Retest QP

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Register Number:……………..

CONTINUOUS ASSESSMENT - RETEST


January 2024
GENERAL INSTRUCTIONS TO THE CANDIDATES
1. Candidates are strictly instructed not to write anything in the question paper other than their roll
number.
2. Candidates should search their pockets, desks and benches and handover to the Hall
Superintendent/ Invigilator if any paper, book or note which they may find therein as soon as they enter
the examination hall.
3. Candidates are not permitted to bring electronic gadgets like mobile phones and smart watches
into the exam hall.
4. Corrective measures as per KCT examination policies will be imposed for involvement of
malpractice inside the Examination hall.
Course Code &Title: P20CAE0016: Ethical Hacking
Branch: MCA Semester: III
Max
Time: 2 hrs 50
Mark:
COURSE OUTCOMES:
CO1: Apply various open source security tools to assess the network and computing system
CO2: Practice penetration testing to predict the vulnerabilities across any computing system
CO4: Understand how to protect the devices in a network from malicious software and worms
CO5: Assess the wireless network flaws and be able to provide security solution.
Time: Three Hours Maximum Marks: 100
Answer all the Questions:-
PART A (10 x 1 = 10 Marks)
1. Match the type of hacker in list 1 with their qualities in the List II CO1 [K2]

List I List II

A. White hat hacker i. has no technical knowledge

B. Script kiddie ii. security professional


C. Hacktivist iii. technically sound
D. Elite hacker iv. group of hackers

A B C D
a) ii i iv iii
b) iii iv ii i
c) ii iv iii i
d) iii i ii iv

PAGE 1 OF 4
2. In which phase of pen testing is the network scanning performed CO1 [K1]

a) Planning b) Discovery
c) Attack d) Reporting
CO2 [K2]
Which of the following points describes best about information gathering?
3.
1. First phase of hacking
2. Helps to find the offline presence of the target
3. Act of knowing who, when, how and any other type of information about the target
4. Intermediate phase of hacking
a) 1,3 b) 1,4
c) 1,2 d) 2,3
4. A ______________ is technically sound and capable of creating exploits CO1 [K1]

a) Elite Hacker b) Ethical Hacker


c) Script Kiddie d) Hacktivist
5. Assertion (A): Vulnerability is flaw or weakness in the asset that can be used to gain un- CO1 [K3]
authorized access.
Reason (R): The known vulnerabilities are exploited to launch an attack on the victim.
a) Both A and R are Individually true b) Both A and R are Individually true but
and R is the correct explanation of A R is not the correct explanation of A
c) A is true but R is false d) A is false but R is true
6. Which of the following command is used to list all the connections established from the CO4 [K3]

current computer on a particular port


a) netstat –ano b) netstat –r
c) net start - d) tasklist
7. Sequence the NIST pen testing steps : CO1 [K2]

1. Attack
2. Discovery
3. Planning
4. Reporting
a) 2-3-4-1 b) 1-3-2-4
c) 3-2-1-4 d) 4-1-3-2

Please indicate knowledge level (K1toK6) and Course Outcome level (CO1 to CO5) against each question for
each subdivision.

PAGE 2 OF 4
8. Which type of scanning is a tactic that a malicious hacker can use to determine the state CO2 [K2]

of communications port without establishing a full connection?


a) NULL b) SYN
c) XMAS d) FIN
9. Assertion (A): A hash is basically a one-way cryptographic algorithm CO5 [K3]

Reason (R): A decrypting algorithm is used to reverse the output of an hashing algorithm
a) Both A and R are Individually true b) Both A and R are Individually true but
and R is the correct explanation of A R is not the correct explanation of A
c) A is true but R is false d) A is false but R is true
10. What is the attack called “evil twin tower” CO5 [K2]

a) Rouge Access Point b) ARP Poisoning


c) Session Hijacking d) MAC Spoofing

Answer ALL Questions:-


PART B (5 x 2 = 10 Marks)
(Answer not more than 50 words)
11. Who is an ethical hacker? CO1 [K2]

12. How open ports and services are scanned? CO2 [K2]

13. Explain in detail about how firewalls are evaded. CO2 [K2]

14. How are user-agents manipulated? CO4 [K2]

15. Differentiate WPA and WEP. CO5 [K3]

Please indicate knowledge level (K1toK6) and Course Outcome level (CO1 to CO5) against each question for
each subdivision.

PAGE 3 OF 4
Answer any THREE Questions:-
PART C (3 x 10 = 30 Marks)
(Answer not more than 250 words)
16. a) Explain in about various types of Penetration tests. 4 CO1 [K2]

b) How tracing of location done? Give examples 4 CO2 [K2]

c) WHAT is a client side exploit? Give an example. 2 CO4 [K2]

17. a) What is the significance of OWASP. 4 CO1 [K2]

b) Differentiate between ICMP traceroot and TCP traceroot 4 CO2 [K3]

c) What is a password salt? 2 CO4 [K2]

18. a) Discuss how the Black box penetration testing different from the Grey box 4 CO1 [K2]
penetration testing.
b) What are the various sources of information gathering that help to perform 4 CO2 [K2]
an effective pen-test.

c) Justify the need for security controls in a wireless network. 2 CO5 [K3]

19. a) Explain briefly on : 4 CO1 [K2]


I. Browser Exploitation
II. Attacking with PDF
b) Explain in about the flaws in implementing the Captcha validation.. 4 CO2 [K2]

c) Suggest two methods to protect the login operation from the brute force 2 CO5 [K3]
attacks.

COURSE
CO1 CO2 CO3 CO4 CO5 CO6
OUTCOME
Marks ( % ) 40 35 - 12 13 -
Remember Understand Apply Analyse Evaluate
COGNITIVE LEVEL Create (K6)
(K1) (K2) (K3) (K4) (K5)

Marks ( % ) 3 75 22

Prepared by Verified by
(Name & Sign) (Name & Sign)

Please indicate knowledge level (K1toK6) and Course Outcome level (CO1 to CO5) against each question for
each subdivision.

PAGE 4 OF 4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy