FirstRanker.com ---


OR

5.a)

--- Content provided by‌ FirstRanker.com ---

Explain the various imposed limitations imposed on a security consultant.

b)

Explain the Pros and Cons of Multi-Phased Attacks (parallel).

--- Content provided by‌ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---

[5+5]


6.a)

--- Content provided by FirstRanker.com ---

Explain the attributes to building an attacking system.

b)

Explain the managing the engagement with respect to ethical hacking.

--- Content provided by​ FirstRanker.com ---




[5+5]

--- Content provided by​ FirstRanker.com ---

OR

7.

Give a short note on a) Social Engineering

--- Content provided by⁠ FirstRanker.com ---


b) Physical security.

[5+5]

--- Content provided by‌ FirstRanker.com ---


8.a)

Explain the different enumeration techniques.

--- Content provided by⁠ FirstRanker.com ---

b)

Describe how enumeration is used to perform vulnerability analysis.


--- Content provided by⁠ FirstRanker.com ---


[5+5]

OR

--- Content provided by‍ FirstRanker.com ---

9.

Explain the following with respect to exploitation


--- Content provided by​ FirstRanker.com ---


a) Threads and Groups



--- Content provided by‍ FirstRanker.com ---

b) Password Crackers.




--- Content provided by‍ FirstRanker.com ---


[5+5]


10.a) Explain the overall structure of a deliverable in ethical hacking.

--- Content provided by‌ FirstRanker.com ---


b) How are the deliverables that provides information detailing the security issues are

presented to the company?

--- Content provided by FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---



[5+5]

OR

--- Content provided by‌ FirstRanker.com ---


11.a) What is CERT? Explain the CERT Services.
b) Explain how incident management is done in ethical hacking?


--- Content provided by‌ FirstRanker.com ---




[5+5]

--- Content provided by⁠ FirstRanker.com ---



---ooOoo---