Technology Mca Master of Computer Applications Semester 3 2022 December Elective 3 Ethical Hacking Rev 2019 C Scheme
Technology Mca Master of Computer Applications Semester 3 2022 December Elective 3 Ethical Hacking Rev 2019 C Scheme
Technology Mca Master of Computer Applications Semester 3 2022 December Elective 3 Ethical Hacking Rev 2019 C Scheme
2
0E
4
34
0
49
8A
Paper / Subject Code: 70726 / Elective III : Ethical Hacking
6D
FC
AF
E0
0B
F9
A4
34
C0
49
6D
38
B8
AF
E0
4F
9E
F9
C0
49
A
6D
4F
B8
E0
3
4F
E
56
F9
D0
C0
9
A
AC
8
Time: 3 Hours Max. Marks: 80
E3
4
96
4F
0B
6
29
C0
9
Note:
8A
6D
AC
8
34
E3
4
4F
0B
1. Question 1 is compulsory. All questions in Q1 must be solved.
56
F9
AF
29
A
6D
AC
4F
8
2. Solve any three from Q2 to Q6.
B8
49
E3
3
56
F9
AF
29
3. Draw diagrams wherever necessary.
E0
D0
F9
AC
8
34
C0
49
E3
4. All questions carry equal marks.
96
56
AF
29
E0
D0
4F
F
9
C
38
4
C0
49
8A
96
9A
3
9E
56
AF
E0
4F
8F
0B
42
AC
4F
C0
9
8A
E3
Q1. Solve all four questions (20)
F3
6D
56
29
0
4F
9
0B
A
A What is malware? Explain in brief concept of Virus. 5
E
F9
AC
F
4
0
49
A
4
F3
D
B Write a short note on whaling and spear phishing. 5
C
8
6
B8
29
E0
E3
4F
C5
F9
9A
C Explain the need for repeated penetration testing. 5
F9
4
D0
0
F9
64
9A
F3
D Define session hijacking. Describe the three steps.
FC
04
5
8
B8
3
64
96
C5
A
42
0E
E
4
D0
5
F
F9
49
A
9A
F3
AC
FC
38
B8
E0
64
96
42
E
Q2.
A4
29
0
5
8F
C0
9
49
(20)
F3
D
AC
F
34
B8
E0
E3
4
96
9A
56
AF
4
A Explain the different types of hackers. Explain in detail the different types of attacks 10
29
D0
8F
0
9
8A
AC
FC
F
04
34
E3
4
96
0B
0E
6
AF
A4
29
E0
B What are the different types of threats due to foot printing? Explain in brief. 10
C5
F
F9
6D
FC
8
4
B8
C0
49
3
4
9A
F3
E
6
A4
E0
0
Q3.
4F
C5
8F
9
9A
42
6D
(20)
F
B8
C0
8A
E3
64
9A
F3
04
F9
D0
4F
10
F9
0B
42
0E
AC
38
49
8A
10
96
3
6D
FC
9E
F
9
E0
8F
network scanning.
0B
9A
42
F9
AC
A4
4F
C0
E3
3
6D
04
38
56
B8
AF
29
4F
F9
Q4.
0E
E
F9
AC
(20)
34
D0
F9
49
8A
64
FC
38
AF
29
E0
64
96
C5
0B
34
C5
8F
C0
F9
49
A
9A
6D
techniques
8
AF
E0
E3
64
9A
4F
0B
42
B What are the different types of password attacks? Explain techniques to crack
F9
10
C5
C0
F9
49
A
F3
6D
8
passwords.
8
0
E3
64
9A
4F
0B
9A
E
F9
C5
C0
F9
A
42
04
8
Q5.
B8
E3
64
96
9A
4F
F3
(20)
0E
D0
C5
F
F9
A
9A
42
FC
38
A Explain the need for cloud computing? What are the different types of cloud computing. 10
B8
64
6
9A
F3
04
9E
F9
A4
42
4F
38
B8
96
9A
F3
04
9E
56
Q6.
D0
8F
9A
42
0E
(20)
AC
E3
64
96
F3
FC
29
E0
8F
9
9A
AC
A4
F
34
C0
10
4
4
6
B8
AF
29
E0
4F
C5
F9
34
C0
49
8A
64
9A
AF
E0
4F
C5
0B
______________________
2
34
C0
49
8A
9A
6D
AF
E0
4F
0B
42
F9
C0
49
8A
F3
6D
38
E0
4F
0B
9A
F9
C0
8A
6D
04
38
4F
0B
0E
9E
F9
8A
6D
FC
4F
16867 Page 1 of 1
E3
0B
56
F9
A4
F9
6D
AC
B8
E3
64
F9
D0
C5
F9
9AC564F9E38F96D0B8A4FC0E049AF342
E3
64
96
9A