0% found this document useful (0 votes)
12 views

eth

The document outlines an examination paper for the subject of Ethical Hacking, including instructions and a breakdown of questions. It consists of multiple sections where students must attempt various questions related to ethical hacking concepts, techniques, and security measures. The total marks for the paper are 75, and all questions are compulsory with specific marks indicated for each question.

Uploaded by

vedantpm9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

eth

The document outlines an examination paper for the subject of Ethical Hacking, including instructions and a breakdown of questions. It consists of multiple sections where students must attempt various questions related to ethical hacking concepts, techniques, and security measures. The total marks for the paper are 75, and all questions are compulsory with specific marks indicated for each question.

Uploaded by

vedantpm9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Paper / Subject Code: 87013 / Ethical Hacking (R-2023-24)

(2 h Hours) [Total Marks: 75)

N.B. 1) Allquestions are compulsory. e 2 E .3


60 3CiYB21N6 3 3.INN 30oc!
2) Figures to the right indicate marks.
3) IIlustrations, in-depth answers and diagrams will be appreciated. | Y
:Y30CB2FXGSIV 3
300C(B
322E
F XN63
63:

4) Mixing of sub-questions is not allowed.

Q. 1 Attempt ANY FOUR from the following:


(a) Explain the Types of Ethical Hacking
(b) Explain Hacking Technology and its types in detail
(c) Define Hacktivism and:explain ways to manifest it
(d) Explain any 5 Hacker Classes
(e) What afe the ways to conduct Ethical Hacking
() Writea short note on foot printing
62
63
B 3
xF}Xy6330
1YB
X32
60
3IC
X
I 36
Y 2
303C
IBY23
E0 C B 2 } 0

Attempt ANY FOUR-fromthe following: (20M)


Q. 2
(a) Ex[plain Activeand Passive Sniffing
(b) Explain ARP Poisóning in Detail
B 2 F X 6 3 1 Y 3 0 C 3Explain
2 DNS Spoofing Techniques in detail
Explain the working of DOS attack in detail
Explain Smùrf attack indetail
Explain týpes of Session Hijacking
(20M)
Atteîmpt ANY FOUR from the following:
A 63
3 01C)I 2 T X
la) Explain methöds involved in Google Hacking
(b) Define the tèrim Authentication andits types
Define SQL injectioD, and namsits types
(a) Explain Buffer -Qyerflow and its types.
Y30CB21(e)
X631Y: Explín WEP in.detail
() Explain the working of wireless sniffing
(15M)
Q.4 AttemptANY FIVEfrom the following:
information Gathering
iY30CEDEExplaii the methods to perform
(a) Define Password and its typcs
(6)
E[plain Mutation Techniques
wB2FX63:Y3
(d) Definethe terns (i)Scanning (i)Enumeration
(e) What is Wéb Server Hardening?
Y30CBFX62N
(): Write a short note on Rogue Access Point

You might also like