Question Papers
Question Papers
Question Papers
ETHICAL HACKING
Time: 03 Hours Maximum Marks:770
Note: Answer any FIVE full questions.
C Test password cracking using any one tool. What are the countermeasures to be
C. Why is social engineering effective? What are the factors that make companies
Vulnerable to social engineering attacks? 2+5+7
b. Define cross site scripting attack and explain the working function in detail.
C. Compare and contrast Security Audit, Vulnerability assessment and Pen testing?
2+5+7
6. a. What are the tools used for Tools Used for Os fingerprinting?
C. How can we defernd against HTTP response splitting and web cache poisoning?
2+5+7
Page 1 of 1
THIRD SEMESTER UNIVERSITY EXAMINATION, NOVEMBER - 2021
CYBER FORENSICS
Time: 03 Hours
Maximum Marks:70
Note: Answer any FIVE full
questions.
1. a. List and explain about the people involved in computer forensics
b. What are the steps to perform an acquisition on a USB drive with ProDiscover BasiC?
7+7
2 a. Define registry.
b. Compare live acquisition with static acquisition.
C. Explain NTFS Compressed Files and NTFS Encrypting File System. 2+5+7
a. What is spam?
b. Compare IMAP with POP3.
C. Elaborate the working of email systemn.
2+5+7
1 a. How to delete NTES Files? Explain the steps to recover deleted files.
b. What are main event logs? Explain Network investigation using the same. 7+7
Page 1 of 1
THIRD SEMESTER UNIVERSITY EXAMINATION, NOVEMBER 2021
C. Describe command injection and code injection attack with suitable example. 07
5. a Define SSH. 02
b. Explain the various administrative services of Remote Server management. 05
preventive measures. 07
3. a. What is the of
use Privileges in database Security? 02
b. How to create Schema? Explain. 05
C. Analyze the database risk, threats and vulnerabilities. 07
Page 1 of 1
THIRD SEMESTER UNIVERSITY EXAMINATION, NO0VEMBER 2021
VULNERABILITY ASSESSMENT AND PENETRATION TESTING
Time: 03 Hours
Maximum Marks:70
purpose of each.
Explain different tools with its purpose for cracking credential and password attacks.
2+5+7
6. a. Define threat, attack & Vulnerability.
b. Describe any 5 legal laws of IT penetration testing.
C. Discuss in detail about the types of assessments involved for white box
penetration
testing. 2+5+7
Page 1 off 1
THIRDSEMESTER UNIVERSITY EXAMINATION, NOVEMBER 2021
APPLIED CRYPTOGRAPHY
C. Explain the Knapsack algorith m for the generalized public-key encryption. 2+5+7
Page 1 of 1