GISL Institute of Technology: Course Code & Course Name Year/Sem: CCS344 & Ethical Hacking: Iii/Vi
GISL Institute of Technology: Course Code & Course Name Year/Sem: CCS344 & Ethical Hacking: Iii/Vi
3. What vulnerabilities are found in embedded systems, how do they differ from traditional IT
vulnerabilities? Identify the complete vulnerability assessment procedure in detail.
4. Construct the complete SNMP model in finding suspicious network activities with neat
architecture.
5. Explain the role of NetBIOS in network communication.
6. Name two methods used for enumerating information from SNMP, LDAP, NTP, SMTP, and DNS
services.
2. List the criteria used by extended IP access lists to restrict incoming/outgoing IP traffic at router’s
interface.
3. Difference between network based and host based intrusion detection systems.