The document outlines an examination paper for the subject of Ethical Hacking, including instructions and a breakdown of questions. It consists of multiple sections where students must attempt various questions related to ethical hacking concepts, techniques, and security measures. The total marks for the paper are 75, and all questions are compulsory with specific marks indicated for each question.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
12 views
eth
The document outlines an examination paper for the subject of Ethical Hacking, including instructions and a breakdown of questions. It consists of multiple sections where students must attempt various questions related to ethical hacking concepts, techniques, and security measures. The total marks for the paper are 75, and all questions are compulsory with specific marks indicated for each question.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1
Paper / Subject Code: 87013 / Ethical Hacking (R-2023-24)
(2 h Hours) [Total Marks: 75)
N.B. 1) Allquestions are compulsory. e 2 E .3
60 3CiYB21N6 3 3.INN 30oc! 2) Figures to the right indicate marks. 3) IIlustrations, in-depth answers and diagrams will be appreciated. | Y :Y30CB2FXGSIV 3 300C(B 322E F XN63 63:
4) Mixing of sub-questions is not allowed.
Q. 1 Attempt ANY FOUR from the following:
(a) Explain the Types of Ethical Hacking (b) Explain Hacking Technology and its types in detail (c) Define Hacktivism and:explain ways to manifest it (d) Explain any 5 Hacker Classes (e) What afe the ways to conduct Ethical Hacking () Writea short note on foot printing 62 63 B 3 xF}Xy6330 1YB X32 60 3IC X I 36 Y 2 303C IBY23 E0 C B 2 } 0
Attempt ANY FOUR-fromthe following: (20M)
Q. 2 (a) Ex[plain Activeand Passive Sniffing (b) Explain ARP Poisóning in Detail B 2 F X 6 3 1 Y 3 0 C 3Explain 2 DNS Spoofing Techniques in detail Explain the working of DOS attack in detail Explain Smùrf attack indetail Explain týpes of Session Hijacking (20M) Atteîmpt ANY FOUR from the following: A 63 3 01C)I 2 T X la) Explain methöds involved in Google Hacking (b) Define the tèrim Authentication andits types Define SQL injectioD, and namsits types (a) Explain Buffer -Qyerflow and its types. Y30CB21(e) X631Y: Explín WEP in.detail () Explain the working of wireless sniffing (15M) Q.4 AttemptANY FIVEfrom the following: information Gathering iY30CEDEExplaii the methods to perform (a) Define Password and its typcs (6) E[plain Mutation Techniques wB2FX63:Y3 (d) Definethe terns (i)Scanning (i)Enumeration (e) What is Wéb Server Hardening? Y30CBFX62N (): Write a short note on Rogue Access Point
(Ebook) Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing by Ahmed Sheikh ISBN 9781484272589, 1484272587 - Get the ebook in PDF format for a complete experience