0% found this document useful (0 votes)
12 views

201CS009

Vtu ethical hacking dec 22 qp

Uploaded by

bilwashree.m
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

201CS009

Vtu ethical hacking dec 22 qp

Uploaded by

bilwashree.m
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

USN 201CS009

Ph.D./M.S. (Engg.) by Research Degree Examination, December 2022


Ethical Hacking

Time: 3 hrs. Max. Marks:100


Note: Answer any FIVE full questions, choosing ONE full question from each module.
2. Any revealing of identification, appeal to evaluator and /or equations written eg, 42+8 = 50, will be treated as malpractice.

Module-1
1 a. List and explain steps involved in footprinting Analysis with suitable examples. (10 Marks)
b. Briefly explain basic banner grabbing enumeration technique. (05 Marks)
c. Write a note on IAAAS. (05 Marks)
Important Note : 1. On completing your answers, compulsorily draw diagonal cross lines on the remaining blank pages.

OR
2 a. Discuss the Fyodor port scanning techniques. (08 Marks)
b. Discuss XP/Server 2003 setting and recommended configurations. (07 Marks)
c. Explain ARP Host Discovery. (05 Marks)

Module-2
3 a. What is Vulnerability mapping? List and explain different methods used by an attacker to
accomplish this task. (05 Marks)
b. With neat diagram, explain contents of security descriptor. (05 Marks)
c. List common types of remote attacks and briefly explain any five. (10 Marks)

OR
4 a. Define after hacking root and explain the composition of root kit in detail. (10 Marks)
b. What is Modular Crypt Format (MCF)? List and explain three fields that compromise the
MCF format. (05 Marks)
c. What are the conditions under which input validation attack occurs? Explain briefly.
(05 Marks)

Module-3
5 a. List the important factors which needs to identify for Brute-Force scripting and explain.
(10 Marks)
b. Describe the counter measures that are used to defend the SQL injection. (05 Marks)
c. List the sequence of events that take place when a CISCO IP phone boots s up. (05 Marks)

OR
6 a. List and explain different categories of web server vulnerabilities. (10 Marks)
b. Briefly explain tunnel establishment IPSec VPNs. (05 Marks)
c. Briefly explain VPN hacking. (05 Marks)

1 of 2
201CS009

Module-4
7 a. Bring out the important features of DOS. (06 Marks)
b. List and briefly explain types of firewalls. (06 Marks)
c. Discus wireless scanning and enumeration. (08 Marks)

OR
8 a. Explain packet filtering in detail. (08 Marks)
b. What are the features focused by web application attacks? (06 Marks)
c. Briefly explain web-crawling and web crawling tools. (06 Marks)

Module-5
9 a. List and explain common tools used to perform web application hacking. (06 Marks)
b. What are back doors? Explain remote control back doors with an example. (08 Marks)
c. Briefly explain session Hijacking. (06 Marks)

OR
10 Write a note on the following :
a) Subverting the system environment.
b) Hacking the internet use.
c) SSL Fraud
d) IRC hacking (20 Marks)

*****

2 of 2

You might also like