201CS009
201CS009
Note: Answer any FIVE full questions, choosing ONE full question from each module.
2. Any revealing of identification, appeal to evaluator and /or equations written eg, 42+8 = 50, will be treated as malpractice.
Module-1
1 a. Discuss why foot printing is necessary. Discuss about Internet Foot Printing. (10 Marks)
b. Discuss the different techniques used to check the system is Alive. (10 Marks)
OR
2 a. Discuss various scan types with relevant diagrams. (10 Marks)
Important Note : 1. On completing your answers, compulsorily draw diagonal cross lines on the remaining blank pages.
b. Explain Basic Banner Grabbing and Banner Grabbing Counter measures. (10 Marks)
Module-2
3 a. Explain unauthenticated attacks and authentication spoofing attacks. (10 Marks)
b. Discuss windows authentication sniffing counter measures. (10 Marks)
OR
4 a. Explain about privilege escalation. Discuss how preventing privilege escalation. (10 Marks)
b. Discuss Default Services in Windows-2000 and Window-XP. (10 Marks)
Module-3
5 a. Explain in detail about dial-up security policy. (10 Marks)
b. Discuss PBX Hacking. Explain PBX Hacking Counter measures. (10 Marks)
OR
6 a. Explain in detail about VPN and VPN Hacking. (10 Marks)
b. Explain about vulnerability detecting in layer 2. (10 Marks)
Module-4
7 a. Explain the frequencies and channels. Explain about the session establishment. (10 Marks)
b. Discuss about Wired Equivalent Privacy (WEP) and Wireless Adapters. (10 Marks)
OR
8 a. Explain Denial of Service and motivation of DOS attackers. (10 Marks)
b. Discuss types of Denial of Services attacks. (10 Marks)
Module-5
9 a. Explain what is Buffer Over flow. (10 Marks)
b. Explain briefly about Web Server Vulnerability Scanners. (10 Marks)
OR
10 a. Discuss about Browser Plug-ins. (10 Marks)
b. Explain about SQL injection attack. (10 Marks)
*****