FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R17 2019 December 845AF Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R17 2019 December 845AF Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023




R17

--- Content provided by FirstRanker.com ---

Code No: 845AF




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, December - 2019

--- Content provided by FirstRanker.com ---

ETHICAL HACKING

Time: 3hrs


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


Max.Marks:75

S Note: This question paper contains two parts A and B.

--- Content provided by FirstRanker.com ---

Part A is compulsory which carries 25 marks. Answer all questions in Part A. Part B
consists of 5 Units. Answer any one full question from each unit. Each question carries
10 marks and may have a, b, c as sub questions.


--- Content provided by FirstRanker.com ---


PART - A



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


5 ? 5 Marks = 25

1.a) Explain the fundamental drivers for hackers.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




[5]

--- Content provided by FirstRanker.com ---

b) Explain the need of a security policy.




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[5]

c) Explain internet reconnaissance.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---




[5]

--- Content provided by FirstRanker.com ---

d) Explain UDP and TCP scanning.




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





[5]

--- Content provided by FirstRanker.com ---


e) What are aligning findings?



--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[5]

PART - B


--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

5 ? 10 Marks = 50

2.

Explain the Defense-in-Depth within Security Architecture.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[10]

OR

3.

--- Content provided by FirstRanker.com ---


Describe the component parts of information security programs.



--- Content provided by FirstRanker.com ---

[10]



4.a)

--- Content provided by FirstRanker.com ---


Explain the security policy structure.

b)

--- Content provided by FirstRanker.com ---

Explain the various security threats and challenges faced by companies/Businesses.



[5+5]

--- Content provided by FirstRanker.com ---


OR

5.a)

--- Content provided by FirstRanker.com ---

Explain the various imposed limitations imposed on a security consultant.

b)

Explain the Pros and Cons of Multi-Phased Attacks (parallel).

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[5+5]


6.a)

--- Content provided by FirstRanker.com ---

Explain the attributes to building an attacking system.

b)

Explain the managing the engagement with respect to ethical hacking.

--- Content provided by FirstRanker.com ---




[5+5]

--- Content provided by FirstRanker.com ---

OR

7.

Give a short note on a) Social Engineering

--- Content provided by FirstRanker.com ---


b) Physical security.

[5+5]

--- Content provided by FirstRanker.com ---


8.a)

Explain the different enumeration techniques.

--- Content provided by FirstRanker.com ---

b)

Describe how enumeration is used to perform vulnerability analysis.


--- Content provided by FirstRanker.com ---


[5+5]

OR

--- Content provided by FirstRanker.com ---

9.

Explain the following with respect to exploitation


--- Content provided by FirstRanker.com ---


a) Threads and Groups



--- Content provided by FirstRanker.com ---

b) Password Crackers.




--- Content provided by FirstRanker.com ---


[5+5]


10.a) Explain the overall structure of a deliverable in ethical hacking.

--- Content provided by FirstRanker.com ---


b) How are the deliverables that provides information detailing the security issues are

presented to the company?

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[5+5]

OR

--- Content provided by FirstRanker.com ---


11.a) What is CERT? Explain the CERT Services.
b) Explain how incident management is done in ethical hacking?


--- Content provided by FirstRanker.com ---




[5+5]

--- Content provided by FirstRanker.com ---



---ooOoo---