FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R17 2019 February 845AF Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R17 2019 February 845AF Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---






--- Content provided by‌ FirstRanker.com ---





JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by⁠ FirstRanker.com ---


MCA V Semester Examinations, February - 2021

ETHICAL HACKING

--- Content provided by⁠ FirstRanker.com ---

Time: 2 hours




--- Content provided by‍ FirstRanker.com ---






--- Content provided by⁠ FirstRanker.com ---





Max.Marks:75

--- Content provided by⁠ FirstRanker.com ---




Answer any five questions

--- Content provided by⁠ FirstRanker.com ---



All questions carry equal marks

- - -

--- Content provided by​ FirstRanker.com ---




1.

--- Content provided by‌ FirstRanker.com ---

In detail, explain network security and service security.




--- Content provided by‌ FirstRanker.com ---




[15]

--- Content provided by FirstRanker.com ---


2.

Discuss the Process of Risk Management within a Program.

--- Content provided by​ FirstRanker.com ---





[15]

--- Content provided by‍ FirstRanker.com ---




3.a)

--- Content provided by‌ FirstRanker.com ---

Explain about the Engagement planner.

b)

Explain about the business challenges.

--- Content provided by⁠ FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---






--- Content provided by​ FirstRanker.com ---


[7+8]


4.a)

--- Content provided by​ FirstRanker.com ---


Explain the various inherent limitations imposed on a security consultant.

b)

--- Content provided by‌ FirstRanker.com ---

Explain about the Multi-Phased Attacks (serial).




--- Content provided by‌ FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[8+7]


5.

--- Content provided by‍ FirstRanker.com ---

Explain the different steps of Technical preparation to perform a hack.



[15]

--- Content provided by FirstRanker.com ---



6.a)

What is social engineering? Describe how social engineering is used for hacking?

--- Content provided by​ FirstRanker.com ---


b)

Explain the following types of network scans: Active, Passive and Interactive.

--- Content provided by‌ FirstRanker.com ---

[8+7]


7.

--- Content provided by​ FirstRanker.com ---

Explain the various enumeration techniques.




--- Content provided by FirstRanker.com ---






--- Content provided by‍ FirstRanker.com ---

[15]


8.

--- Content provided by⁠ FirstRanker.com ---

Describe in detail the overall structure of the deliverable.




--- Content provided by FirstRanker.com ---


[15]



--- Content provided by​ FirstRanker.com ---



---oo0oo---


--- Content provided by‌ FirstRanker.com ---