Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
22 views1 page

Technology Mca Master of Computer Applications Semester 3 2022 December Elective 3 Ethical Hacking Rev 2019 C Scheme

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 1

A

2
0E
4

34
0

49
8A
Paper / Subject Code: 70726 / Elective III : Ethical Hacking

6D

FC

AF
E0
0B
F9

A4

34
C0

49
6D
38

B8

AF
E0
4F
9E

F9

C0

49
A
6D
4F

B8

E0
3

4F
E
56

F9

D0

C0
9

A
AC

8
Time: 3 Hours Max. Marks: 80

E3
4

96

4F
0B
6
29

C0
9
Note:

8A
6D
AC

8
34

E3
4

4F
0B
1. Question 1 is compulsory. All questions in Q1 must be solved.

56

F9
AF

29

A
6D
AC

4F

8
2. Solve any three from Q2 to Q6.

B8
49

E3
3

56

F9
AF

29
3. Draw diagrams wherever necessary.

E0

D0
F9
AC

8
34
C0

49

E3
4. All questions carry equal marks.

96
56
AF

29
E0

D0
4F

F
9
C

38
4
C0

49
8A

96
9A
3

9E
56
AF
E0
4F

8F
0B

42

AC

4F
C0

9
8A

E3
Q1. Solve all four questions (20)

F3
6D

56
29
0
4F

9
0B

A
A What is malware? Explain in brief concept of Virus. 5

E
F9

AC

F
4
0

49
A

4
F3
D
B Write a short note on whaling and spear phishing. 5

C
8

6
B8

29
E0
E3

4F

C5

F9
9A
C Explain the need for repeated penetration testing. 5
F9

4
D0

0
F9

64
9A
F3
D Define session hijacking. Describe the three steps.

FC

04
5
8

B8
3
64

96

C5
A

42
0E
E

4
D0
5

F
F9

49
A

9A
F3
AC

FC
38

Solve any Three from Q2 to Q6

B8

E0
64

96

42
E

Q2.

A4
29

0
5

8F

C0
9

49
(20)

F3
D
AC

F
34

B8

E0
E3
4

96

9A
56
AF

4
A Explain the different types of hackers. Explain in detail the different types of attacks 10
29

D0
8F

0
9

8A
AC

FC
F

04
34

carried out by hackers?


49

E3
4

96

0B

0E
6
AF

A4
29
E0

B What are the different types of threats due to foot printing? Explain in brief. 10
C5

F
F9

6D

FC
8
4

B8
C0

49

3
4
9A
F3

E
6

A4
E0

0
Q3.
4F

C5

8F
9
9A

42

6D
(20)
F

B8
C0
8A

E3
64
9A
F3
04

F9

D0
4F

A What are different types of Trojans? Explain each in brief.


5

10
F9
0B

42
0E

AC

38
49
8A

B What is network scanning? Explain different Types of Scanning and objectives of


64

10

96
3
6D

FC

9E
F

9
E0

8F
network scanning.
0B

9A

42
F9

AC
A4

4F
C0

E3
3
6D

04
38

56
B8

AF

29
4F

F9
Q4.
0E
E

F9

AC

(20)
34
D0
F9

49
8A

64
FC
38

AF

29
E0
64

96

C5
0B

A What information can be enumerated by intruders? Explain the different enumeration 10


E

34
C5

8F

C0
F9

49
A

9A
6D

techniques
8

AF
E0
E3
64
9A

4F
0B

42

B What are the different types of password attacks? Explain techniques to crack
F9

10
C5

C0
F9

49
A

F3
6D
8

passwords.
8

0
E3
64
9A

4F
0B

9A
E
F9
C5

C0
F9

A
42

04
8

Q5.
B8
E3
64

96
9A

4F
F3

(20)
0E
D0
C5

F
F9

A
9A

42

FC
38

A Explain the need for cloud computing? What are the different types of cloud computing. 10
B8
64

6
9A
F3
04

9E

F9

A4

B What are the applications of steganography? Explain types of steganography. 10


D0
C5
9A

42

4F

38

B8
96
9A
F3
04

9E
56

Q6.
D0
8F
9A

42
0E

(20)
AC

E3
64

96
F3
FC

29
E0

A Explain SQl injection. What are its countermeasures? 10


5

8F
9
9A

AC
A4

F
34
C0

B Explain in detail DoS and DDoS attack.


E3

10
4
4

6
B8

AF

29
E0
4F

C5

F9
34
C0

49
8A

64
9A
AF
E0
4F

C5
0B

______________________
2
34
C0

49
8A

9A
6D

AF
E0
4F
0B

42
F9

C0

49
8A

F3
6D
38

E0
4F
0B

9A
F9

C0
8A
6D

04
38

4F
0B

0E
9E

F9

8A
6D

FC
4F

16867 Page 1 of 1
E3

0B
56

F9

A4
F9

6D
AC

B8
E3
64

F9

D0
C5

F9

9AC564F9E38F96D0B8A4FC0E049AF342
E3
64

96
9A

You might also like