FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R17 2019 February 845AF Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R17 2019 February 845AF Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023


R17

Code No: 845AF

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

--- Content provided by FirstRanker.com ---


MCA V Semester Examinations, February - 2021

ETHICAL HACKING

--- Content provided by FirstRanker.com ---

Time: 2 hours




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---





Max.Marks:75

--- Content provided by FirstRanker.com ---




Answer any five questions

--- Content provided by FirstRanker.com ---



All questions carry equal marks

- - -

--- Content provided by FirstRanker.com ---




1.

--- Content provided by FirstRanker.com ---

In detail, explain network security and service security.




--- Content provided by FirstRanker.com ---




[15]

--- Content provided by FirstRanker.com ---


2.

Discuss the Process of Risk Management within a Program.

--- Content provided by FirstRanker.com ---





[15]

--- Content provided by FirstRanker.com ---




3.a)

--- Content provided by FirstRanker.com ---

Explain about the Engagement planner.

b)

Explain about the business challenges.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---


[7+8]


4.a)

--- Content provided by FirstRanker.com ---


Explain the various inherent limitations imposed on a security consultant.

b)

--- Content provided by FirstRanker.com ---

Explain about the Multi-Phased Attacks (serial).




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[8+7]


5.

--- Content provided by FirstRanker.com ---

Explain the different steps of Technical preparation to perform a hack.



[15]

--- Content provided by FirstRanker.com ---



6.a)

What is social engineering? Describe how social engineering is used for hacking?

--- Content provided by FirstRanker.com ---


b)

Explain the following types of network scans: Active, Passive and Interactive.

--- Content provided by FirstRanker.com ---

[8+7]


7.

--- Content provided by FirstRanker.com ---

Explain the various enumeration techniques.




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[15]


8.

--- Content provided by FirstRanker.com ---

Describe in detail the overall structure of the deliverable.




--- Content provided by FirstRanker.com ---


[15]



--- Content provided by FirstRanker.com ---



---oo0oo---


--- Content provided by FirstRanker.com ---