You are on page 1of 1
__ NG MOUS): KURNOOL, GAVLLAREDDY ENGINEERING COLL oO LSE a \ JOTAL FLECUIY BE Date: 04.11.2017 uration: 2 Hours Max. Marks: 50 Time 2 10-MAM- 12.30PM. 1. Question No. t ks compatsory and It must be answered first in Sequence at one place oalys 2 Answer any four questions from the remainiog, No (10 X 2 =20M) ‘i i : inux? 1a) List owt some of the tots that are used in racking passwords in windows and tin (h) What is the eriterion to be followed in creat ing strong passwords? {s) Define shoulder surfing and Inference? . (Q) ‘What are the main differences that lie in the processes followed by Ethical hacker and Malicious user’? (8) Mention the purpose of Whats? (What are the different passwond storage (g) Define Blind assesment route? hy Mention the we of Elcomsaft system tool? (i) Define Keystoke logging? G) List out the low tech methods used to erack password? Jocatlons used In Linux end other Unix varlents? 2.8) Give an Outline about Assessing Vulnerabilities? (35M) cos 4) Discuss Determining what's running on epen ports in detalt? (4M) cos a. Categorize ard explain different types of attacl it Spaeth Ispes of attacks used in (75M) cos 4.a) Explain brief) iffcatic I ly two general elassi ene eneral classifications of password (45M) cos ) Whar ore the counter measunes used against weak (3M) COs authentication and shoulder surfing? Discuss in detail about cracking Laptops, mobiles and tablets? (7.501) co6 Explain any three techniques used to gather information about (7-5) an organization? cos

You might also like