FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

📱

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Download JNTUH MCA 5th Sem R19 2022 February 865AE Ethical Hacking Question Paper

Download JNTUH (Jawaharlal nehru technological university) MCA (Master of Computer Applications) 5th Sem (Fifth Semester) Regulation-R19 2022 February 865AE Ethical Hacking Previous Question Paper

This post was last modified on 17 March 2023


R19

Code No: 865AE

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MCA V Semester Examinations, February - 2022

--- Content provided by FirstRanker.com ---


ETHICAL HACKING

Time: 3 Hours

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



Max.Marks:75

Answer any five questions

--- Content provided by FirstRanker.com ---


All questions carry equal marks

- - -

--- Content provided by FirstRanker.com ---


1.a)

Explain the Passive and Active Reconnaissance.

--- Content provided by FirstRanker.com ---



b)

List and explain the different types of DNS Records.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---



[7+8]


--- Content provided by FirstRanker.com ---


2.a)

Discuss four methods to eliminate or reduce the level of risk associated with the
vulnerabilities and asset valuation.

--- Content provided by FirstRanker.com ---


b)

List and explain various characteristics of network security.

--- Content provided by FirstRanker.com ---





[7+8]

--- Content provided by FirstRanker.com ---



3.

What is Source Point? Explain any six major areas where the attack is launched. [15]

--- Content provided by FirstRanker.com ---




4.a)

--- Content provided by FirstRanker.com ---

List and explain any four security drivers and security characteristics in Business
Challenges.

b)

--- Content provided by FirstRanker.com ---

Discuss the policy structure with an example .




--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[7+8]


5.a)

--- Content provided by FirstRanker.com ---

What is reconnaissance in ethical hacking? Explain.

b)

Why do hackers do reconnaissance? Explain with your answer.

--- Content provided by FirstRanker.com ---






--- Content provided by FirstRanker.com ---

[7+8]



6.

--- Content provided by FirstRanker.com ---


Explain the terms Social Engineering and Physical Security.



--- Content provided by FirstRanker.com ---



[15]


--- Content provided by FirstRanker.com ---

7.

List and explain the different types of security attacks in OS.


--- Content provided by FirstRanker.com ---




[15]

--- Content provided by FirstRanker.com ---


8.

List and explain the steps of incident management in ethical hacking.

--- Content provided by FirstRanker.com ---



[15]


--- Content provided by FirstRanker.com ---



---oo0oo---


--- Content provided by FirstRanker.com ---