Retest QP
Retest QP
Retest QP
List I List II
A B C D
a) ii i iv iii
b) iii iv ii i
c) ii iv iii i
d) iii i ii iv
PAGE 1 OF 4
2. In which phase of pen testing is the network scanning performed CO1 [K1]
a) Planning b) Discovery
c) Attack d) Reporting
CO2 [K2]
Which of the following points describes best about information gathering?
3.
1. First phase of hacking
2. Helps to find the offline presence of the target
3. Act of knowing who, when, how and any other type of information about the target
4. Intermediate phase of hacking
a) 1,3 b) 1,4
c) 1,2 d) 2,3
4. A ______________ is technically sound and capable of creating exploits CO1 [K1]
1. Attack
2. Discovery
3. Planning
4. Reporting
a) 2-3-4-1 b) 1-3-2-4
c) 3-2-1-4 d) 4-1-3-2
Please indicate knowledge level (K1toK6) and Course Outcome level (CO1 to CO5) against each question for
each subdivision.
PAGE 2 OF 4
8. Which type of scanning is a tactic that a malicious hacker can use to determine the state CO2 [K2]
Reason (R): A decrypting algorithm is used to reverse the output of an hashing algorithm
a) Both A and R are Individually true b) Both A and R are Individually true but
and R is the correct explanation of A R is not the correct explanation of A
c) A is true but R is false d) A is false but R is true
10. What is the attack called “evil twin tower” CO5 [K2]
12. How open ports and services are scanned? CO2 [K2]
13. Explain in detail about how firewalls are evaded. CO2 [K2]
Please indicate knowledge level (K1toK6) and Course Outcome level (CO1 to CO5) against each question for
each subdivision.
PAGE 3 OF 4
Answer any THREE Questions:-
PART C (3 x 10 = 30 Marks)
(Answer not more than 250 words)
16. a) Explain in about various types of Penetration tests. 4 CO1 [K2]
18. a) Discuss how the Black box penetration testing different from the Grey box 4 CO1 [K2]
penetration testing.
b) What are the various sources of information gathering that help to perform 4 CO2 [K2]
an effective pen-test.
c) Justify the need for security controls in a wireless network. 2 CO5 [K3]
c) Suggest two methods to protect the login operation from the brute force 2 CO5 [K3]
attacks.
COURSE
CO1 CO2 CO3 CO4 CO5 CO6
OUTCOME
Marks ( % ) 40 35 - 12 13 -
Remember Understand Apply Analyse Evaluate
COGNITIVE LEVEL Create (K6)
(K1) (K2) (K3) (K4) (K5)
Marks ( % ) 3 75 22
Prepared by Verified by
(Name & Sign) (Name & Sign)
Please indicate knowledge level (K1toK6) and Course Outcome level (CO1 to CO5) against each question for
each subdivision.
PAGE 4 OF 4