0% found this document useful (0 votes)
19 views1 page

201CS009

Ethical hacking vtu qp may24

Uploaded by

bilwashree.m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views1 page

201CS009

Ethical hacking vtu qp may24

Uploaded by

bilwashree.m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

USN 201CS009

Ph.D./M.S. (Engg.) by Research Degree Examination, April/May 2024


Ethical Hacking
Time: 3 hrs. Max. Marks: 100
Note: Answer any FIVE full questions, choosing ONE full question from each module.

Module-1
2. Any revealing of identification, appeal to evaluator and /or equations written eg, 42+8 = 50, will be treated as malpractice.

1 a. What is internet foot printing? Why does attacker need foot printing? What are their
objectives? (10 Marks)
b. What is enumeration? Explain the different services with their port numbers to enumerate.
(10 Marks)
OR
2 a. What is NETBIOS enumeration? Explain with a neat diagram. (10 Marks)
Important Note : 1. On completing your answers, compulsorily draw diagonal cross lines on the remaining blank pages.

b. Explain with a diagram Network Security Monitoring. (10 Marks)

Module-2
3 a. What are the different techniques to crack passwords? Explain. (10 Marks)
b. How does Microsoft authentication take place? Explain with an example. (10 Marks)

OR
4 a. Differentiate remote access versus local access. (10 Marks)
b. Explain: (i) Quest for root (ii) After hacking root (10 Marks)

Module-3
5 a. Explain the process involved in voice mail and VPN hacking. (10 Marks)
b. Explain with diagram the Brute Force Scripting PBX hacking. (10 Marks)

OR
6 a. What is Discovery Anonymous System look up? Explain with example. (10 Marks)
b. How do you detect network vulnerability and layer 2 media? (10 Marks)

Module-4
7 a. Explain the Wi-Fi authentication process using centralized authentication server. (10 Marks)
b. What is WEP encryption? How does it work? What are its advantages and disadvantages?
(10 Marks)
OR
8 Explain the following attacks on wireless network:
a. Ad-hoc Network Attack
b. Access Point MAC Spoofing
c. Generic DOS Attack
d. Honey Spot Access Point (20 Marks)

Module-5
9 a. Explain Remote Control Insecurities. (10 Marks)
b. Explain: (i) Microsoft Terminal Server (ii) Citrix ICA (10 Marks)

OR
10 Explain the following:
a. SSL fraud b. Email Hacking
c. IRC Hacking d. Web Server Hacking (20 Marks)

*****

You might also like