0% found this document useful (0 votes)
21 views1 page

201CS009

Ethical hacking vtu phd question paper

Uploaded by

bilwashree.m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views1 page

201CS009

Ethical hacking vtu phd question paper

Uploaded by

bilwashree.m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

USN 201CS009

Ph.D./M.S. (Engg.) by Research Degree Examination, Aug./Sep. 2023


Ethical Hacking

Time: 3 hrs. Max. Marks: 100

Note: Answer any FIVE full questions, choosing ONE full question from each module.
2. Any revealing of identification, appeal to evaluator and /or equations written eg, 42+8 = 50, will be treated as malpractice.

Module-1
1 a. Discuss why foot printing is necessary. Discuss about Internet Foot Printing. (10 Marks)
b. Discuss the different techniques used to check the system is Alive. (10 Marks)

OR
2 a. Discuss various scan types with relevant diagrams. (10 Marks)
Important Note : 1. On completing your answers, compulsorily draw diagonal cross lines on the remaining blank pages.

b. Explain Basic Banner Grabbing and Banner Grabbing Counter measures. (10 Marks)

Module-2
3 a. Explain unauthenticated attacks and authentication spoofing attacks. (10 Marks)
b. Discuss windows authentication sniffing counter measures. (10 Marks)

OR
4 a. Explain about privilege escalation. Discuss how preventing privilege escalation. (10 Marks)
b. Discuss Default Services in Windows-2000 and Window-XP. (10 Marks)

Module-3
5 a. Explain in detail about dial-up security policy. (10 Marks)
b. Discuss PBX Hacking. Explain PBX Hacking Counter measures. (10 Marks)

OR
6 a. Explain in detail about VPN and VPN Hacking. (10 Marks)
b. Explain about vulnerability detecting in layer 2. (10 Marks)

Module-4
7 a. Explain the frequencies and channels. Explain about the session establishment. (10 Marks)
b. Discuss about Wired Equivalent Privacy (WEP) and Wireless Adapters. (10 Marks)

OR
8 a. Explain Denial of Service and motivation of DOS attackers. (10 Marks)
b. Discuss types of Denial of Services attacks. (10 Marks)

Module-5
9 a. Explain what is Buffer Over flow. (10 Marks)
b. Explain briefly about Web Server Vulnerability Scanners. (10 Marks)

OR
10 a. Discuss about Browser Plug-ins. (10 Marks)
b. Explain about SQL injection attack. (10 Marks)

*****

You might also like