0% found this document useful (0 votes)
133 views3 pages

Diploma Examination in Engineering/Technology/ Management/ Commercial Practice. Model Question Paper - Ethical Hacking

This document contains a model question paper for an examination in ethical hacking. It is divided into three parts. Part A contains short answer questions testing basic knowledge. Part B contains longer answer questions choosing between vulnerability and attack topics. Part C contains longer still comprehensive questions choosing between technical hacking concepts and countermeasures. The paper tests knowledge across several modules related to reconnaissance, attacks, operating systems, and wireless hacking, with a focus on both offensive tactics and defensive strategies.

Uploaded by

Sreekanth Ku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
133 views3 pages

Diploma Examination in Engineering/Technology/ Management/ Commercial Practice. Model Question Paper - Ethical Hacking

This document contains a model question paper for an examination in ethical hacking. It is divided into three parts. Part A contains short answer questions testing basic knowledge. Part B contains longer answer questions choosing between vulnerability and attack topics. Part C contains longer still comprehensive questions choosing between technical hacking concepts and countermeasures. The paper tests knowledge across several modules related to reconnaissance, attacks, operating systems, and wireless hacking, with a focus on both offensive tactics and defensive strategies.

Uploaded by

Sreekanth Ku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Reg. No.………..

Name:………….
TED (21) – 5133B
REVISION 2021 QID :

DIPLOMA EXAMINATION IN ENGINEERING/TECHNOLOGY/ MANAGEMENT/


COMMERCIAL PRACTICE.
MODEL QUESTION PAPER - ETHICAL HACKING

Time:3hours Maximum Marks:75


PART A

I. Answer all the following questions in one word or sentence.

(9 x 1 = 9 Marks)
Module Outcome Cognitive level
1 Define Ethical hacking M 1.01 R
2 List two Network attacks M 1.04 R
3 Define foot printing M 2.01 R
4 List two tools used for ping sweep M2.04 R
5 ---------- Scan is usually used to bypass a firewall or packet- M 2.04 R
filtering device.
6 State true or false: NTFS is a windows file system M 3.01 U
7 Define Null Session M 3.01 R
8 Name two web application vulnerabilities from OWASP’s top 10 M 4.02 R
list.
9 Define Access Point M 4.03 R
PART B

II. Answer any Eight questions from the following


(8 x 3 = 24 Marks)
Module Outcome Cognitive level
1 List any three methods for protecting against malware attacks M 1.01 R
2 Compare Virus and Worms M1.03 U
3 Explain DDoS attack M1.04 U
4 List any three countermeasures for shoulder surfing M 2.03 R
5 Explain Dumpster diving M 2.03 U
6 Explain how DNS is a major area of potential vulnerability for M 3.01 U
network attacks.
7 Explain vulnerabilities in Linux OS M 3.03 U
8 List any 3 malicious activities an attacker can do after gaining M 4.02 R
control of a web server
9 Explain wireless network components M 4.03 U
10 Explain the term war driving. M 4.04 U

PART C

Answer all questions fromthefollowing (6 x 7 = 42Marks)

Module Outcome Cognitive level


III. Explain Buffer overflow attacks and Brute force attacks M 1.04 U

OR

IV. Explain viruses (two types) and methods to counteract against


virus attacks M 1.03 U
V. Compare three port scanning types M 2.04 U

OR

VI. Explain Social Engineering and give two methods for social M 2.03 U
engineering

VII. How can you demonstrate the process of foot printing using M 2.01 U
web tools specifically for a sample website(‘mysite.com’)
OR

VIII. Explain Competitive intelligence and suggest one method for it M 2.02 U

IX. Explain Remote Procedure Call M 3.01 U

OR

X. Explain Common Internet file system M 3.01 U

XI. XI Explain the different file systems and vulnerabilities related to M 3.02 U
XII. them in Windows OS
OR
M 3.04 U
XII Explain countermeasures against Linux OS attacks
XIII. Summarize countermeasures for wireless attacks M4.04 U

OR
M 4.02 U
XIV. Explain Cross Site Request Forgery

You might also like