ethicalhacking-scheme
ethicalhacking-scheme
FIRST SEMESTER
SECTION B (5 x 6 = 30 Marks)
Answer ALL Questions
. Penetration testing (pen testing) in ethical hacking follows a structured approach to assess the security of a system. The process consists of
five main phases:
2. Scanning
4. Maintaining Access
CO1 K2
(OR)
CO2 K3
(OR)
brute
Password attacks are attempts to steal or crack user credentials to gain unauthorized access. Attackers use techniques like
force, dictionary attacks, phishing, and credential stuffing to exploit weak or reused
passwords. To defend against such attacks, organizations and users must adopt strong authentication practices
and security measures. --- carries 3 marks.
rity.
CO3 K4
(OR)
Mobile malware refers to malicious software designed to infect smartphones, tablets, and other mobile devices. It is used by cybercrimin-
als to steal personal data, spy on users, perform unauthorized transactions, and disrupt device functionality. Mobile malware typically
spreads through malicious apps, phishing links, drive-by downloads, or unsecured networks. --- carries 2 marks --And some other relev-
ant informations carries 4 marks.
CO3 K5
(OR)
SECTION C (1 x 10 = 10 Marks)
Answer ALL Questions
11. a) Write in detail about the Host and Network scanning methods.
Host and network scanning are essential cybersecurity techniques used for assessing vulnerabilities, identifying active devices, and detect-
ing security weaknesses. These methods are commonly used in penetration testing, threat hunting, and security audits to strengthen an
organization's defense mechanisms.
Host scanning focuses on analyzing individual devices (hosts), while network scanning examines the overall network infrastructure.
Various tools like Nmap, Nessus, Wireshark, and OpenVAS help conduct these scans effectively.
----- carries 2 marks----- Types of Host Scanning Methods – carries 2 marks- Since attackers also use host and network scanning to discover
vulnerabilities, organizations should implement defensive counter measures:
✔ Implement Zero-Trust Security – Restricts unauthorized access--- or relevant explanations carries 6 marks.
CO3 K4
(OR)
Defense Strategies:
---- carries 8 marks with marks evenly distributed for any two headings.
*****